Basics of Information Technology PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document provides a basic introduction to information technology (IT). It covers fundamental concepts such as data and information, and various components of a computer system. It also introduces fundamental knowledge related to IT, which can be valuable for various information technology related courses.
Full Transcript
1 Basics of Information Technology 1 Let us Learn is the foundation of economy and a driving force of social changes in the 21st Definition of IT and ICT...
1 Basics of Information Technology 1 Let us Learn is the foundation of economy and a driving force of social changes in the 21st Definition of IT and ICT century. Distance is no longer an issue To understand concepts like data when it comes to accessing information; and information. for example, work-from-home, distance Various concepts used under IT learning, e-banking, and e-governance Different types of Operating are now possible from any place with Systems with its features and uses an internet connection and a computing Architecture of Computer System device. Lets first perceive two important concepts - Data and Information : Units of Memory Concepts related to Internet and 1.2 Data and Information Network with its types It is being said that the terms "data" Recent trends, IT Enabled Services and "information" are interchangeable and careers in IT and mean the same thing. However, they are not same and there is a difference 1.1 An introduction to IT between the two words. Data can be any (Information Technology) character, text, word, number or raw facts. Information Technology has great However, Information is data formatted influence on all aspects of life. Almost in a manner that allows it to be utilized by all work places and living environments human beings in some significant way. In are being computerized and the use of Information Technology is being Example of Data : enhanced. Umbar, 1234, Xyz, MG Road, Calcutta, 9111111111, 84084 Definition of Information Technology : Example of Information : “IT (Information Technology) Xyz, 1234, MG Road, Umbar 84084, encompasses all of the technologies that Calcutta, 9111111111 we use in order to create, collect, process, protect and store information. It refers to the above example, the data appears to hardware, software (computer programs), be a set of random words and numbers. and computer networks”. However, when that data is interpreted, ICT (Information and Communication organized and formatted, one can tell Technology) concept involves transfer that it is contact information of a person and use of all kinds of information. ICT named as XYZ. 1 Need of information : Information is Computer System : required to take short term and long term A computer can process data, images, decisions and also to make strategic audio, video and graphics. A computer decisions in an organization. Since we performs five major computer operations live in the “Information age”, Information or functions irrespective of their size and Technology has become a part of our make. These are - everyday life. 1) It accepts data or instructions by way of input. 1.3 Various concepts used under IT 2) It stores data. Before getting started let us learn 3) It can process data as required by the some of the important concepts used user. under Information Technology : 4) It gives results in the form of output. 1.3.1 Computer : The word Computer is 5) It controls all operations inside a derived from a Latin word “computare” computer. which means to “to calculate”, “to count”, 1.3.2 Architecture of Computer : “to sum up” or “to think together”. An Computer Architecture is a specification electronic device which accepts input detailing of how a set of software and from the user, processes it according to hardware technology standards interact the instructions given to it and gives the to form a computer system. In short, com- required result in the form of output, is a puter architecture refers to how a comput- computer. er system is designed and how it works. SYSTEM UNIT MONITOR The case that contains the CPU, CD/DVD/DRIVE An output device memory, the power supply, disck that lets you see Reads CD/DVD drives, and all other hardware-such as your work as you go. discs. a modem that are in an interal format. PRINTER Produces printed copies SPEAKERS of computer output. Used to produce audio output MICROPHONE HARD DRIVE Used to get Located inside the system spoken input. unit and used to store programe and data. USB FLASH MEMORY PORT CARD READER Used to read flash KEYBOARD memory card. CD/DVD DISCS MOUSE WEB CAMERA The principal input device; Commonly used to deliver A pointing device use to captures either still used to type instructions programs ans store large used to make on- picture or motion video into the computer. multimedia files. screen selections. Fig : 1 Computer System and Peripherals 2 Every computer system has the following Another example of input devices three basic components : is touch-screens. Users can simply 1. Input Unit touch these screens without using any 2. Central Processing Unit other device to enter commands. From 3. Output Unit smartphones to ATM machines, these input devices are becoming very popular 1. Input Unit : This unit helps users to now a days. enter data and commands into a computer system. Data can be in the form of 2. Central Processing Unit (CPU) : numbers, words, actions, commands, etc. After receiving data and commands from The main function of input devices is to users, a computer system has to process direct commands and data into computer. it according to the instructions provided. Computer then uses its CPU to process Here, it has to rely on a component called data and produce output. the Central Processing Unit. The CPU further uses these three elements : For example, a keyboard is an input device that enters numbers and a) Arithmetic and Logic Unit : characters. Similarly, even a mouse can This part of the CPU performs be an input device for entering directions arithmetic operations. It does basic and commands. Other examples include mathematical calculations like barcode reader, Magnetic Ink Character addition, subtraction, division, Recognition (MICR), Optical Character multiplication, etc. Further, it can Recognition (OCR), etc. Memory Secondary Memory Data Input Output Information Primary Unit Unit Memory Control Unit (CU) Arithmatic And Logical Unit Data Flow (ALU) Control Flow Central Processing Unit (CPU) Fig : 2 Block Diagram of a Computer 3 even perform logical functions Primary Memory holds the data and like the comparison of data. instruction on which computer is currently working. Types of Primary Memory– Primary memory is generally of two types. 1. RAM 2. ROM 1. RAM (Random Access Memory): It stands for Random Access Memory. RAM is known as read /write memory. It is generally referred to as main memory of the computer system. It is a temporary memory. The information stored in this memory is lost as the power Fig : 3 CPU Internal View supply to the computer is switched off. That’s why RAM is also called b) Control Unit : This unit is the back as “Volatile Memory”. bone of computers. It is responsible for coordinating tasks between all 2. ROM (Read Only Memory) : It components of a computer system. stands for Read Only Memory. The control unit collects data ROM is a Permanent Type from input units and sends it to memory. The content is not lost processing units depending on its when power supply is switched nature. Finally, it further transmits off. Content of ROM is decided by processed data to output units to the computer manufacturer and facilitate users. permanently stored at the time of manufacturing. ROM cannot c) Memory Unit : Once a user be overwritten by the computer. enters data using input devices, It is also called “Non-Volatile the computer system stores this Memory”. data in its memory unit. This data will now remain here until other 2) Secondary Memory : It is an external components of CPU process it. memory of the computer. It is used The memory unit uses a set of to store the huge amount of different pre-programmed instructions to programs and information. further transmit this data to other The secondary storage devices are : parts of the CPU. 1. Magnetic (Hard) Disk Types of Memory– There are two types 2. Magnetic Tapes of memory 3. Pen Drive 1) Primary Memory 2) Secondary Memory 4. Flash memory 1) Primary Memory : Primary memory 5. Optical Disk (CD,DVD) is internal memory of the computer. 6. SSD etc. It is also known as main memory. 4 3. Output Unit : The third and final 1.3.4 Concept of Hardware and component of a computer system is Software : the output unit. After processing of Hardware : Computer hardware data, it is converted into a format comprises of the physical components which human can understand. After that a computer system requires to conversion, the output unit displays function. In simple words hardware this data to users. Examples of output are the parts which we can see, we can devices include monitors, screens, touch them, feel them. It encompasses printers and speakers etc. Thus, output everything with a circuit board that units basically reproduce the data operates within a Personal Computer formatted by the computer for user's or Laptop; including the motherboard, benefit. graphics card, CPU (Central Processing Do it yourself Unit), ventilation fans, webcam, power Try to find out names of the modern supply, and so on. input devices used in shops/malls. Software : A set of instructions given to the computer is known as a program. 1.3.3 Units of Memory : Computer Program or set of programs are called as storage and memory is often measured in software. This helps us to interact with the Megabytes (MB) and Gigabytes (GB). Let computer in order to perform a particular us understand the evolution of memory. task. Software is a generic term used to Bit : It is a binary digit that holds only describe computer programs. one of two values : 0 or 1. 1.3.5 Categories of a software : Nibble : A group of 4 bits is called a nibble (For example:1011, 1001, Open source software : It refers to the 1111). software which releases code in public domain for anyone to use. The source code Byte : A group of 8 bits is called a can be copied, modified or distributed byte. A byte is the smallest unit, by other users and organizations. As the which can represent a data item software is open to the public, the result is or a character. (For example : 11101100, 10000001) that it constantly updates, improves and expands as more people can work on its Different Units of Memory Data Measurement Size improvement. Many states are following Bit Single Binary Digit FOSS policy i.e. Free Open Source (1 or 0) Software Policy and it enabled them to 1 Byte 8 Bits save some million of rupees each year 1 KiloByte (KB) 1,024 Bytes in licensing costs. The Kerala state is in 1 MegaByte (MB) 1,024 KiloBytes 1 GigaByte (GB) 1,024 MegaBytes news as they have adopted FOSS policy 1 TeraByte (TB) 1,024 GigaBytes and saved rupees 300 crore as a license fee 1 PetaByte (PB) 1,024 TeraBytes for proprietary or closed source software. 1 ExaByte (EB) 1,024 PetaBytes Table: 1 Different Units of Memory 5 Closed source software : It is opposite to The operating system boots up the Open Source Software and means that the computer and makes sure that software is used by the proprietary and has everything is operational. a closely guarded code. Only the original The operating system is also what authors of organization of a software can runs the cell phone and most of the access, copy, and alter that software. In electronic devices. case of closed source software, user has to purchase the software before using it. The operating systems usually come preloaded on any computer, tablet, 1.3.6 Computer software can be laptop or cell phone that you buy. classified into two types based on its Most people use the operating system utility : that comes with their device as Application Software : Application default. software is a program or group of It is necessary to use licensed operating programs designed for end users. system and not a copied or a pirated Applications software (also called one. end-user programs) include programs like database programs, word processors, There are many open source operating web browsers, presentation software, systems available on the web which are spreadsheets etc. freely downloadable. It is advisable to use those OS instead of pirated ones. System Software : System Software is a *Refer Page 61(Software Piracy) set of instructions required for a computer to work. For Example, Linux Operating Do it yourself system is a program that allows different List out the open source and closed applications and various components of source software. hardware such as monitor, printer, mouse, keyboard etc. to communicate with each 1.3.7 Operating Systems for Personal other. Computers : DOS : DOS (Disk Operating System) was the dominant operating system for Let’s understand more about an operating system microcomputers in the 1980's and the early 1990's. For working with DOS A computer would not be able the user needs to know how to input the to function correctly without an commands using the Command Prompt operating system. Window. An operating system is a software Windows : Windows is a series of program that empowers the computer operating systems that are designed by hardware to communicate and operate Microsoft. The first two versions of the with the computer software. Windows operating system, introduced 6 in 1985 and 1987 respectively, were iOS : iOS is Apple's closed source primitive. Windows is the most commonly operating system for Apple's iPhone, used operating system. iPod Touch, iPad and second-generation Mac OS : Apple Corporation’s registered Apple TVs. operating system is called Mac OS. Windows Phone : Windows Phone is Chrome OS : Chrome OS is an developed by Microsoft as a closed source open-source operating system created operating system for mobile phones. by Google to create a better computing 1.4 Introduction to GNU/Linux (GNU experience for people who spend most of Not Unix) their time on the web. GNU/Linux is a family of operating UNIX : UNIX was trademarked in 1969 systems that are created by various by a group of AT&T employees at Bell companies, organizations, and individuals. Labs as a multitasking, and multi-user It is created by using Free Software computer operating system. Philosophies. This means that GNU/ Linux : Linux is an open-source, portable, Linux operating systems are usually free multi-user (multiple users can access of charge, free to distribute, and they system resources like memory/RAM/ are open source. Open Source is when application programs at the same time), a person can view and modify the code multiprogramming, operating system. It for a piece of software. This is important is very similar to other operating systems, because by having the ability to look such as Windows and a source code is and audit the code, user can be sure that available to the public. the program does not perform malicious 1.3.8 Operating Systems for Mobile tasks. It also allows the user to program Phones : their own features, or fix problems, and help the developers. This results in higher There are many different operating quality code and more secure programs. systems for mobile phones and devices. This is why GNU/ Linux is used as the These are Android, Asha, Blackberry, predominantly backbone of the Internet. iOS, Windows Phone etc. Most websites that user visits run on Android : Android is a free and open GNU/Linux. In fact, as of 2018, all the source operating system provided by world’s fastest 500 computers run Linux. Google. It is most popular OS amongst all other OS. Ubuntu is one of the most popular GNU/Linux distribution. Asha : Asha is used by Nokia phones. This is closed source OS. There are two main ways to interact with the computer : The GUI (Graphical Blackberry : This is a closed source User Interface) and the CLI (Command operating system for smartphone and Line Interface) tablet devices. 7 Graphical User Interface (GUI) a list of all the apps installed on the The graphical user interface is when computer. The search option is used for the user interacts with the computer using quick search of the application. images, icons, and dialog boxes. The The home folder is where all the Fig. no. 4 shows what the Ubuntu 18.04 personal documents and settings are looks like. This GUI is called GNOME. stored, and every user has their own home There are a lot of GUI's (Or desktop folder. environment) that user can install, but this is the default. Note : Installing new software on The left bar is called the Panel. There Ubuntu is done using the 'Ubuntu are shortcuts to programs, as well as Software' Center. currently open programs. The top bar has the date and time. If it is clicked a Do it yourself menu will pop up with the calendar and Open the Ubuntu Software Center notifications. Fig. no. 4 shows that the from the panel. top right side will show user the battery Search for GIMP (it is an image information, if on a laptop, network editing program) and install. information (such as WiFi, or Ethernet), Run updates and uninstall software and options for logging in, restarting, and from the software center. shutting down the computer. Log out, Log in, and Restart the At the bottom left, there is an icon for computer. the app menu. Clicking on it will show APP Menu Fig. : 4 Desktop Environment of Ubuntu 18.04 8 Command Line Interface (CLI) The command line interface is when Do it yourself Open Firefox browser from the user interacts with the computer using command line. text. This is done by typing commands Create a new file on the Desktop into a terminal. The default CLI on called hello.txt. Ubuntu 18.04 is called 'bash'. It is a Change directory to Desktop using command processor that runs in a text 'cd' command. window where the user types commands Open hello.txt in Nano text editor. that causes actions. The commands are programs that are run when user types Write a message in hello.txt and save it. command name. There are number of different commands that user can use. Print the contents of hello.txt with 'cat' command. Some are explained in Table no. 2. Fig. : 5 Ubuntu Dashboard Fig. : 6 File Explorer and Software Center 9 Command Short Usage Detailed description Discription example ls List Directories ls [List Directories] Prints the list of directories in the current one. pwd Print Working pwd [Print Working Directory] Prints the path to the cur- Directory. rent directory. whoami Who Am I ? whoami [Who Am I ?] Prints the name of the current user on terminal. lscpu List CPU lscpu [List CPU] Prints information about your CPU on terminal. touch Touch touch [Touch] Creates a new file. filename.txt cd Change cd Down- [Change Directory] Control goes to a different Directory laods directory. nano Nano is a text nano [Nano] Nano is a text editor. This command will editor filename.txt open the file FileName.txt (or create it if it doesn't exist). You can type text in Nano, and when you are done you can press Control + O followed by Enter to save and Control + X followed by Enter to exit Nano. cat Concatenate cat file1.txt [Concatenate] Prints the contents of the files listed file2.txt on the screen. Echo A built in echo -- Used to display line of text or string that are passed command help as an argument. Clear To clear clear To clear the command prompt. Table: 2 Few Linux Commands The GNU/Linux File System Hierarchy /bin : Essential system programs are Standard stored here. In GNU/Linux, the topmost directory /dev : All connected devices are is called the root directory, and it is stored here. Including internal devices, written as /. All directories are stored temperature sensors, and batteries. under the root directory. For example if /etc : System configuration files are the user is ABC, the home directory will stored here. be created at /home/ABC. Everything in Linux is represented as a file, this includes /proc : Files that provide information Cameras, Storage devices, Microphones, about processes. This is information Network devices, etc. like, how much RAM is free, or how This is a brief summary of the file fast the CPUs are running. system : /tmp : Temporary files are stored here / : The root directory. All files and /home : Users home directories are directories are stored under this stored here. directory, including all hard drives, There are many more directories. pen drives, CD-Drives, etc. The user can read more about them by 10 searching for "File System Hierarchy application on his own. Linux Standard (FHS)" online. distributions mostly use free software Why Learn and Use GNU/ Linux ? so it keeps track of all the softwares through repositories. Repositories is There are huge number of benefits of a collection of software for a Linux learning GNU/Linux. Sooner or later in distribution on the server. The package the career, GNU/Linux will be used in manager updates the operating system the workplace. Millions of desktops and as well as other softwares periodically. servers run on GNU/Linux. The Android operating system, that the smartphone 4. Linux is flexible and easily runs on, is a modified version of GNU/ customizable : The user can change Linux. the desktop, the position of the menus, status bar position, style, default 1. Linux is Free and Open Source : file manager, icon theme and lot The word “Free” here does not just more. Almost everything in Linux is mean free of charge but also means customized. “Freedom”. Anyone is free to use this software, distribute them freely and 5. Excellent Support : There are even study and modify the source thousands of forums and millions code to suit one's own need. of people ready to help open source software users. Each distribution has its 2. Linux Operating System is free from own community of users and they help viruses : The user need not install any each other. Many software companies anti-virus software. This saves money and developers of free software as well as valuable time. The users also offer solutions to the problems are free from the trouble of updating through community platforms and the virus definitions and checking also through professional channels. unknown USB disk that is plugged in. Moreover, anti-virus software is 1.5 Computer Network not hundred percent reliable. The user 1.5.1 Introduction : It is a group always runs the risk of losing the data of interconnected computers or devices to if the computer is infected due to the have communication within themselves. failure of anti-virus software. Finally, A computer network consists of a anti-virus software often gives a collection of computers, printers and other false alarm and may delete the files equipment that is connected together so assuming the existence of the virus. that they can communicate with each 3. Easy to keep all the software up- other. to-date : Proprietary operating 1.5.2 Types of networks : There are systems can update themselves. But three types of network based on the they cannot update other software, geographical area they cover : LAN, especially proprietary software. MAN and WAN. The user has to keep track of each 11 The entire use and implementation Examples of a MAN are the part of these types depends upon the of the telephone company network geographical area they cover, i.e. LAN that can provide a high-speed DSL covers the smallest area; MAN covers line to the customer or the cable an area larger than LAN and WAN TV network in a city. comprises the largest of all. Wide Area Network (WAN) : Local Area Network (LAN) : Wide Area Network is a computer LAN covers smaller geographical network that extends over a large area (Size is limited to a few geographical area. kilometers) and are privately It might be confined within the owned. bounds of a state or country. Usage area is limited to areas A WAN could be a connection of such as an office building, home, LAN connecting to other LAN’s hospital, schools, etc. via telephone lines and radio It covers a short distance, and so waves. the error and noise are minimized. The technology is high speed and LAN is easy to setup. relatively expensive. Data transmits at a very fast rate A Communication medium used as the number of computers linked for WAN is Telephone Network or are limited. Satellite Link. It is a less expensive hardware and Due to long distance transmission, maintenance cost is also low. the noise and error tends to be more Metropolitan Area Network in WAN. (MAN) : 1.6 Network Configurations : MAN is larger area than that Network architecture is the design of of a LAN and smaller area as a computer network. It is a framework compared to WAN. for the specification of a network's It connects two or more separate physical components and their functional computers that reside in the same organization and configuration. or different cities. Two of the most widely used types of It covers a large geographical area network architecture are peer-to-peer and and may serve as an ISP (Internet client/server. Service Provider). 1. Peer-to-Peer Architecture : In this It is hard to design and maintain a type of architecture, all the machines, Metropolitan Area Network. called as “peers”, have the same status and they can communicate with 12 any other peer directly. A Peer-to-Peer for a network user to browse in network has no dedicated servers. Its internet or do spreadsheet work. implementations are meant for small For Example : Multimedia server, File networks. For Example, when students storage servers, Webserver etc. creates a network to share files through Bluetooth or SHAREit, the mobile device forms peer-to-peer network for transfer of files. Fig. : 8 Client-Server Architecture Fig. :7 Peer-to-Peer Architecture 1.6.1 Internet : 2. Client-Server Architecture : This Internet means connecting computer type of architecture is most suitable to any other computer anywhere in for larger network. So there are two the world. Internet is the highway of types of machines in network, client information. and server. The Internet has one very simple Client : A computer which is seeking job: to move computerized information any resource from another computer (known as data) from one place to is a client computer. For Example: another. The Internet is generally defined Downloading an image file from a as a global network connecting millions website, browsing Intranet/Internet of computers. etc. The network user normally uses a The Internet is a massive network of client computer to perform his day to networks, a networking infrastructure. day work. With the help of the internet one can Server : If a computer has a resource easily be in touch with any one in the which is served to another computer, whole world by sending electronic mail, it is a server computer. The client by chatting. Travel bookings can be establishes a connection to a server made very easily, one can order books or and accesses the services installed buy anything online. In simple terms it on the server. A server is not meant can be said that internet provides a very 13 strong connection or network between DNS : Domain Name System-It computers globally, bringing people and translates network address (such as their working close to each other. IP addresses) into terms understood 1.6.2 History of Internet : by humans (such as Domain Names) and vice-versa. The first workable prototype of the internet came in the late 1960's with the DHCP : Dynamic Host Configuration creation of ARPANET, or the Advanced Protocol - It can automatically assign Research Projects Agency Network. internet addresses to computers and Originally funded by the U.S. Department users. of Defense, ARPANET used packet FTP : File Transfer Protocol - A switching to allow multiple computers protocol that is used to transfer and to communicate on a single network. manipulate files on the internet. The technology continued to grow in HTTP : HyperText Transfer Protocol- the 1970's after scientists Robert Kahn and Vinton Cerf developed Transmission An internet-based protocol for sending Control Protocol and Internet Protocol, and receiving web pages. or TCP/IP, a communications model IMAP : Internet Message Access that set standards for how data could be Protocol - A protocol for receiving transmitted between multiple networks. e-mail messages from server on the ARPANET adopted TCP/IP on January 1, Internet. It maintains a copy of all the 1983, and from there researchers began to emails on server. We can sort, filter assemble the “network of networks” that emails. became the modern Internet. The online IRC : Internet Relay Chat - A world then took on a more recognizable protocol used for Internet chat and form in 1990, when computer scientist other communications. It facilitates Tim Berners-Lee invented the World communication in the form of text. Wide Web (WWW). 1.6.3 Protocols : POP3 : Post Office Protocol Version 3 - A protocol used for receiving e-mail A protocol is a set of rules that from remote mail servers. It does not governs the communications between maintain copy on the server. computers on a network. In order to have two computers to talk to each other, they SMTP : Simple Mail Transfer must be speaking the same language. Protocol - A protocol for sending e-mail messages to the Server on the Examples of Protocols are- Internet. TCP/IP : Transmission Control Protocol & Internet Protocol - It breaks down the message into packets and sends them out into the network. 14 1.7 IT Enabled Services 1.8 Careers in IT 1.7.1 Meaning of IT Enabled Services : Various career opportunities are IT Enabled Services (ITES), also available for IT professions. These vary called web enabled services or remote from operator to Specialised skilled services or tele-working, covers the programmers. Some of the career entire amount of operations which exploit opportunities are as follows : Information Technology for improving 1. Web Designer and Developer : One efficiency of an organization. The most can develop interactive websites important aspect is the value addition of using knowledge of HTML, PHP IT Enabled Service. The value addition and various other programming could be in the form of Customer languages. relationship management, improved 2. Software Developer : It is possible to database, improved look and feel, etc. have career as a software developer The outcome of an IT Enabled Service is with the scripting skills. in two forms : 3. Database Manager : After getting Direct Improved Service. knowledge about Database Indirect Benefits. management one can work as a Database Manager with the help of Whereas direct benefits can be SQL skills. realised immediately, indirect benefits can occur over a period of time, and can 4. Information Security Analyst : be harnessed very effectively, if planned Information Security Analysts are well up front. responsible for ensuring that networks are watertight. They educate staff to 1.7.2 Popular IT Enabled Service avoid unintended disclosures and keep centers : up to speed with potential external Popular IT Enabled Service centers are - threats. Call Centers 5. Professional Accountant : Using computerized accounting software one Electronic Publishing can successfully handle accounting Medical Transcription work of any small or large scale Data Centers organization. GIS Mapping 6. Financial Advisor : After getting (Geographic Information System) IT knowledge one can advise and guide others in investing the money in ERP ( Enterprise Resource Planning ) various investment schemes with their Knowledge Management & calculations and benefits in future. archiving. 7. Cyber Advisor : Anyone can develop his or her career as a cyber-advisor. 15 8. Animator : This is the most demanding home appliances, and other items career in today’s era. It is possible to embedded with electronics, software, become a successful animator using sensors, actuators, and connectivity one's own creation and innovation which enables these things to with the help of software like GIMP, connect, collect and exchange data Inkscape etc. creating opportunities for more direct 9. Games developer : Perhaps one of integration of the physical world into the trendiest and most fun jobs in the computer-based systems, resulting in sector, a games developer gets to work efficiency improvements, economic on titles for consoles, computers, smart benefits, and reduced human phones, tablets and online. Creativity exertions. and imagination are important but the 3. Cloud Computing : It is the delivery of ability to work in a highly pressurised computing services - servers, storage, environment is also crucial. databases, networking, software, data 10. Audio / Video Editor : As a career analytics and more - over the internet. opportunity, to become an Audio / 4. Data Analytics (DA) : It is the process Video Editor, one should be good in of examining data sets in order to draw tools such as Kdenlive, Audacity. conclusions about the information With the help of these tools one can they contain, increasingly with the develop a career as a video journalist. help of specialized systems and software. Data analytics technologies 1.9 Recent trends in IT and techniques are widely used in 1. Green Computing : It is the study commercial industries to enable and practice of environmentally organizations to make more-informed sustainable computing or IT. business decisions and by scientists The goals of green computing are and researchers to verify or disprove similar to green chemistry : scientific models, theories and hypothesis. To reduce the use of hazardous materials 5. Artificial Intelligence (AI) : It is intelligence demonstrated by To maximize energy efficiency machines, in contrast to the natural during the product's lifetime intelligence displayed by humans To recycle or biodegradation of non- and other animals. Computer science functional products and factory defines AI research as the study of waste. "intelligent agents": any device that Green computing is important for perceives its environment and takes all classes of systems, ranging from actions that maximize its chance of handheld systems to large-scale data successfully achieving its goals. centers. 6. Machine Learning (ML) : It is the 2. Internet of Things (IoT) : The scientific study of algorithms and Internet of Things (IoT) is the statistical models that computer network of physical devices,vehicles, systems use to effectively perform a 16 specific task without using explicit many cases offer greater statistical instructions, relying on patterns and power, while data with higher inference instead. It is seen as a subset complexity may lead to a higher false of artificial intelligence. discovery rate. 7. Big Data : It refers to data sets that are 8. Blockchain : It is a growing list of too large or complex for traditional records, called blocks, which are data-processing application software linked using cryptography. It can be to adequately deal with. Data with defined as a distributed, decentralized, public ledger. Summary Data can be any character, text, word, number or raw facts. Information is data formatted in a manner that allows it to be utilized by human beings in some significant way. IT (Information Technology) involves all of the technology that we use to collect, process, protect and store information. Computer architecture refers to how a computer system is designed and how it works. Computer hardware is the set of physical components that a computer system re- quires to function. Software is a set of instructions or programs instructing a computer to do specific tasks. Computer storage and memory is often measured in MegaBytes (MB) and GigaBytes (GB). Computer software can be classified into two types-Application Software and System Software. Open Source Software is a code free software available freely to copy and modify. Closed source Software is having proprietary rights with the developers and are paid ones. GNU/Linux operating systems are usually free of charge, free to distribute, and they are open source. There are two main ways to interact with the computer : GUI and CLI Internet means connecting computer to any other computer anywhere in the world. A protocol is a set of rules that governs the communications between computers on a network. A computer network consists of a collection of computers, printers and other equip- ment that is connected together so that they can communicate with each other. LAN, MAN, WAN are types of network Massive career opportunities are available for IT professionals. 17 Exercise Q.1 Complete the following activity 5) 1) Disk MAN Area DOS Network System Q.2 Divide the following list of devices 2) Tick the appropriate box into appropriate categories. Internet is a.................. network (Monitor, Barcode reader, Printer, connecting millions of computer. Keyboard, Optical character reader, Speaker) Regional Global Local Categories Names 3) Input Devices Output Devices Q.3 Multiple choice two correct answers. USB Serial 1) The primary memory consists of.................. and.................. Bus a) Pendrive b) Hard Disk c) RAM d) Scanner e) ROM 2) The network architectures which are 4) Tick the appropriate box. widely used are.................. Print CPU a) Server b) Client c) Peer to peer information d) Client-server e) Internet Print path of Q.4 Match the following. whoami current directory (1) IS (a) change directory Print the name (2) FTP (b) Translates Network Address of current user (3) CD (c) List of Directory (4) DNS (d) To transfer file on interent 18 Q.5 Name the following and complete Q.8 Complete the following Long the diagram. form. LAN Local.........Network Mobile GUI.........User interface Operating System OSS Open Source........... Q.9 Identify the following activity. Q. 6 Complete the following with Linux You are typing a letter using a commands with their use. computer and suddenly there is a power failure. IT's Use Which type of Memory does this Commands activity deal ? Q.10 Answer the following pwd 1) What is Data and Information? Give examples of data and information. ls 2) Explain functional units of a computer system. Q.7 Complete the list of following protocols. 3) What is a storage unit ? Explain types of primary memory storage. 4) Explain how Linux is different from Windows. 5) Write down the difference between LAN, MAN and WAN. Internet Protocol 19