This document provides an overview of the key topics and learning objectives covered in the chapter on computer hardware from the textbook "Introduction to Information Technology". The chapter outlines hardware components like the central processing unit, computer memory including primary and secondary storage, the evolution of computer hardware, the hierarchy of computer systems, and input/output technologies. It also discusses trends in hardware and strategic issues related to linking hardware design with business needs.
The document discusses computer hardware components and technologies. It covers the central processing unit, computer memory, the evolution of hardware from vacuum tubes to integrated circuits, the hierarchy of computer systems, input/output devices, and trends like improving cost-performance of chips and emerging technologies like sensor webs and nanotechnology. The objectives are to describe hardware components, memory types, hardware evolution, and strategic issues related to keeping up with advancing technologies.
The document discusses the hierarchy of computer systems from supercomputers to microcomputers. It explains that supercomputers are the most powerful for processing large datasets. Mainframes are less powerful than supercomputers and are used for applications like banking. Midrange computers include minicomputers and servers. Microcomputers range from desktop PCs to mobile devices. The CPU and computer memory are also described.
The document discusses the history and evolution of computer hardware from the first generation of vacuum tube computers to current generation computers using grand-scale integrated circuits. It describes the main components of computer hardware including the central processing unit, primary and secondary storage, and input/output devices. It also covers topics such as computer memory, microprocessors, and emerging technologies.
This document provides an overview of various data storage technologies and devices used in client-server systems, including magnetic disks, tapes, CD-ROMs, WORM disks, optical disks, RAID configurations, network protection devices, power protection devices, and remote system management. It describes the basic workings and purposes of these different components that are crucial for reliable data storage and system uptime in client-server computing environments.
This slide contains the basic and clear information about computers, its characteristics, uses & limitations etc.
You will get all The Basic information you should know about the Computer.
#WANTS Details Description In Hindi:
Watch On You Tube ► https://youtu.be/hCXpMiUL3PI
CONTACTS
# Email ID : jyotiranjan789zx@gmail.com
# Facebook : https://www.facebook.com/jyotiranjan.das.5623293
# Instagram : https://www.instagram.com/jyotiranjan.das.jrd/?hl=en
The document discusses a lecture on microprocessors. It describes the key components and subsystems of a microprocessor, including the bus interface unit, cache memory, instruction decoder, arithmetic logic unit, floating point unit, and control unit. It provides examples of early and modern microprocessors, such as the Intel 4004 and Pentium 4. It also covers topics like Moore's Law, instruction sets, word length, and clock frequency in relation to microprocessor evolution and capabilities. The next lecture will cover binary numbers, logic operations, and truth tables.
This document provides a history of computer systems from first to fourth generation computers. It describes the key characteristics of each generation including the technologies used for memory and processing. It then classifies different types of computer systems including supercomputers, mainframes, mini-computers, personal computers, and workstation computers. For each type, it outlines their typical uses, sizes, and other distinguishing features.
The document discusses the five generations of computers from the 1940s to present. Each generation is defined by major technological developments that made computers smaller, cheaper, more powerful, and efficient. First generation computers used vacuum tubes and were room-sized. The second generation saw the introduction of transistors, making computers smaller and more reliable. Integrated circuits defined the third generation, and the fourth generation was marked by microprocessors enabling portable personal computers. The fifth generation, still in development, focuses on artificial intelligence.
The document discusses computer hardware components and technologies. It covers the central processing unit, computer memory, the evolution of hardware from vacuum tubes to integrated circuits, the hierarchy of computer systems, input/output devices, and trends like improving cost-performance of chips and emerging technologies like sensor webs and nanotechnology. The objectives are to describe hardware components, memory types, hardware evolution, and strategic issues related to keeping up with advancing technologies.
The document discusses the hierarchy of computer systems from supercomputers to microcomputers. It explains that supercomputers are the most powerful for processing large datasets. Mainframes are less powerful than supercomputers and are used for applications like banking. Midrange computers include minicomputers and servers. Microcomputers range from desktop PCs to mobile devices. The CPU and computer memory are also described.
The document discusses the history and evolution of computer hardware from the first generation of vacuum tube computers to current generation computers using grand-scale integrated circuits. It describes the main components of computer hardware including the central processing unit, primary and secondary storage, and input/output devices. It also covers topics such as computer memory, microprocessors, and emerging technologies.
This document provides an overview of various data storage technologies and devices used in client-server systems, including magnetic disks, tapes, CD-ROMs, WORM disks, optical disks, RAID configurations, network protection devices, power protection devices, and remote system management. It describes the basic workings and purposes of these different components that are crucial for reliable data storage and system uptime in client-server computing environments.
This slide contains the basic and clear information about computers, its characteristics, uses & limitations etc.
You will get all The Basic information you should know about the Computer.
#WANTS Details Description In Hindi:
Watch On You Tube ► https://youtu.be/hCXpMiUL3PI
CONTACTS
# Email ID : jyotiranjan789zx@gmail.com
# Facebook : https://www.facebook.com/jyotiranjan.das.5623293
# Instagram : https://www.instagram.com/jyotiranjan.das.jrd/?hl=en
The document discusses a lecture on microprocessors. It describes the key components and subsystems of a microprocessor, including the bus interface unit, cache memory, instruction decoder, arithmetic logic unit, floating point unit, and control unit. It provides examples of early and modern microprocessors, such as the Intel 4004 and Pentium 4. It also covers topics like Moore's Law, instruction sets, word length, and clock frequency in relation to microprocessor evolution and capabilities. The next lecture will cover binary numbers, logic operations, and truth tables.
This document provides a history of computer systems from first to fourth generation computers. It describes the key characteristics of each generation including the technologies used for memory and processing. It then classifies different types of computer systems including supercomputers, mainframes, mini-computers, personal computers, and workstation computers. For each type, it outlines their typical uses, sizes, and other distinguishing features.
The document discusses the five generations of computers from the 1940s to present. Each generation is defined by major technological developments that made computers smaller, cheaper, more powerful, and efficient. First generation computers used vacuum tubes and were room-sized. The second generation saw the introduction of transistors, making computers smaller and more reliable. Integrated circuits defined the third generation, and the fourth generation was marked by microprocessors enabling portable personal computers. The fifth generation, still in development, focuses on artificial intelligence.
The document discusses different types of computer data storage technologies over generations. It describes how storage has evolved from vacuum tubes in the first generation to integrated circuits and microprocessors. It provides examples of permanent storage memories like hard drives, flash drives, CDs and defines magnetic disks used commonly in banking to store account information on magnetized mediums divided into tracks and sectors.
The document provides an overview of computer applications, including:
- A brief history of computers from the abacus to modern PCs.
- The four main components of a computer system: hardware, software, data, and users. Hardware includes the central processing unit and other internal/external components.
- Examples of different types of computers like desktops, laptops, and tablets. The document also discusses stand-alone vs. networked computers.
- Common computer applications like word processing, spreadsheets, graphics/presentations, and web browsers. It also introduces the Windows XP operating system and desktop interface.
This presentation discusses about the following topics:
Overview of Physical Storage Media
Magnetic Disks
RAID
Tertiary Storage
Storage Access
File Organization
Organization of Records in Files
Data-Dictionary Storage
The document discusses the typical components and configuration of a computer. It describes the central processing unit (CPU), primary memory, and input/output units. The CPU controls all computer activities and performs instructions stored in primary memory. Common input devices deal with original data like keyboards or previously stored data from storage drives. Output devices display or store the results of computations.
The document summarizes the key components and functions of a software development system. It describes how a microcomputer is used to develop software for a particular microprocessor. It includes a large read/write memory, disk storage, and a video terminal with keyboard to manage input/output, files, and programs through an operating system. Common components of software development systems are then outlined such as the keyboard, monitor, memory, disk controllers and drives for data storage and access.
This document provides an overview of computer hardware, software, organization and concepts. It defines a computer as a device that performs computations and logical decisions by processing data under instruction sets. Key components include the central processing unit (CPU), memory, storage, input/output devices, and software like operating systems and applications. Fundamental concepts discussed include Moore's Law, which predicts an exponential increase in component density, Von Neumann architecture, and how memory is organized into addressable cells.
This document provides an overview of a 6-hour lesson on fundamentals of information technology. The lesson covers introduction to computers and IT, computer designs, the system unit, storage, peripheral devices, emerging technologies, and implications of IT. Key topics include definitions of hardware and software, computer components, data storage methods, input/output devices, and social impacts of information technology. The goal is to introduce students to basic concepts of computers and information systems.
This document defines key terms related to computers and information technology. It defines terms such as application software, basic applications, communication devices, compact discs, computer competency, computer networks, connectivity, data, databases, device drivers, desktop computers, digital versatile discs, document file formats, end users, floppy disks, general purpose applications, handheld computers, hard disks, hardware, information, information systems, information technology, input devices, the Internet, keyboards, laptop computers, mainframe computers, memory, microcomputers, microprocessors, midrange computers, minicomputers, modems, monitors, networks, notebooks, operating systems, optical disks, output devices, Palm computers, people, personal digital assistants, presentations,
The document discusses the typical components of a computer, including the CPU, memory, and input/output devices. It describes the differences between primary and secondary memory, as well as different types of input devices like keyboards, mice, and scanners. It also covers output devices like monitors, printers, and optical disks. The document provides details on how information is moved and stored within a computer system using components like ribbon cables and bytes.
Lecture 1 - introduction to computer systems architecture 2018 / 2019Mousuf Zaman C
This document provides an introduction to computer systems architecture. It covers:
1) The history of computers from early mechanical devices to modern computers based on integrated circuits and semiconductors.
2) The basic hardware components of a computer including processors, memory, storage, input/output devices, and how they connect via motherboards.
3) The von Neumann model of computer architecture which forms the basis of modern computer design, including the control unit, ALU, registers, memory, and I/O.
The document provides an overview of hardware components including the central processing unit, primary and secondary storage, and input/output devices. It discusses how the CPU fetches and executes instructions in four steps and how pipelining can improve processing speed. The document also covers memory types, characteristics of processing and storage devices, and different computer system types.
The document discusses hardware components used in computer systems including input, processing, storage and output devices. It describes the functions of the central processing unit and memory for processing instructions and data. Secondary storage devices like magnetic tapes, disks and optical disks are described along with their access methods and storage capacities. A variety of input devices including keyboards, mice and scanners and output devices like monitors and printers are also summarized. Different types of computer systems are classified and factors for selecting and upgrading systems are outlined.
The document discusses a module on the evolution and types of computers. It covers five activities: 1) explaining the evolution of computer generations from vacuum tubes to integrated circuits; 2) matching processor types to generations; 3) introducing computer types like supercomputers, mainframes, and microcomputers; 4) labeling a diagram of computer types; and 5) researching computer types. The module aims to explain the evolution of computer generations and types of processors used.
Secondary storage devices are non-volatile memory that stores large amounts of data at lower costs than primary memory. There are two main types of secondary storage devices: sequential access devices like magnetic tapes that are very fast for sequential data but slow for random access, and direct access storage devices (DASDs) like hard disks that allow for high-capacity random access storage. Magnetic disks are the most widely used secondary storage, offering high storage capacity, reliability, and the ability to directly access stored data.
The document provides information about five group members working on a computer applications project. It then discusses various topics related to computers including bits, bytes, ASCII, file storage units, computer hardware components, input/output devices, storage devices, network topologies, and cable media types.
1. The document discusses the architecture of Intel Core i5 processors, including details about microarchitectures like Ivy Bridge, clock speeds, cache memory, and supported technologies like MMX and SSE.
2. Key specifications of the Intel Core i5-3210 processor are discussed, including that it has 2 cores, 4 logical processors, and supports 2 threads per core.
3. The document covers Flynn's taxonomy of processor classifications and explains the multiple instruction multiple data stream (MIMD) classification.
This document summarizes key concepts from Chapter 4 of the textbook "Introduction to Information Technology" by Turban, Rainer and Potter. It discusses network computing and how the internet enables discovery, communication and collaboration. Discovery involves accessing online information through browsing, searching and software agents. Communication can be asynchronous through email or synchronous via chat rooms or voice. Collaboration is supported by virtual teams and technologies that allow partners to work together remotely. Intranets and extranets also facilitate information sharing and partnerships within and between organizations.
This chapter discusses acquiring and implementing IT systems. It covers:
1) Planning and justifying systems by exploring needs, justifying costs/benefits, and creating an application portfolio.
2) Major acquisition options like buying off-the-shelf, leasing, in-house development, and outsourcing to application service providers.
3) Implementation issues like selecting vendors, integrating applications, and connecting to databases and networks.
This chapter discusses enterprise systems and supply chain management. It covers topics like enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM), and how information technology supports integrating activities along the supply chain. The chapter also addresses problems in managing supply chains like uncertainties and the bullwhip effect, and presents solutions like information sharing, vendor-managed inventory, and collaboration. It describes computerized systems that helped solve supply chain problems, like MRP, MRPII, and how ERP software integrates planning across the entire enterprise.
This document provides an overview of information technology and its role in business. It discusses how IT helps companies respond to various pressures and gain competitive advantages. Specifically, it describes how IT supports organizational responses to market pressures like competition, technology pressures like innovation, and societal pressures like regulations. It also defines strategic information systems and competitive advantage, and introduces Porter's five forces model for analyzing competitiveness.
This chapter discusses e-business and e-commerce. It defines electronic commerce and e-business, and describes different types of e-commerce transactions including business-to-business, business-to-consumer, and consumer-to-consumer. It also outlines major e-commerce applications such as e-tailing, online advertising, and e-government. Additionally, it covers e-commerce support services including electronic payments and logistics, as well as security and legal issues related to e-commerce.
This chapter discusses data and knowledge management. It covers topics like data warehousing, business intelligence, data mining, data visualization technologies, and knowledge management. The key points are:
1) Data management is critical for IT applications but difficult due to increasing data volumes, scattered sources, and quality/integrity issues.
2) A data warehouse contains subject-oriented historical data from multiple sources organized for analysis. It aids decision making through queries, reports, analytics and mining.
3) Business intelligence uses tools like querying, reporting, analytics, mining and forecasting to extract knowledge and support decisions from corporate data.
4) Data visualization technologies include GIS, simulations, virtual reality and multimedia to present data visually
The document discusses different types of computer data storage technologies over generations. It describes how storage has evolved from vacuum tubes in the first generation to integrated circuits and microprocessors. It provides examples of permanent storage memories like hard drives, flash drives, CDs and defines magnetic disks used commonly in banking to store account information on magnetized mediums divided into tracks and sectors.
The document provides an overview of computer applications, including:
- A brief history of computers from the abacus to modern PCs.
- The four main components of a computer system: hardware, software, data, and users. Hardware includes the central processing unit and other internal/external components.
- Examples of different types of computers like desktops, laptops, and tablets. The document also discusses stand-alone vs. networked computers.
- Common computer applications like word processing, spreadsheets, graphics/presentations, and web browsers. It also introduces the Windows XP operating system and desktop interface.
This presentation discusses about the following topics:
Overview of Physical Storage Media
Magnetic Disks
RAID
Tertiary Storage
Storage Access
File Organization
Organization of Records in Files
Data-Dictionary Storage
The document discusses the typical components and configuration of a computer. It describes the central processing unit (CPU), primary memory, and input/output units. The CPU controls all computer activities and performs instructions stored in primary memory. Common input devices deal with original data like keyboards or previously stored data from storage drives. Output devices display or store the results of computations.
The document summarizes the key components and functions of a software development system. It describes how a microcomputer is used to develop software for a particular microprocessor. It includes a large read/write memory, disk storage, and a video terminal with keyboard to manage input/output, files, and programs through an operating system. Common components of software development systems are then outlined such as the keyboard, monitor, memory, disk controllers and drives for data storage and access.
This document provides an overview of computer hardware, software, organization and concepts. It defines a computer as a device that performs computations and logical decisions by processing data under instruction sets. Key components include the central processing unit (CPU), memory, storage, input/output devices, and software like operating systems and applications. Fundamental concepts discussed include Moore's Law, which predicts an exponential increase in component density, Von Neumann architecture, and how memory is organized into addressable cells.
This document provides an overview of a 6-hour lesson on fundamentals of information technology. The lesson covers introduction to computers and IT, computer designs, the system unit, storage, peripheral devices, emerging technologies, and implications of IT. Key topics include definitions of hardware and software, computer components, data storage methods, input/output devices, and social impacts of information technology. The goal is to introduce students to basic concepts of computers and information systems.
This document defines key terms related to computers and information technology. It defines terms such as application software, basic applications, communication devices, compact discs, computer competency, computer networks, connectivity, data, databases, device drivers, desktop computers, digital versatile discs, document file formats, end users, floppy disks, general purpose applications, handheld computers, hard disks, hardware, information, information systems, information technology, input devices, the Internet, keyboards, laptop computers, mainframe computers, memory, microcomputers, microprocessors, midrange computers, minicomputers, modems, monitors, networks, notebooks, operating systems, optical disks, output devices, Palm computers, people, personal digital assistants, presentations,
The document discusses the typical components of a computer, including the CPU, memory, and input/output devices. It describes the differences between primary and secondary memory, as well as different types of input devices like keyboards, mice, and scanners. It also covers output devices like monitors, printers, and optical disks. The document provides details on how information is moved and stored within a computer system using components like ribbon cables and bytes.
Lecture 1 - introduction to computer systems architecture 2018 / 2019Mousuf Zaman C
This document provides an introduction to computer systems architecture. It covers:
1) The history of computers from early mechanical devices to modern computers based on integrated circuits and semiconductors.
2) The basic hardware components of a computer including processors, memory, storage, input/output devices, and how they connect via motherboards.
3) The von Neumann model of computer architecture which forms the basis of modern computer design, including the control unit, ALU, registers, memory, and I/O.
The document provides an overview of hardware components including the central processing unit, primary and secondary storage, and input/output devices. It discusses how the CPU fetches and executes instructions in four steps and how pipelining can improve processing speed. The document also covers memory types, characteristics of processing and storage devices, and different computer system types.
The document discusses hardware components used in computer systems including input, processing, storage and output devices. It describes the functions of the central processing unit and memory for processing instructions and data. Secondary storage devices like magnetic tapes, disks and optical disks are described along with their access methods and storage capacities. A variety of input devices including keyboards, mice and scanners and output devices like monitors and printers are also summarized. Different types of computer systems are classified and factors for selecting and upgrading systems are outlined.
The document discusses a module on the evolution and types of computers. It covers five activities: 1) explaining the evolution of computer generations from vacuum tubes to integrated circuits; 2) matching processor types to generations; 3) introducing computer types like supercomputers, mainframes, and microcomputers; 4) labeling a diagram of computer types; and 5) researching computer types. The module aims to explain the evolution of computer generations and types of processors used.
Secondary storage devices are non-volatile memory that stores large amounts of data at lower costs than primary memory. There are two main types of secondary storage devices: sequential access devices like magnetic tapes that are very fast for sequential data but slow for random access, and direct access storage devices (DASDs) like hard disks that allow for high-capacity random access storage. Magnetic disks are the most widely used secondary storage, offering high storage capacity, reliability, and the ability to directly access stored data.
The document provides information about five group members working on a computer applications project. It then discusses various topics related to computers including bits, bytes, ASCII, file storage units, computer hardware components, input/output devices, storage devices, network topologies, and cable media types.
1. The document discusses the architecture of Intel Core i5 processors, including details about microarchitectures like Ivy Bridge, clock speeds, cache memory, and supported technologies like MMX and SSE.
2. Key specifications of the Intel Core i5-3210 processor are discussed, including that it has 2 cores, 4 logical processors, and supports 2 threads per core.
3. The document covers Flynn's taxonomy of processor classifications and explains the multiple instruction multiple data stream (MIMD) classification.
This document summarizes key concepts from Chapter 4 of the textbook "Introduction to Information Technology" by Turban, Rainer and Potter. It discusses network computing and how the internet enables discovery, communication and collaboration. Discovery involves accessing online information through browsing, searching and software agents. Communication can be asynchronous through email or synchronous via chat rooms or voice. Collaboration is supported by virtual teams and technologies that allow partners to work together remotely. Intranets and extranets also facilitate information sharing and partnerships within and between organizations.
This chapter discusses acquiring and implementing IT systems. It covers:
1) Planning and justifying systems by exploring needs, justifying costs/benefits, and creating an application portfolio.
2) Major acquisition options like buying off-the-shelf, leasing, in-house development, and outsourcing to application service providers.
3) Implementation issues like selecting vendors, integrating applications, and connecting to databases and networks.
This chapter discusses enterprise systems and supply chain management. It covers topics like enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM), and how information technology supports integrating activities along the supply chain. The chapter also addresses problems in managing supply chains like uncertainties and the bullwhip effect, and presents solutions like information sharing, vendor-managed inventory, and collaboration. It describes computerized systems that helped solve supply chain problems, like MRP, MRPII, and how ERP software integrates planning across the entire enterprise.
This document provides an overview of information technology and its role in business. It discusses how IT helps companies respond to various pressures and gain competitive advantages. Specifically, it describes how IT supports organizational responses to market pressures like competition, technology pressures like innovation, and societal pressures like regulations. It also defines strategic information systems and competitive advantage, and introduces Porter's five forces model for analyzing competitiveness.
This chapter discusses e-business and e-commerce. It defines electronic commerce and e-business, and describes different types of e-commerce transactions including business-to-business, business-to-consumer, and consumer-to-consumer. It also outlines major e-commerce applications such as e-tailing, online advertising, and e-government. Additionally, it covers e-commerce support services including electronic payments and logistics, as well as security and legal issues related to e-commerce.
This chapter discusses data and knowledge management. It covers topics like data warehousing, business intelligence, data mining, data visualization technologies, and knowledge management. The key points are:
1) Data management is critical for IT applications but difficult due to increasing data volumes, scattered sources, and quality/integrity issues.
2) A data warehouse contains subject-oriented historical data from multiple sources organized for analysis. It aids decision making through queries, reports, analytics and mining.
3) Business intelligence uses tools like querying, reporting, analytics, mining and forecasting to extract knowledge and support decisions from corporate data.
4) Data visualization technologies include GIS, simulations, virtual reality and multimedia to present data visually
This document summarizes Chapter 7 from the textbook "Introduction to Information Technology" by Turban, Rainer and Potter. The chapter discusses functional information systems including transaction processing systems, management information systems, and how information technology supports accounting, finance, marketing, sales, production, operations and logistics functions. It also covers integrating these functional information systems and managing the flow of information between the different functions.
This chapter discusses interorganizational and global information systems. It defines interorganizational systems as those that support information flow between two or more organizations. It also discusses how global information systems connect companies across borders and some of the issues in designing them, such as cultural and legal differences. The chapter then covers specific topics like business-to-business exchanges, electronic data interchange, extranets, and implementation challenges for interorganizational systems.
This chapter discusses mobile, wireless, and pervasive computing. It covers topics such as mobile computing and commerce, wireless local area networks, mobile applications in areas like financial services and shopping, location-based computing, and pervasive computing. The chapter aims to describe the characteristics, benefits, and uses of these technologies, as well as discuss inhibitors and barriers to their adoption. It is based on a textbook chapter on this subject and is intended to provide an overview and outline of the key concepts and sections covered.
This document summarizes Chapter 10 from the textbook "Introduction to Information Technology" by Turban, Rainer and Potter. The chapter discusses managerial support systems, including decision support systems, executive support systems, and intelligent systems like expert systems and artificial neural networks. It describes how these systems can help managers with decision making, capturing expertise, and analyzing large amounts of data.
This chapter discusses ethical issues related to information technology, the impacts of IT on organizations and individuals, societal effects, security risks and computer crimes, and methods for protecting information resources. It covers topics such as privacy, intellectual property, how IT affects job content and organizational structure, the digital divide, and security measures like controls, backups, and disaster recovery planning. The learning objectives are to understand these various topics related to IT ethics, impacts, security, and methods for protecting information.
This chapter discusses data and knowledge management. It covers topics such as data warehousing, business intelligence, data mining, knowledge management, and how various technologies can be used to manage data and knowledge. The key points are:
- Data management is critical for IT applications and involves issues around data quality, collection, analysis, and security.
- Data warehousing involves collecting and organizing data from various sources to support analysis and decision-making.
- Business intelligence uses tools like reporting, data mining and analytics to discover patterns and insights from data.
- Knowledge management aims to identify, share and apply knowledge within an organization using technologies like collaboration tools, knowledge repositories and artificial intelligence.
This chapter discusses managing organizational data and information. It covers the traditional file environment and its problems, how databases provide a modern approach, database management systems, and logical data models including hierarchical, network and relational models. The key topics are data arrangement, traditional file problems like redundancy and inconsistency, how databases solve these with concepts like entities and relationships, data definition and manipulation languages, and the advantages of relational modeling.
This document is the first chapter of a textbook on information technology. It introduces key concepts of the digital economy including e-business, networked computing, and information systems. It describes business pressures from markets, technology, and society that organizations face and how they respond through strategies like customer relationship management, build-to-order production, and virtual corporations. These responses are supported by information technology. The chapter also covers competitive advantage, strategic information systems, and Porter's five forces model for analyzing competitiveness.
This chapter discusses information systems concepts and the evolution of information technology. It describes how information systems have developed from early transaction processing systems to today's enterprise systems and knowledge management tools. The chapter also outlines different ways of classifying information systems, such as by organizational level or breadth of support. It explains key computing environment models including legacy systems, client/server architecture, and distributed computing. The chapter provides an overview of information systems concepts and issues to help readers understand the role of IT in organizations.
This document is the first chapter of a textbook on information technology. It introduces key concepts of the digital economy including e-business, networked computing, and information systems. It describes business pressures from markets, technology, and society that organizations face and how they respond through strategies like customer relationship management, build-to-order production, and virtual corporations. These responses are supported by information technology. The chapter also covers competitive advantage, strategic information systems, and Porter's five forces model for analyzing competitiveness.
The document discusses electronic commerce and its applications. It describes how Intel Corporation embraced electronic commerce to enhance customer service and internal business processes. It defines different types of electronic commerce like business-to-business and business-to-consumer. It also discusses the benefits of electronic commerce to organizations, consumers and society. Finally, it describes some technical and non-technical limitations of electronic commerce.
The document outlines a technology guide that discusses the major components of computer hardware, including the central processing unit, memory, storage, input/output devices, and trends in hardware technology. It provides learning objectives about identifying hardware components, describing how CPUs and memory work, differentiating storage types, and discussing strategic issues related to hardware design and business needs. General concepts, technologies, and trends in computer hardware are examined.
The document provides an introduction to computers including definitions of key components and concepts. It describes what a computer is and its basic functions of input, storage, processing, and output. The main hardware components are explained as the central processing unit (CPU), memory (RAM and ROM), and input/output devices. Software is distinguished as system software that controls the computer and application software for specific tasks. Various types of computers are classified by size, power, and use. The document also defines important concepts such as data, information, and knowledge and how they relate. Characteristics of computers like speed, accuracy, and storage capability are outlined. Common threats like computer viruses, email viruses, Trojan horses and worms are defined along with tips
The document discusses the evolution of computers from mechanical calculators to modern devices. It covers the development of early computers using vacuum tubes and transistors, as well as the advent of integrated circuits, microprocessors, and microcontrollers. Computers are also classified according to attributes like price and performance, as well as by usage in embedded systems, personal computers, workstations, servers, mainframes, and supercomputers.
This document provides an overview of information technology concepts. It begins by outlining the learning outcomes, which are to understand basic computer operations, memory, storage, information systems terminology, and more. It then introduces computers and their widespread use before defining a computer as a programmable machine that processes data. The document describes different types of computers and their uses. It also explains concepts like data representation, the four basic computer operations of input, processing, storage, and output. Finally, it discusses system units, information systems and their elements, and storage technologies like RAM, hard disks, and solid state drives.
A computer is an electronic device that can accept data as input, process the data according to instructions, produce output, and store information for future use. It carries out five main functions: taking input, storing data and instructions, processing data, generating output, and controlling the other functions. The two main components of a computer are hardware, the physical machinery, and software, which are programs and instructions. Hardware includes the central processing unit (CPU), memory, storage devices, input devices like keyboards and mice, and output devices like monitors and printers. The CPU contains the arithmetic logic unit, control unit, and registers. Primary memory is RAM and ROM, while secondary storage includes hard disks, optical disks, and flash drives. Comp
The document provides an introduction to computers and their basic components. It defines a computer as an electronic device that can accept data as input, process it, produce output, and store information. The main components of a computer are the hardware (physical parts), software (programs and instructions), CPU (central processing unit), memory (primary and secondary storage), and input/output devices. It describes the functions of these core components and provides examples of common hardware and software.
This document discusses the evolution of computer hardware through four generations from 1951 to present. It describes the key components of computer systems including the central processing unit, primary and secondary storage, and input/output devices. The CPU contains the arithmetic logic unit, control unit, and primary storage. Secondary storage devices like magnetic tapes, disks, and optical disks are used to store large amounts of data externally.
A basic handout of a computer system provides operating system overview, hardware operations and basic functions of a computer system as a comprehensive entity.
The document provides an overview of computer organization and architecture. It discusses the basic structure of computers including functional units like the CPU, memory, I/O devices, and buses. It covers topics like data and instruction representation, memory operations, interrupts, and bus structures. The document also provides a brief history of computer development from mechanical calculators to modern integrated circuit computers. It defines key concepts like software, system software, and discusses the role of the control unit in coordinating functional units.
Microprocessors are electronic circuits that function as the central processing unit (CPU) of computers and other electronic devices. They incorporate arithmetic, logic, and control circuitry to perform computational tasks. Early microprocessors from the 1970s contained only a few thousand transistors, while modern microprocessors can contain over a billion transistors. Microprocessors are manufactured using complex semiconductor fabrication techniques involving deposition and etching of thin layers to build up the transistor circuits. They are key components that power all modern computers and many other electronic devices.
This document provides an overview of computer organization and architecture. It discusses the basic structure of computers including functional units like the CPU, memory, I/O, and how they are connected via a bus. The document then covers basic operational concepts such as registers, buses, and the cache memory hierarchy. A brief history of computer development from mechanical to modern integrated circuit computers is also presented.
This document provides an overview of computer hardware and software components. It discusses the basic definition of a computer and its components including the CPU, memory, storage, input/output devices, and networks. It also covers operating systems, application software, and basic computer functions like file management and email. The document is intended as an introductory information resource for computer users and management.
The microprocessor is the central processing unit of computers and electronic devices. Early microprocessors included 4-bit and 8-bit processors developed by Intel in the 1970s. Major developments included 16-bit processors like the Intel 8086 and 32-bit processors like the Intel 80386. Modern 64-bit processors include Intel Core i7 and i5. Microprocessors use a central processing unit, memory, and input/output systems to process instructions and data. Microcontrollers integrate a microprocessor with additional components like memory and input/output ports onto a single chip, making them useful for embedded applications.
This document provides an introduction to computers, including their components, functions, and types. It discusses hardware such as the CPU, memory (both primary and secondary), input/output devices, and storage. It also covers software types including system software, utility software, and application software. Finally, it briefly outlines computer generations and types including desktops, laptops, and embedded systems.
The document provides an overview of microprocessors and microcontrollers. It discusses the history of microprocessors from early 4-bit processors to modern 64-bit processors. A microprocessor contains a central processing unit while a microcontroller contains additional components like memory and input/output interfaces integrated into a single chip. Microcontrollers require less external hardware than microprocessors. The document describes the basic architecture of microprocessors and microcontrollers including components like registers, buses, and memory. It compares the von Neumann and Harvard architectures. Interrupts and memory-mapped I/O are also discussed.
C language computer introduction to the computer hardwareNIKHIL KRISHNA
This document provides an overview of computer hardware, software, organization and concepts. It defines a computer as a device that performs computations and logical decisions by processing data under instruction sets. Key components include the central processing unit (CPU), memory, storage, input/output devices, and software like operating systems and applications. Fundamental concepts discussed include Moore's Law, which predicts an exponential increase in component density, Von Neumann architecture, and how memory is organized into addressable cells.
This document provides an overview of computer hardware, software, organization and concepts. It discusses that a computer is a device that can perform computations and logical decisions by processing data under instruction from computer programs. It then describes the typical hardware components of a computer and trends in increasing memory and processor speeds over time according to Moore's Law. The document also summarizes computer software including operating systems and applications, and explains the typical organization of a computer including input/output, memory, arithmetic logic unit, control unit and secondary storage.
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
3. Chapter Outline
Introduction
The Central Processing Unit
Computer Memory
Evolution of Computer Hardware
Computer Hierarchy
Input and Output Technologies
General Technological Trends
Strategic Hardware Issues
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 3
4. Learning Objectives
Identify the major hardware components of a
computer system.
Describe the design and functioning of the central
processing unit.
Discuss the relationships between microprocessor
component designs and performance.
Describe the main types of primary and secondary
storage.
Distinguish between primary and secondary
storage along the dimensions of speed, cost and
capacity.
Define enterprise storage and describe the various
types of enterprise storage.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 4
5. Learning Objectives cont…
Describe the evolution of computer hardware.
Describe the hierarchy of computers
according to power and their respective roles.
Differentiate the various types of input and
output technologies and their uses.
Describe what multimedia systems are and
what technologies they use.
Discuss the general trends in hardware
technology.
Discuss strategic issues that link hardware
design to business strategy.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 5
6. TG1.1 INTRODUCTION
Decisions about hardware focus on three
interrelated factors:
capability (power and appropriateness for
the task),
speed, and
cost.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 6
7. Introduction cont…
Hardware refers to the physical equipment used for
the input, processing, output, and storage activities of
a computer system. It consists of the following:
Central processing unit (CPU)
Primary storage
Secondary storage
Input technologies
Output technologies
Communication technologies
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 7
8. TG1.2 THE CENTRAL PROCESSING UNIT
The central processing unit (CPU): performs the
actual computation or “number crunching” inside
any computer. The CPU is a microprocessor made
up of millions of microscopic transistors embedded
in a circuit on a silicon wafer or chip.
Control unit: Portion of the CPU that controls the
flow of information.
Arithmetic-logic unit (ALU): Portion of the CPU that
performs the mathematic calculations and makes
logical comparisons.
Registers: High-speed storage areas in the CPU
that store very small amounts of data and
instructions for short periods of time.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 8
9. Parts of a microprocessor
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 9
10. CPU cont…
Machine instruction cycle: The cycle of computer
processing, whose speed is measured in terms of
the number of instructions a chip processes per
second.
Clock speed: The preset speed of the computer
clock that times all chip activities, measured in
megahertz and gigahertz.
Word length: The number of bits (0s and 1s) that
can be processed by the CPU at any one time.
Bus width: The size of the physical paths down
which the data and instructions travel as electrical
impulses on a computer chip.
Line width: The distance between transistors; the
smaller the line width, the faster the chip.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 10
11. Moore’s Law
microprocessor complexity would double every two
years as a result of the following changes:
Increasing miniaturization of transistors.
Making the physical layout of the chip’s components as
compact and efficient as possible.
Using materials for the chip that improve the
conductivity (flow) of electricity.
Targeting the amount of basic instructions programmed
into the chip.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 11
12. Microcontrollers
Computer chips, embedded in products and
technologies, that usually cost less and work
in less-demanding applications than
microprocessors.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 12
13. T G1.3 COMPUTER MEMORY
Two basic categories of computer
memory: Primary storage, and secondary
storage.
Bit: Short for binary digit (0s and 1s), the
only data that a CPU can process.
Byte: An 8-bit string of data, needed to
represent any one alphanumeric
character or simple mathematical
operation.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 13
14. Memory Capacity
Kilobyte (KB): approximately one thousand
bytes.
Megabyte (MB): approximately one million
bytes (1,048,576 bytes, or 1,024 x 1,024).
Gigabyte (GB): actually 1,073,741,824 bytes
(1,024 x 1,024 x 1,024 bytes)
Terabyte: One trillion bytes
Petabyte: Approximately 1015 bytes.
Exabyte: Approximately 1018 bytes.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 14
15. Type of primary storage:
Registers: registers are part of the CPU with the
least capacity, storing extremely limited amounts of
instructions and data only immediately before and
after processing.
Random access memory (RAM): The part of
primary storage that holds a software program and
small amounts of data when they are brought from
secondary storage.
Cache memory: A type of primary storage
where the computer can temporarily store
blocks of data used more often
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 15
16. Types of primary storage cont…
Read-only memory (ROM): Type of primary
storage where certain critical instructions are
safeguarded; the storage is nonvolatile and
retains the instructions when the power to the
computer is turned off.
Flash memory: A form of rewritable read-only
memory that is compact, portable, and
requires little energy.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 16
17. Secondary Storage
Memory capacity that can store very large
amounts of data for extended periods of time.
It is nonvolatile.
It takes much more time to retrieve data
because of the electromechanical nature.
It is cheaper than primary storage.
It can take place on a variety of media
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 17
18. Magnetic tape: A secondary storage medium
on a large open reel or in a smaller cartridge
or cassette.
Sequential access: Data access in which the
computer system must run through data in
sequence in order to locate a particular piece.
Magnetic disks: A form of secondary storage
on a magnetized disk divided into tracks and
sectors that provide addresses for various
pieces of data; also called hard disks.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 18
19. Hard drives: A form of secondary storage that stores
data on platters divided into concentric tracks and
sectors, which can be read by a read/write head that
pivots across the rotating disks.
Direct access: Data access in which any piece of data be
retrieved in a nonsequential manner by locating it using
the data’s address.
Magnetic diskettes: A form of easily portable secondary
storage on flexible Mylar disks; also called floppy disks.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 19
20. Optical storage devices: A form of secondary
storage in which a laser reads the surface of a
reflective plastic platter.
Compact disk, read-only memory (CD-ROM): A
form of secondary storage that can be only read
and not written on.
Digital video disk (DVD): An optical storage
device used to store digital video or computer
data.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 20
21. Fluorescent multilayer disk (FMD-ROM): An
optical storage device with much greater
storage capacity than DVDs.
Memory cards: Credit-card-size storage
devices that can be installed in an adapter or
slot in many personal computers.
Expandable storage devices: Removable
disk cartridges, used as backup storage for
internal hard drives of PCs.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 21
22. Enterprise storage system: An
independent, external system with
intelligence that includes two or more
storage devices.
Redundant arrays of independent
disks (RAID): An enterprise storage
system that links groups of standard
hard drives to a specialized
microcontroller that coordinates the
drives so they appear as a single
logical drive.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 22
23. storage area network (SAN): An
enterprise storage system architecture
for building special, dedicated networks
that allow rapid and reliable access to
storage devices by multiple servers.
storage over IP: Technology that uses
the Internet Protocol to transport stored
data between devices within a SAN;
sometimes called IP over SCSI or
iSCSI.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 23
24. TG1.4 EVOLUTION OF COMPUTER HARDWARE
The first generation of computers, from
1946 to about 1956, used vacuum
tubes to store and process information.
The second generation of computers,
from 1957 to 1963, used transistors for
storing and processing information.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 24
25. EVOLUTION OF COMPUTER HARDWARE
CONT…
Third-generation computers, from 1964
to 1979, used integrated circuits for
storing and processing information.
Early to middle fourth-generation
computers, from 1980 to 1995, used
very-large-scale integrated (VLSI)
circuits to store and process information
Late fourth-generation computers, from
1996 to the present, use grand-scale
integrated (GSI) circuits to store and
process information.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 25
27. TG 1.6 INPUT AND OUTPUT TECHNOLOGIES
Input technologies allow people and other
technologies to put data into a computer. The
two main types of input devices are:
human data-entry devices and
source-data automation devices.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 27
28. Software selection factors
Input Device Description
Human Data-Entry Devices
Keyboards Most common input device (for text and numerical data).
Mouse Handheld device used to point cursor at point on screen, such as an icon; user clicks button on mouse instructing computer to take some action.
Optical mouse Mouse is not connected to computer by a cable; mouse uses camera chip to take images of surface it passes over, comparing successive images to determine its position.
Trackball User rotates a ball built into top of device to move cursor (rather than moving entire device such as a mouse).
Touchpad User moves cursor by sliding finger across a sensitized pad and then can tap pad when cursor is in desired position to instruct computer to take action (also called glide-and-tap pad).
Joystick Joy stick moves cursor to desired place on screen; commonly used in workstations that display dynamic graphics and in video games.
Touchscreen Users instruct computer to take some action by touching a particular part of the screen; commonly used in information kiosks such as ATM machines.
Stylus Pen-style device that allows user either to touch parts of a predetermined menu of options or to handwrite information into the computer (as with some PDAs); works with touchsensitive
screens.
Voice-recognition Converts voice wave sounds into digital input for computer; critical technology for
physically challenged people who cannot use other input devices.
Source-Data Automation Input
Device
Automated teller machines Interactive devices that enable people to make bank transactions from remote locations.
Point-of-sale terminals Computerized cash registers that also may incorporate touch screen technology and
barcode scanners (see below) to input data such as item sold, price, etc.
Barcode scanners Devices scan black-and-white barcode lines printed on merchandise labels.
Optical mark reader Scanner for detecting presence of dark marks on predetermined grid, such as multiplechoice test answer sheets.
Magnetic ink character reader Read magnetic ink printed on checks which identify the bank, checking account, and check number.
Optical character recognition Software that converts text into digital form for input into computer.
Sensors Collect data directly from the environment and input data directly into computer;
Cameras Digital cameras capture images and convert them into digital files
Retinal scanning displays Projects an image, pixel by pixel, directly onto a viewer’s retina; used with mobile devices;
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 28
29. Software selection factors
output Device Description
Monitors
Cathode ray tubes Video screens on which an electron beam illuminates pixels on display screen.
Liquid crystal
display (LCDs)
Flat displays that have liquid crystals between two polarizers to form characters and images on a backlit screen.
Organic light-emitting
Displays that are brighter, thinner, lighter, cheaper, faster diodes (OLEDs), and take less power to run than LCDs.
Retinal scanning
displays
Project image directly onto a viewer’s retina; used in medicine, air traffic control, and controlling industrial machines.
Printers
Impact Slow, noisy, subject to mechanical failure, but inexpensive.
Nonimpact:
Laser Use laser beams to write information on photosensitive drums; produce high-resolution text and graphics.
Inkjet Shoot fine streams of colored ink onto paper; less expensive than laser printers, but offer less resolution quality.
Plotters Use computer-directed pens for creating high-quality images, blueprints, schematics, drawing of new products, etc.
Voice Output Converts digital data to intelligible speech.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 29
30. TG1.7 GENERAL TECHNOLOGICAL
TRENDS
Cost-Performance Ratio of Chips:
Improvement by a Factor of At Least 100
Storage
Self-Healing Computers
Sensor Webs
Nanotechnology
Quantum Computing
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 30
31. Sensor Webs: A group of pods (small metal
boxes) set up to collect various kinds of
information, communicate with nearby pods,
and in some cases, communicate wirelessly
with outside devices.
Nanotechnology: The creation of materials,
devices, and systems at a scale of 1 to 100
nanometres (billionths of a meter).
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 31
32. TG1.8 STRATEGIC HARDWARE ISSUES
How do organizations keep up with the
rapid price/performance advancements in
hardware?
Portable computers and advanced
communications technologies (discussed in
Technology Guide 3) have enabled
employees to work from home or from
anywhere.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 32
33. All rights reserved. Reproduction or translation of this
work beyond that permitted in section 117 of the United
States Copyright Act without express permission of the
copyright owner is unlawful. Request for information
should be addressed to the permission department, John
Wiley & Sons, Inc. The purchaser may make back-up
copies for his/her own use only and not for distribution or
resale. The publisher assumes no responsibility for error,
omissions, or damages caused by the use of these
programs or from the use of the information herein.
“ Copyright 2005 John Wiley & Sons Inc.” TG 1 33