SlideShare a Scribd company logo
INTRODUCTION
INFORMATION
TECHNOLOGY (I.T)
Prepared by :
Egidio Magno
Egidio Magno
Schedule
• Introduction
• Presentation
• Q & A
• Video :
Source :https://www.youtube.com/watch?v=mzy84Vb_Gxk&t=397s
Egidio Magno
We can only define Information Technology as “Whatever technology we use to get information is called
information technology".
Sometimes, the term IT is applied to computers and computer-based systems. But the root word for technology
is "the means" for achieving goals.
For example:
- when using a matchbook it is a means of creating fire. Finally is the fire itself.
- Bicycles are a means of transportation. The purpose of riding a bicycle is to reach the destination, and
maybe also to get the training needed.
As a result, when we talk about the use of technology, we must always remember that it is a means, Technology
is the application of modern communication and computing technology for the creation, management , and
use of knowledge.
Information Technology means the use of hardware, software, services, and supporting infrastructure to
manage and deliver information using voice, data and video.
A. Definition Information Technology
Egidio Magno
B. What does Information Technology includes?
Information technology includes:
1. All computers with a human interface.
2. All computer which will not operate unless connected to a computer or network.
3. All voice, video and data networks and the equipment, staff and purchased services necessary to operate
them.
4. All salary and benefits for staff whose job descriptions specifically include technology functions, i.e network
services, applications development, systems administration.
5. All technology services provided by vendors or contractors.
6. Operating costs associated with providing information technology.
7. All costs associated with developing, purchasing, licensing or maintaining software.
Egidio Magno
C. More Specifically Information Technology
Information technology means :
1. Manage computer networks.
2. Create original web pages.
3. Producing videos digitally.
4. Designing a computer system as a consultant.
5. Vendors sell products on the internet.
6. Designing 3D artwork illustration .
7. Manage company database.
8. Coding software.
9. Provide technical support.
10. Manage projects and budgets.
11. Writing technical documentation.
Egidio Magno
D. Function of Information Technology
In general there are six functions of IT , including as below:
1. Capture : The records of various activities. For example, accept input from the keyboard, scanner, mic, and
others.
2. Processing :Process that received input data which is then converted into new information. This processing to
conversion, analyzing, calculating, information as data.
3. Generating :IT will produce or organize information into useful forms. For example graphs, tables, calculations,
and so forth.
4. Storing (Storage) : Information and data into a media which can then be used for other purposes. For example,
data is stored on disk drives, CDs, and hard drives.
5. Looking Back (Retrival) : Able to find and trace information and data that has already been stored. For example,
looking for client data that has not yet made a payment.
6. As Transmission :IT can send data and information from one location to another by utilizing a computer
network. For example sending sales data to other teams in different locations.
Egidio Magno
E. Components of Information Technology
In information technology activities there are 5 main components in it, namely:
1. Computer: A computer is an electronic system that can be programmed to receive data processing, store it for
future use, and display data and information.
2. Hardware: The physical part of the computer such as a system unit etc.
3. Software: The logical part of a computer that tells the computer what to do.
4. Network Communication: this is the interconnection of various locations through media that allows people to
send and receive information. Communication networks allow people and businesses to work together. This
includes hardware, programs, and information. IT has become revolutionary through the use of
communication networks. Information can be transferred from one place to another without difficulty and
quickly.
5. knowledge is the ability to do right things. IT knowledge consists of:
– Familiarity with information tools including the internet
– Have the skills needed to use this tool
– Understand the use of information technology to solve problems and create opportunities.
Egidio Magno
F. Information Technology Job Titles
1. Computer Network Specialist
Computer network specialists and analysts define, design,
build, and maintain a variety of data communication networks
and systems.
• Network Administrator
• Network and Computer Systems Administrator
• Senior Network Engineer
• Telecommunications Specialist
2. Computer Support Specialist
Computer support specialists and network administrators help
computer users and organizations. Some of these workers support
computer networks by testing and evaluating network systems and
ensuring that the day-to-day operations work. Others provide
customer service by helping people with their computer problems.
- Help Desk Technician
- IT Support Manager
- Systems Administrator
- Desktop Support Manager
3. Database Administrator
Database administrators help store and organize data or companies and/or customers. They protect the data from unauthorized
users. Some work for companies that provide computer design services. Others work for organizations with large database systems,
such as educational institutions, financial firms, and more.
• Data Center Support
• Database Administrator
Egidio Magno
F1. Information Technology Job Titles
4. Information Security Specialist
The increasing incidence of security breaches and dangers
related to identity theft has increased the importance of
protecting data on commercial and government sites.
Information security analysts help maintain computer
networks and organizational computer systems.
• Information Security
• Security Specialist
5. Web Developer
Web developers design, create, and modify websites. They are
responsible for maintaining a user-friendly, stable website that
offers the necessary functionality for their client’s needs.
Front End Developer
• Back End Developer
• Senior Web Administrator
• Senior Web Developer
• Web Administrator
• Web Developer
6. Software/Application Developer
Software developers design, run, and test various computer programs and applications. Application Developers create new
applications and code solutions.
• Application Developer
 Software Engineer
 Senior Programmer
 Senior Systems Software Engineer
 System ArchitectEgidio Magno
Question and Answer ?
Q & A
Egidio Magno
THANK YOU
Obrigado/a Barak
Egidio Magno

More Related Content

What's hot

Disruptive Technologies
Disruptive TechnologiesDisruptive Technologies
Disruptive Technologies
Mithileysh Sathiyanarayanan
 
ICT Policy in Nepal
ICT Policy in NepalICT Policy in Nepal
ICT Policy in Nepal
CHANDRA BAHADUR BAM
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
PIREH
 
Mis impact of information technology on business
Mis impact of information technology on businessMis impact of information technology on business
Mis impact of information technology on business
Cyndhie DeLeon
 
modern technology (technology 2)
modern technology (technology 2)modern technology (technology 2)
modern technology (technology 2)
SupunTharaka6
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
forpalmigho
 
Digital economy
Digital economyDigital economy
Digital economy
Puja Dhakal
 
Role of it in business
Role of it in businessRole of it in business
Role of it in business
Yogesh Konagalla
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economy
Andry Alamsyah
 
Globalization and Ecommerce
Globalization and EcommerceGlobalization and Ecommerce
Globalization and Ecommerce
Jake Maggay
 
Globalization & ICTs
Globalization & ICTsGlobalization & ICTs
Globalization & ICTs
Giò Bánh
 
Mobile Technology.pdf
Mobile Technology.pdfMobile Technology.pdf
Mobile Technology.pdf
julie440989
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
university of education,Lahore
 
Digital twin
Digital twinDigital twin
Digital twin
Brainware University
 
Digital and green transformation and ec ppt
Digital and green transformation and ec pptDigital and green transformation and ec ppt
Digital and green transformation and ec ppt
Soren Gigler
 
Benefits of Technolgy in Business
Benefits of Technolgy in BusinessBenefits of Technolgy in Business
Benefits of Technolgy in Business
Asim Ahmed
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
mrmwood
 
Electronic Data Interchange (EDI)
Electronic Data Interchange (EDI)Electronic Data Interchange (EDI)
Electronic Data Interchange (EDI)
Dr. Abzal Basha H S
 
Technology past, present and future
Technology past, present and futureTechnology past, present and future
Technology past, present and future
CWomble
 
Future Agenda The world in 2025 - Final
Future Agenda   The world in 2025 - FinalFuture Agenda   The world in 2025 - Final
Future Agenda The world in 2025 - Final
Future Agenda
 

What's hot (20)

Disruptive Technologies
Disruptive TechnologiesDisruptive Technologies
Disruptive Technologies
 
ICT Policy in Nepal
ICT Policy in NepalICT Policy in Nepal
ICT Policy in Nepal
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
Mis impact of information technology on business
Mis impact of information technology on businessMis impact of information technology on business
Mis impact of information technology on business
 
modern technology (technology 2)
modern technology (technology 2)modern technology (technology 2)
modern technology (technology 2)
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
 
Digital economy
Digital economyDigital economy
Digital economy
 
Role of it in business
Role of it in businessRole of it in business
Role of it in business
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economy
 
Globalization and Ecommerce
Globalization and EcommerceGlobalization and Ecommerce
Globalization and Ecommerce
 
Globalization & ICTs
Globalization & ICTsGlobalization & ICTs
Globalization & ICTs
 
Mobile Technology.pdf
Mobile Technology.pdfMobile Technology.pdf
Mobile Technology.pdf
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
 
Digital twin
Digital twinDigital twin
Digital twin
 
Digital and green transformation and ec ppt
Digital and green transformation and ec pptDigital and green transformation and ec ppt
Digital and green transformation and ec ppt
 
Benefits of Technolgy in Business
Benefits of Technolgy in BusinessBenefits of Technolgy in Business
Benefits of Technolgy in Business
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
Electronic Data Interchange (EDI)
Electronic Data Interchange (EDI)Electronic Data Interchange (EDI)
Electronic Data Interchange (EDI)
 
Technology past, present and future
Technology past, present and futureTechnology past, present and future
Technology past, present and future
 
Future Agenda The world in 2025 - Final
Future Agenda   The world in 2025 - FinalFuture Agenda   The world in 2025 - Final
Future Agenda The world in 2025 - Final
 

Similar to Seminar Introduction Information Technology

Information Technology
Information TechnologyInformation Technology
Information Technology
shehzadbilal
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
chahathargunani1
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
AjboyDiog
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
Mihreteab F
 
The best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docxThe best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docx
intel-writers.com
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
Emmanuel Eniola Falade
 
It
ItIt
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015
MUHAMADKASSIMMUHAMAD1
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
University of Education
 
Information Technology
Information TechnologyInformation Technology
Information Technology
Divyank Jindal
 
Emerging trends in ict for secretaries
Emerging trends in ict for secretariesEmerging trends in ict for secretaries
Emerging trends in ict for secretaries
Tola Odugbesan
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
Nova Divine Dela Peña
 
Information technology
Information technologyInformation technology
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIESAN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
IAEME Publication
 
Introduction to Computer Fundamentals
Introduction to Computer FundamentalsIntroduction to Computer Fundamentals
Introduction to Computer Fundamentals
shivanichauhan1953
 
Computer Applications in Business
Computer Applications in BusinessComputer Applications in Business
Computer Applications in Business
Dr T.Sivakami
 
Introduction to computer and hardware software
Introduction to computer and hardware softwareIntroduction to computer and hardware software
Introduction to computer and hardware software
zdkhan187
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
Frankie Jones
 
information of system technology
information of system technologyinformation of system technology
information of system technology
bilal anjum
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf

Similar to Seminar Introduction Information Technology (20)

Information Technology
Information TechnologyInformation Technology
Information Technology
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
The best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docxThe best Definition of the IT updated 2023 document 5.docx
The best Definition of the IT updated 2023 document 5.docx
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
It
ItIt
It
 
information system security notes for bat04015
information system security notes for bat04015information system security notes for bat04015
information system security notes for bat04015
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Emerging trends in ict for secretaries
Emerging trends in ict for secretariesEmerging trends in ict for secretaries
Emerging trends in ict for secretaries
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Information technology
Information technologyInformation technology
Information technology
 
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIESAN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
AN INTRODUCTION TO DIGITAL TRANSFORMATION TECHNOLOGIES
 
Introduction to Computer Fundamentals
Introduction to Computer FundamentalsIntroduction to Computer Fundamentals
Introduction to Computer Fundamentals
 
Computer Applications in Business
Computer Applications in BusinessComputer Applications in Business
Computer Applications in Business
 
Introduction to computer and hardware software
Introduction to computer and hardware softwareIntroduction to computer and hardware software
Introduction to computer and hardware software
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Seminar Introduction Information Technology

  • 2. Schedule • Introduction • Presentation • Q & A • Video : Source :https://www.youtube.com/watch?v=mzy84Vb_Gxk&t=397s Egidio Magno
  • 3. We can only define Information Technology as “Whatever technology we use to get information is called information technology". Sometimes, the term IT is applied to computers and computer-based systems. But the root word for technology is "the means" for achieving goals. For example: - when using a matchbook it is a means of creating fire. Finally is the fire itself. - Bicycles are a means of transportation. The purpose of riding a bicycle is to reach the destination, and maybe also to get the training needed. As a result, when we talk about the use of technology, we must always remember that it is a means, Technology is the application of modern communication and computing technology for the creation, management , and use of knowledge. Information Technology means the use of hardware, software, services, and supporting infrastructure to manage and deliver information using voice, data and video. A. Definition Information Technology Egidio Magno
  • 4. B. What does Information Technology includes? Information technology includes: 1. All computers with a human interface. 2. All computer which will not operate unless connected to a computer or network. 3. All voice, video and data networks and the equipment, staff and purchased services necessary to operate them. 4. All salary and benefits for staff whose job descriptions specifically include technology functions, i.e network services, applications development, systems administration. 5. All technology services provided by vendors or contractors. 6. Operating costs associated with providing information technology. 7. All costs associated with developing, purchasing, licensing or maintaining software. Egidio Magno
  • 5. C. More Specifically Information Technology Information technology means : 1. Manage computer networks. 2. Create original web pages. 3. Producing videos digitally. 4. Designing a computer system as a consultant. 5. Vendors sell products on the internet. 6. Designing 3D artwork illustration . 7. Manage company database. 8. Coding software. 9. Provide technical support. 10. Manage projects and budgets. 11. Writing technical documentation. Egidio Magno
  • 6. D. Function of Information Technology In general there are six functions of IT , including as below: 1. Capture : The records of various activities. For example, accept input from the keyboard, scanner, mic, and others. 2. Processing :Process that received input data which is then converted into new information. This processing to conversion, analyzing, calculating, information as data. 3. Generating :IT will produce or organize information into useful forms. For example graphs, tables, calculations, and so forth. 4. Storing (Storage) : Information and data into a media which can then be used for other purposes. For example, data is stored on disk drives, CDs, and hard drives. 5. Looking Back (Retrival) : Able to find and trace information and data that has already been stored. For example, looking for client data that has not yet made a payment. 6. As Transmission :IT can send data and information from one location to another by utilizing a computer network. For example sending sales data to other teams in different locations. Egidio Magno
  • 7. E. Components of Information Technology In information technology activities there are 5 main components in it, namely: 1. Computer: A computer is an electronic system that can be programmed to receive data processing, store it for future use, and display data and information. 2. Hardware: The physical part of the computer such as a system unit etc. 3. Software: The logical part of a computer that tells the computer what to do. 4. Network Communication: this is the interconnection of various locations through media that allows people to send and receive information. Communication networks allow people and businesses to work together. This includes hardware, programs, and information. IT has become revolutionary through the use of communication networks. Information can be transferred from one place to another without difficulty and quickly. 5. knowledge is the ability to do right things. IT knowledge consists of: – Familiarity with information tools including the internet – Have the skills needed to use this tool – Understand the use of information technology to solve problems and create opportunities. Egidio Magno
  • 8. F. Information Technology Job Titles 1. Computer Network Specialist Computer network specialists and analysts define, design, build, and maintain a variety of data communication networks and systems. • Network Administrator • Network and Computer Systems Administrator • Senior Network Engineer • Telecommunications Specialist 2. Computer Support Specialist Computer support specialists and network administrators help computer users and organizations. Some of these workers support computer networks by testing and evaluating network systems and ensuring that the day-to-day operations work. Others provide customer service by helping people with their computer problems. - Help Desk Technician - IT Support Manager - Systems Administrator - Desktop Support Manager 3. Database Administrator Database administrators help store and organize data or companies and/or customers. They protect the data from unauthorized users. Some work for companies that provide computer design services. Others work for organizations with large database systems, such as educational institutions, financial firms, and more. • Data Center Support • Database Administrator Egidio Magno
  • 9. F1. Information Technology Job Titles 4. Information Security Specialist The increasing incidence of security breaches and dangers related to identity theft has increased the importance of protecting data on commercial and government sites. Information security analysts help maintain computer networks and organizational computer systems. • Information Security • Security Specialist 5. Web Developer Web developers design, create, and modify websites. They are responsible for maintaining a user-friendly, stable website that offers the necessary functionality for their client’s needs. Front End Developer • Back End Developer • Senior Web Administrator • Senior Web Developer • Web Administrator • Web Developer 6. Software/Application Developer Software developers design, run, and test various computer programs and applications. Application Developers create new applications and code solutions. • Application Developer  Software Engineer  Senior Programmer  Senior Systems Software Engineer  System ArchitectEgidio Magno
  • 10. Question and Answer ? Q & A Egidio Magno