Premium Essay

Intro to Information Technology

In:

Submitted By Cameron13
Words 1125
Pages 5
Intro to Information Tech Chapter 2
Computers are data processing devices * Performs four major functions * Input: Gathers data, allows users to enter data * Process: Manipulates, calculates, or organizes data into information * Output: Displays data and information for user * Storage: Saves data and information for later use * Data: representation of a fact, figure, or idea * Information: data that has been organized or presented in a meaningful fashion
Bits and Bytes: the language of computers * The language of computers * Bit * Binary digit * 0 or 1 * Byte * 8 bits * Each letter, number, or character is a unique combination of 8 bits of 0s and 1s * Computer uses combination of hardware and software to process data into information * Hardware is any part of the computer you can physically touch * Software is set of computer programs * Application- software that runs on top of another * Is all the computer software that causes a computer to perform useful tasks (compare with computer viruses) beyond the running of the computer itself. * System software- is computer software designed to operate and control the computer hardware and to provide a platform for running application software. *

Types of Computers * Two basic designs of computers * Portable * Laptop computers * Netbooks * Tablet PCs * Tablet computer * Ultrabooks * Stationary * Desktop computers * Separate case plus peripheral devices * All-in-one computers * Mainframe * Supports many users simultaneously * Supercomputer * Performs complex calculations extremely rapidly * Embedded *

Similar Documents

Free Essay

Intro to Information Technology

...Week 4 Assignment 1: Computer Architecture Tony D. Everett Professor Jennifer Merritt CIS106 Intro to Information Technology July 28, 2013 Introduction The use of Information Technology is well recognized. Information Technology has become a must for survival of all business housing with the growing IT trends. The computer is the main component of any Information Technology system. Today, computer technology has filled every scope of existence of modern man. From airline reservations to auto repair diagnosis, from government services databases to manufacturing and production systems that are used by the likes of Pepsi, Kellogg’s and Kraft Foods-everywhere we witness the elegance, complexity and effectiveness possible only with the help of computers. These systems operate using the Von Neumann Architecture. The Von Neumann Architecture and Importance The von Neumann architecture is a design model for a stored-program digital computer that uses a processing unit and a single separate storage structure to hold both instructions and data. The instructions are executed sequentially which is a slow process. One shared memory for instructions and data with one data bus and one address bus between processor and memory. Commands and data have to be fetched in sequential order (known as the Von Neumann Bottleneck), limiting the operation bandwidth. Its design is simpler than that of the Harvard architecture. It is mostly used to interface to external memory. Neumann architecture...

Words: 1237 - Pages: 5

Premium Essay

Google

...Intro Intro Swot BalancedScorecard Conclusion Corporate finance 2 Ngoc-Viet Vo Binh-Duong Doan Yuming Hao Huili Liu Noelia Martin Plaza Khurram Shahzad © 2010 - GMP IAE LYON 3 Intro Intro Swot BalancedScorecard Conclusion Plan Intro Swot Scorecard Conclusion Plus Introduction SWOT Analysis Balanced Scorecard Strategies & Indicators GMP Corporate Finance Plus Conclusion 2 Intro Intro Swot BalancedScorecard Conclusion introduction 3 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus GMP Corporate Finance Plus Google is a global technology leader focused on improving the ways people connect with information. Incorporated in California in September 1998 and reincorporated in Delaware in August 2003. Headquarters are located at 1600 Amphitheatre Parkway, Mountain View, California 94043 4 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus Mission: Google’s mission is to organize the world’s information and make it universally accessible and useful GMP Corporate Finance Plus Major Products: Google Web Search with Advanced Search Functionality Web Page Translation—supports 41 languages Integrated Tools—such as a spell checker, a calculator, a dictionary and currency and measurement converters Google image and book search Google Scholar Google Finance Google webmaster...

Words: 1119 - Pages: 5

Free Essay

Itil 2011 Foundations Study Guide

...ITIL Study Guide | | | | ITILFND01 Service Management as a practice The purpose of this unit is to help the candidate to define Service and to comprehend and explain the concept of Service Management as a practice. 01-1. Describe the concept of Good Practice (SS 1.2.2) 01-2. Define and explain the concept of a Service (SS 2.2.1) 01-3. Define and explain the concept of Service Management (SS 2.1) 01-4. Functions and Processes (SS 2.3, 2.6.1, SD 2.3, SD 3.6.4, ST 2.3, SO 2.3, 3.1, CSI 2.3) 01-5. Explain the process model and the characteristics of processes (SD 2.3.2, 3.6.4) The recommended study period for this unit is minimum 45 minutes ITILFND02 The Service Lifecycle The purpose of this unit is to help the candidate to understand the value of the Service Lifecycle, how the processes integrate with each other, throughout the Lifecycle and explain the objectives and business value for each phase in the Lifecycle 02-2. Structure, scope, components and interfaces of the Service Lifecycle (SS 1.2.3 All ) 02-3. Account for the main goals and objectives of Service Strategy (SS 1.3) 02-4. Account for the main goals and objectives of Service Design (SD 2.4.1, SD 3.1) 02-5. Briefly explain what value Service Design provides to the business (SD 2.4.3) 02-6. Account for the main goals and objectives of Service Transition (ST 2.4.1) 02-7. Briefly explain what value Service Transition provides to the business (ST 2.4.3) 02-8. Account for the main goals and...

Words: 1961 - Pages: 8

Free Essay

Intro to Mass Paper

...learned a lot in intro to Mass Communication. This class has helped me a lot in what I want to do for my career. I’m glad that they have a class called Intro To Mass cause it kind of helps u find out if u are in the right major or not. It introduces u Intro Mass Communication and gives you information on what this major is going to be about. I learned a lot in chapters 1,5, and 6. In chapter one I learned a lot about digital natives, digital immigrants, and mass media. Digital natives are people who grew up in a world where digital technologies and the Internet were already in place. Then you have your digital immigrants who are transitioning into the digital age. I thought that was pretty cool how they had two different groups, and mass media is the exchange of information and meanings between individuals and groups. In chapter 5 I learned about sound recording, speakeasies, and commercial radio. Sound recording is the recreation of sound waves including voice, music, and sound effects. A man by the name of Thomas Alva Edison is the one who created sound recording. Then I learned about speakeasies, which are illegal saloons and dance halls that quickly sprang up all over the country. After that came the commercial radio which is advertising backed radio that helped to increase the radio's financial base. Chapter 5 helped me a lot cause this chapter focused on my career so I learned a lot. In chapter 6 I learned about hybrid films, sound-on-filming technology, and film distributors...

Words: 494 - Pages: 2

Free Essay

Editor

...General Education and Arts & Sciences Req. Communications (9 cr.) Done: ENGL 1010 Crit Read and Expository Writing ENGL 1020 Crit Thinking and Argument Take one of the following (one of these must be taken and will count as the speech req, but not an Oral Intensive. If an additional one is taken it will count as Oral Intensive): SPCH 1300 General Speech SPCH 2300 Public Speaking SPCH 2320 Arg & Debate (meets A&S req) History (6 cr.) Done: HIST 2010 The United States to 1877 HIST 2020 The United States Since 1877 Using Information Technology (3 cr.) Done: CSCI 1100 or pass exam (schedule exam at: http://www.cs.etsu.edu/academics/signup) Science (8 cr.) Done: A sequence of 2 courses in the same field is required by A&S (e.g., biology). Psychology requires at least one biology course. Students can take two biology courses or two other lab courses and one biology. Take two of these BIOL or two other lab sciences in the same discipline and one of these BIOL: BIOL 1010-1011 Biology for Non-majors I BIOL 1020-1021 Biology for Non-majors I BIOL 1110-1111 Bio for majors I BIOL 1120-1121 Bio for majors II BIOL 1130-31 Bio for majors III Other lab science: Other lab science: Literature (3 cr.) Done: Take one of the following: ENGL 2030 Literary Heritage ENGL 2110 American Literature I ENGL 2120 American Literature II ENGL 2210 British Literature...

Words: 773 - Pages: 4

Free Essay

System

...Brorsson, professor matsbror@kth.se, tel. 790 4121 Lec 3 – Performance  + Pipeline Review  Electrical Engineering and Computer Sciences El t i l E i i dC t S i University of California, Berkeley http://www.eecs.berkeley.edu/~pattrsn http://www‐inst.eecs.berkeley.edu/~cs252 David Patterson Review from last lecture • Tracking and extrapolating technology part of  architect’s responsibility • Expect Bandwidth in disks DRAM network and Expect Bandwidth in disks, DRAM, network, and  processors to improve by at least as much as the  square of the improvement in Latency • Quantify Cost (vs. Price) – IC ≈ f(Area2) + Learning curve, volume, commodity,  margins Outline • • • • • • • • Review MIPS – An ISA for Pipelining 5 stage pipelining 5 t i li i Structural and Data Hazards Forwarding Branch Schemes Exceptions and Interrupts Conclusion  • Quantify dynamic and static power Quantify dynamic and static power – Capacitance x Voltage2 x frequency, Energy vs. power • Quantify dependability – Reliability (MTTF vs. FIT), Availability  (MTTF/(MTTF+MTTR) 3/28/2008 CS252-s06, Lec 02-intro 3 3/28/2008 CS252-s06, Lec 02-intro 4 1 IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy MIPS ‐‐ A "Typical" RISC ISA • • • • 32‐bit fixed format instruction (3 formats) ( p ) 32 32‐bit GPR (R0 contains zero, DP take pair) 3‐address, reg‐reg arithmetic instruction Single address mode for load/store:  base + displacement – no indirection 31 ...

Words: 635 - Pages: 3

Premium Essay

Introduction to Research Methods

...strategy - benchmarking Definition Benchmarking is the process of identifying "best practice" in relation to both products (including) and the processes by which those products are created and delivered. The search for "best practice" can taker place both inside a particular industry, and also in other industries (for example - are there lessons to be learned from other industries?). The objective of benchmarking is to understand and evaluate the current position of a business or organisation in relation to "best practice" and to identify areas and means of performance improvement. The Benchmarking Process Benchmarking involves looking outward (outside a particular business, organisation, industry, region or country) to examine how others achieve their performance levels and to understand the processes they use. In this way benchmarking helps explain the processes behind excellent performance. When the lessons learnt from a benchmarking exercise are applied appropriately, they facilitate improved performance in critical functions within an organisation or in key areas of the business environment. Application of benchmarking involves four key steps: (1) Understand in detail existing business processes (2) Analyse the business processes of others (3) Compare own business performance with that of others analysed (4) Implement the steps necessary to close the performance gap Benchmarking should not be considered a one-off exercise. To be effective, it must become an ongoing...

Words: 996 - Pages: 4

Free Essay

Aait Prgm

...Concentration in Information Technology/Programming Enrollment Agreement  AAIT/PRG 013A  AAIT/PRG 013B For Office Use Only:  Reentry  Program/Version Change  Track Change Student Name IRN _________________________ Home Address Program/Version Change Start Date City Individual Record Number State Zip Code Finance Manager Signature AAIT/PRG 013 Track A If you list on your admissions application 24 or more pr evious college credits, you must take GEN/105 Skills for Learning in an Information Age as the first course and are not required to enroll in the First -Year Sequence. AAIT/PRG 013 Track B If you list on your admissions application less than 24 college credits, you must complete the following First-Year Sequence: US/101 Introduction to University Studies (Required as first course) 3 credits SCI/162 Principles of Health and Wellness 3 credits FP/101 Foundations of Personal Finance 3 credits COM/155 University Composition and Communication I 3 credits *COM/156 University Composition and Communication II 3 credits PSY/201 Foundations of Psychology 3 credits *HUM/111 Critical and Creative Thinking (Required as last course) 3 credits AAIT/PRG 013 (Tracks A & B) Information Technology/Programming Concentration *IT 205 Management of Information Systems 3 credits *IT 210 Fundamentals of Programming with Algorithms and Logic 3 credits *IT 236 Intro to Web Design I 3 credits *IT 237 Intro to Web Design...

Words: 632 - Pages: 3

Premium Essay

Xbrl

...accounting + auditing Intro to XBRL Patricia Francis xbrL Is resHApING tHe FINANcIAL reportING LANDscApe WorLDWIDe, AND LooKs set to Do tHe sAme IN mALAYsIA oNce FuLLY ImpLemeNteD bY LocAL reGuLAtors AND busINesses. Are You xbrL reADY? The objectives of SSM’s SDP II are: • To enhance delivery and improve accuracy of information; • To achieve a standardised and consistent mode of reporting with enhanced analytical capabilities; • To promote data usability and exchange flow with external stakeholders. According to Nor Azimah, SSM also promotes the adoption of XBRL as a nationwide format to be used by key agencies such as the Inland Revenue Board (LHDN), Securities Commission (SC) and Bursa Malaysia and the building of extension taxonomies by the mentioned agencies. The said adoption will provide SSM, other regulators and businesses with detailed data which can be aggregated and made available to stakeholders in the form of industry analysis for industrial benchmarking. The move to XBRL-based reporting is also in line with plans to transform Malaysia into a digital country by 2020, as XBRL reports form part of the digital reporting chain. At the recent Digital Malaysia Press Conference held on 5 July 2012 by the Ministry of Science, Technology and Innovation (MOSTI) along with Multimedia Development Corporation (MDeC), Datuk Badlisham Ghazali, CEO of MDeC told the media that Digital Malaysia will help drive automation and technology adoption to ensure productivity and...

Words: 2550 - Pages: 11

Premium Essay

Sample of Cke Schedule

...Week 1 – PMR Week 2 – PMR Week 3 – Assurance Week 4 – Week of review of previously covered material Week 5 – Assurance Week 6 – MDM Part Week 7 – Finance ; PMR Week 8 – Week of review of previously covered material Week 9 – Taxation Week 10 – Write and debrief Mock Exam #1 Week 11 – GSRM; PMR Week 12 – Write and debrief Mock Exam #2 and #3 Management Decision MakingPart 1 Intro 55 minPart 2 Various subjects 62 minPart 3 Various subjects 41 minPart 4 Information Technology 42 minPart 5 Various subjects 36 minPart 6 Various subjects 56 min | FinancePart 1 Intro and various subjects 43 minPart 2 Various subjects 62 minPart 3 Various subjects 50 minPart 4 Various subjects 72 min | TaxationPart 1 Intro 67 minPart 2 Various subjects 65 minPart 3 Various subjects 77 minPart 4 Various subjects 58 minPart 5 Various subjects 42 minPart 6 Various subjects 35 min | GSRMGovernance, strategy and risk management is a short 45 minute lecture with 18 embedded multiple choice questions. There is approximately 1.5 hours of learning time in the GSRM area. | PMRPMR 1 Intro 5 minPMR 2 Conceptual Framework 12 minPMR 3 FS Presentation 12 minPMR 4 Statement of Cash flows 36 minPMR 5 Revenue 52 minPMR 6 Accounts Receivable 13 minPMR 7 Notes Receivable 21 minPMR 8 Inventories 34 minPMR 9 Property, Plant and Equipment 65 minPMR 10 Borrowing Costs 12 minPMR 11 Intangible Assets 32 minPMR 12 Impairment of Assets 25 minPMR 13 Investment Property 13 minPMR 14 Agriculture 9 minPMR...

Words: 439 - Pages: 2

Premium Essay

Idhfw

... Course Title (Example) (Example) Intro to University Intro to University 3 3 2 2 1 1 D D C C B B A A 4 4 Campus of Study: (eg Callaghan, Ourimbah, Port Macquarie) Assessment Item Title: Due Date/Time: Tutorial Group (If applicable): Word Count (If applicable): Lecturer/Tutor Name: Extension Granted: Yes No Granted Until: Please attach a copy of your extension approval NB: STUDENTS MAY EXPECT THAT THIS ASSIGNMENT WILL BE RETURNED WITHIN 3 WEEKS OF THE DUE DATE OF SUBMISSION Please tick box if applicable Students within the Faculty of Business and Law, Faculty of Science and Information Technology, Faculty of Engineering and Built Environment and the School of Nursing and Midwifery: I verify that I have completed the online Academic...

Words: 507 - Pages: 3

Premium Essay

Integrated Marketing Communications Plan

...Ernesto Castro Intro to marketing communications MW 4:30pm MKTG-4233 Sec001-1320 Product name: Morph Ernesto Castro Intro to marketing communications MW 4:30pm MKTG-4233 Sec001-1320 Product name: Morph 1. Executive Summary The world’s fully flexible phone. Morph is a cellphone concept created by Nokia. Morph is a “bridge between highly advanced technologies and their potential benefits to end-users.” Some of features this new technology included: •Newly-enabled flexible and transparent materials blend more seamlessly with the way we live. •Devices become self-cleaning and self-preserving. •Transparent electronics offering an entirely new aesthetic dimension •Built-in solar absorption might charge a device, while batteries become smaller, longer lasting and faster to charge. •Integrated sensors might allow us to learn more about the environment around us, empowering us to make better choices. The main target audience for this concept is for the innovators and early adopters. By having this group test the product, we’ll be able to decide if the product needs to be changed or if we have green light to mass produce. Promotions will mostly be targeted to those two groups and it’ll be done in such way that will have the greatest impact. Popular channels of communications will definitely be used to capture the most attention which will also include that of other groups like early majority. 1. Situation Analysis Environmental Scan Introducing...

Words: 471 - Pages: 2

Free Essay

Linux Lab

...For the exclusive use of C. Calina, 2015. Journal of Information Technology (2007) 22, 432–439 & 2007 JIT Palgrave Macmillan Ltd. All rights reserved 0268-3962/07 JIT016 palgrave-journals.com/jit Teaching case Modernization of passenger reservation system: Indian Railways’ dilemma Shirish C Srivastava1, Sharat S Mathur2, Thompson SH Teo1 1 School of Business, National University of Singapore, Singapore, Singapore; Centre for Railway Information Systems, Indian Railways, New Delhi, India 2 Correspondence: SC Srivastava, School of Business, National University of Singapore, 1 Business Link, Singapore, Singapore 117592, Singapore. Tel: þ 65 6516 3038; Fax: þ 65 6779 2621; E-mail: shirish@nus.edu.sg Abstract This teaching case discusses the challenges being faced by the technology managers at Indian Railways (IR) in the current scenario of a resurgent national economy coupled with increasing customer expectations. In the face of growing competition from road and low-cost airlines, to retain its customers, IR has responded by changing its business rules. The Railway Ministry expects a rapid response from Centre for Railway Information Systems (CRIS) to incorporate all these changes in the passenger reservation system (PRS). The old PRS, which is time-tested and reliable, and has been serving the customers’ needs for nearly two decades, is now proving to be relatively inflexible to match the rapidly changing business requirements. Although...

Words: 6480 - Pages: 26

Premium Essay

Cyber Crime

...1.1 (Intro.) CS-M74 Software Product Development (2003-4) 1.2 (Intro.) Roger D Stein BSc PhD MBCS CEng CITP R.D.Stein@swansea.ac.uk Room 302, Faraday Tower 1.3 (Intro.) CS-M74 Pre-requisites • CS-M01 Distributed Programming in Java 1.4 (Intro.) Assessment Report 10% Linux / C 10% Group Project 20% Project Specification 30% Written Examination (May/June) 30% Lectures approx. 20 in total ((plus tutorials)) TB1 Tues. 9.00 Far-L ? Andy Gimblett (3 Linux + 6 C) [with CS-244] Wed. 11.00 Glyn-A ? Roger Stein (start on 5 November) TB2 Lectures Linux /C 9 Introduction 1 Ethics 1 Legal Issues 1 Project Management 2 (Group Project 2) Software Engineering 4 1.4 (Intro.) Books B. Ayres, The Essence of Professional Issues in Computing, Prentice-Hall, 1999 S Baase, A Gift of Fire, 2nd ed., Prentice-Hall, 2003 B. Hughes and M. Cotterell, Software Project Management, 3rd ed., McGraw-Hill, 2002 R. Pressman, Software Engineering: A Practitioner’s Approach, 5th ed., McGraw-Hill, 2000 I. Summerville, Software Engineering, 6th ed., Addison-Wesley, 2001 1.5 (Intro.) Why Software Engineering? “Engineering … to define rudely but not inaptly, is the art of doing that well with one dollar, which any bungler can do with two after a fashion” - Arthur Mellen Wellington, The Economic Theory...

Words: 3498 - Pages: 14

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8