Certificate in Computer Applications

Certificate in Computer Applications

Certificate in Computer Applications Introduction to Information Technology (CCA-01) Title Introduction to Information Technology Advisors(CEMCA) Mr. R.Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer(Education), CEMCA Editor Professor Durgesh Pant, Director- School of CS & IT, Uttarakhand Open University, Haldwani Author Dr. Jeetendra Pande, Assistant Professor- School of CS & IT, Uttarakhand Open University, Haldwani ISBN: Acknowledgement The University acknowledges with thanks the expertise and financial support provided by Commonwealth Educational Media Centre for Asia(CEMCA), New Delhi, for the preparation of this study material. Uttarakhand Open University, 2018 © Uttarakhand Open University, 2016. Fundamentals of Information Security is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by-sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published by: Uttarakhand Open University, Haldwani Contents 1.0 Learning Objectives ................................................................................................................ 14 1.1 Introduction ............................................................................................................................. 14 1.2 Introduction to Information Technology ................................................................................ 14 1.2.1 Computer Technology is Everywhere ............................................................................. 16 1.3 Generating Information ........................................................................................................... 16 1.4 Accessing Information ............................................................................................................ 17 1.5 Surveillance............................................................................................................................. 17 1.6 Changing the way we communicate ....................................................................................... 18 1.7 What is Information Technology(IT)...................................................................................... 18 1.8 Impact of Information and Communication Technology (ICT) on Society ........................... 20 1.9 Threats to Information Systems .............................................................................................. 21 1.9.1 Computer Crime............................................................................................................... 21 1.9.2 Theft of Money ................................................................................................................ 22 1.9.3 Theft of Computers and Computer Parts ......................................................................... 22 1.9.4 Alteration or Destruction of Data and Programs ............................................................. 22 1.9.5 System Disasters .............................................................................................................. 22 1.10 Computer Technology in Work and Play ............................................................................. 22 1.10.1 Science, Medicine, Health and Technology .................................................................. 23 1.10.1.1 Telemedicine ........................................................................................................... 24 1.10.1.2 Medical Self‐Diagnoses .......................................................................................... 24 1.10.1.3 Research .................................................................................................................. 25 1.10.2 Education and Technology ............................................................................................ 25 1.10.3 Business and Technology .............................................................................................. 26 1.10.4 Social Interactions and Relationships ............................................................................ 27 1.10.4 Man- Machine Connection ............................................................................................ 29 1.10.4.1 An Example – Man Machine Practical Application ............................................... 29 1.11 Summary ............................................................................................................................... 30 Reference ...................................................................................................................................... 32 License .......................................................................................................................................... 32 2.0 Learning Objectives ................................................................................................................ 33 2.1 Introduction ............................................................................................................................. 33 2.2 THE FIRST GENERATION COMPUTER (1940S‐1950S) .................................................. 34 2.2.1 Vacuum Tubes ................................................................................................................. 34 2.3 The Second Generation Computer (Mid 1950s – early 1960s) .............................................. 34 2.3.1 Transistors ........................................................................................................................ 34 2.4 The Third Generation Computer (Early 1960s – Early 1970s)............................................... 35 2.4.1 Integrated Circuits ............................................................................................................ 35 2.5 The Fourth Generation Computer (Early 1970s – Mid 1980s) ............................................... 35 2.5.1 The Microprocessor ......................................................................................................... 35 2.6 The Fifth Computer Generation Computer (Mid 1980s – Early 1990s) ................................. 36 2.6.1 Artificial intelligence and Parallel Processing ................................................................. 36 2.7 The Sixth Generation (Mid 1990s to Present) ........................................................................ 37 2.7.1 Computers and Video Games .......................................................................................... 37 2.8 Types of Computer Systems ................................................................................................... 37 2.9 Computer Hardware and Peripherals ...................................................................................... 39 2.9.1 INPUT Devices ................................................................................................................ 39 2.9.2 OUTPUT Devices ............................................................................................................ 40 2.10 Process and Storage Devices ................................................................................................ 43 2.10.1 Mother Board ................................................................................................................. 43 2.10.2 Expansion Cards ............................................................................................................ 44 2.11 Storage Devices .................................................................................................................... 44 2.11.1 Random Access Memory (RAM) .................................................................................. 45 2.11.2 Read Only Memory (ROM) ........................................................................................... 45 2.11.3 Units of Storage ............................................................................................................. 46 2.11.4 Secondary Storage Devices ............................................................................................ 46 2.12 Activity ................................................................................................................................. 49 2.13 Summary ............................................................................................................................... 50 Reference ...................................................................................................................................... 51 License .......................................................................................................................................... 51 3.0 Learning Objectives ................................................................................................................ 52 3.1 General Purpose Computer System ........................................................................................ 52 3.2 Embedded Computer Systems ................................................................................................ 53 3.3.1 The Control Unit (CU) ..................................................................................................... 57 3.3.2 Arithmetic and Logic Unit (ALU) ................................................................................... 57 3.3.3 Memory ...........................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    214 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us