🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

ICT-095 - Unit 2 - Cont (Week 4) - S version.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

ICT095: Information Technology Basics Fall 2023/2024 Week 4 Reference: Technology In Action, 17th edition, published by Pearson © 2022 Unit 2: Overview of different areas of IT(Cont. ) ❑ System Software • Operating Systems ❑ Networks ❑ Cyber Security ❑ Artificial Intelligence 2 System Software...

ICT095: Information Technology Basics Fall 2023/2024 Week 4 Reference: Technology In Action, 17th edition, published by Pearson © 2022 Unit 2: Overview of different areas of IT(Cont. ) ❑ System Software • Operating Systems ❑ Networks ❑ Cyber Security ❑ Artificial Intelligence 2 System Software (What?) Software that helps run the computer and coordinate instructions between application software and the computer’s hardware devices. Types of system software: • Operating system (Windows and macOS) • Utility programs: Programs in the operating system that help manage system resources. Luenendonk, M. (2022, October 14). 27 System Software & Application Software Examples of 2023. FounderJar. https://www.founderjar.com/system-software-application-software-examples/ 3 Operating system (What?) A group of programs that controls how computers function. Operating systems' functions: 1. Managing hardware 2. Managing software 3. Managing tasks • Computer users interact with OS through the user interface. • User Interface: The point of interaction between a user and a computer program or device. Understanding operating systems - University of Wollongong – UOW. (n.d.). https://www.uow.edu.au/student/learning-co-op/technology-and-software/operating-systems/ 4 Operating system Operating systems in the marketplace: Desktop and laptops: Microsoft Windows and Apple’s macOS Mobile devices: iOS and Android, WatchOS, tvOS Windows 10 can run on desktops, laptops, and mobile devices 5 Operating system Single-user/single-task operating systems: Early operating systems which were designed for one person performing one task at a time. Modern OS: Multi-task, networking capabilities (multiuser, multitasking OS). Operating systems can be categorized by the type of device in which they are installed. Real-time operating system (RTOS): • Used in machines with built-in computers (embedded system). • Requires minimal user interaction. • A program with a specific purpose. 6 Operating system Real-time OS 7 Operating system Multi-user operating system (network operating system): Allows more than one user access to the computer system at a time. Networks need a multiuser OS because many users simultaneously access the server. Server: The computer that manages network resources such as printing and communications. 8 Operating system Functionalities Operating system Functionalities 1. Provides a user interface Stage 2: Menu-driven interface Helps users interact with their devices. Stage 1: Command-driven interface Stage 3: Graphical user interface (GUI) 10 Operating system Functionalities 2. Hardware Coordination A. Processor Management • Although the CPU is powerful, it needs the OS to arrange the execution of all these activities. • The OS assigns a slice of its time to each activity that requires the processor’s attention. B. Memory and Storage Management OS uses RAM as a temporary storage area for instructions and data that the processor needs. 11 Operating system Functionalities 2. Hardware Coordination C. Hardware and Peripheral Management Device driver: A software that facilitates communication between a device and the OS. 12 Operating system Functionalities 3. Software Application Coordination Every computer program needs to interact with the CPU by using computer code. A computer program must contain a code that CPU recognizes. 13 Network (What?) Two or more computers that are connected by software and hardware to communicate with each other. Each device connected to a network is referred to as a node. Advantages of networks: • Sharing an Internet connection. • Sharing printers and other peripherals. • Sharing files. • Online gaming and home entertainment. • Telephone. • Common communications. 14 Network Types of networks • A personal area network (PAN) • Local area network (LAN) • Home area network (HAN) • Metropolitan area network (MAN) • Wide area network (WAN) 15 Network Types of networks 16 Network Network Components 17 Network Network Components Transmission media: A radio waves or physical system (cable) allow the nodes to communicate with each other and to send data on a network. Wired transmission media: • Unshielded twisted-pair (UTP) cable • Coaxial cable • Fiber-optic cable Wireless (or Wi-Fi) networks do not require physical cables and uses radio waves to connect computing devices to other devices and to the Internet. 18 Network Network navigation device: A device that moves data signals around the network. • Router • Switch What is the difference between a router and a switch ? • A router transfers packets of data between two or more networks. • A switch transmits data between devices on the same network. A. (2019, March 26). Cisco Routers and Switches Everything You need to know. -. -. https://www.imedita.com/blog/everything-you-need-to-know-about-cisco-routers-switches/ 19 Cybersecurity (What?) The act of securing computers,, mobile devices, electronic systems, networks, servers and data against malicious attacks. Cybercrime: Any criminal action perpetrated through the use of a computer. Cybercriminals: Individuals who use computers, networks, and the Internet to perpetrate crime. Identity theft: When a thief steals personal information and poses as you in financial or legal transactions. What is Cyber Security? (2023, August 17). www.kaspersky.com. https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security 20 Cybersecurity Types of scams perpetrated by identity thieves: • Counterfeiting existing credit and debit cards. • Requesting changes of address on your bank and credit card statements, which makes detecting fraudulent charges take longer. • Opening new credit cards and bank accounts in your name and then writing bad checks and not paying off the credit card balances. • Obtaining medical services under your name (thief’s treatment might exceed the limits of your policy’s covered services). • Buying a home with a mortgage in your name, then reselling the house and absconding with the money (leaving you with the debt). 21 Cybersecurity Information protection: • Protect your debit and credit cards. Most now have apps that allow you to turn off the card as soon as you realize it’s lost. • Protect bank statements and credit card bills, shredding before you dispose of them. • Never reveal sensitive information over the phone, even if the caller ID indicates a reputable source. A popular scam is to pretend to be the FBI or a Social Security representative in order to collect your private information. • Be wary of those promising to help you investigate or repair your credit score and asking for personal information 22 Cybersecurity Hacker: Anyone who unlawfully breaks into a computer system—either an individual computer or a network. Kinds of hackers: • White-hat hackers • Black-hat hackers • Gray-hat hackers Gorman, B. (2023, July 14). Different Types of Hackers: White Hat, Black Hat, Gray Hat, and More. Different Types of Hackers: White Hat, Black Hat, Gray Hat, and More. https://www.avg.com/en/signal/types-of-hackers 23 Artificial Intelligence Artificial Intelligence (AI): A computer science branch that focuses on creating computer systems able to perform tasks that are usually associated with human intelligence. Intelligence: The ability to acquire and apply knowledge and skills. Try the following AI tool: https://cloud.google.com/vision/docs/drag-and-drop Baker, M. (2018, March 21). Is Artificial Intelligence Replacing Your Intelligence? Entrepreneur. https://www.entrepreneur.com/science-technology/is-artificial-intelligence-replacing-yourintelligence/309950 24 Artificial Intelligence Artificial Intelligence research areas (1/2): • Natural language processing (NLP): An AI field that uses software to analyse, understand, and generate human languages naturally. • Perception: AI systems have senses just as humans do (Using sonar, accelerometer, infrared, magnetic, and other electronic sensors). • Knowledge representation: AI systems need to build knowledge bases to solve problems. • Planning: AI systems need to set goals and then achieve them. (N.d.). Retrieved from https://www.ntt-review.jp/archive/ntttechnical.php?contents=ntr201605fa2.html. 25 Artificial Intelligence Artificial Intelligence research areas (2/2): • Problem solving: ❖Humans are capable to make intuitive judgments. ❖AI programming combines a rules-based approach with trying to make judgments with incomplete information. • Learning: AI algorithms adapt and learn through experience ❖Supervised learning: Trained with significant number of examples. ❖Unsupervised learning: A system that builds rules based on what it is seeing. 26 Thank You 27

Use Quizgecko on...
Browser
Browser