Basics of it
This presentation is the property of its rightful owner.
Sponsored Links
1 / 61

Basics of IT PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

Basics of IT. Learning Objectives. In this, we will discuss : Introduction to Computer Functional Units of a Computer Internal Core Components of a Computer Input Devices, Output Device and Storage Devices Generation of Computers Classification of Computers Classification of Networks

Download Presentation

Basics of IT

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Basics of it

Basics of IT

Learning objectives

Learning Objectives

In this, we will discuss :

  • Introduction to Computer

  • Functional Units of a Computer

  • Internal Core Components of a Computer

  • Input Devices, Output Device and Storage Devices

  • Generation of Computers

  • Classification of Computers

  • Classification of Networks

  • Virus and Antivirus

Basics of it1

Basics of IT

  • Data - Data is defined as facts related to people , places, events or things, which can be represented using number and letters.

  • Instruction - Instruction is specifying what must be done to the data.

  • Information - Information is defined as processed data.

Basics of it2

Basics of IT

Introduction to Computer & Characteristics of a Computer :-1. Speed2. Accuracy3. Permanent Memory4. No intelligence5. Diligence

Basics of it3




1024 BYTES







Basics of IT

Computer’s Storage Capacity

Basics of it4

Basics of IT

  • ASCII ASCII stands for “American Standard Codes for Information Interchange”. This code is available in two versions the 7-bit and 8-bit code.

  • ASCII-7: In the 7-bit code there are three zones bits. ASCII being a 7 bit code, offered 128 (27) different characters. It had 52 binary values for alphabets, both uppercase and lowercase, 10 for numerals and 66 for special characters.

Basics of it5

Basics of IT

  • ASCII-8: In the 8-bit code there are four zones bits. With the 8 bits, it is possible to have 28=256 codes.

  • The ASCII-8 code is used to code two types of information:-

  • One type is the printable characters such as alphabets, digits and special characters.

  • The other set is known as control characters which represent coded information to control the operation of digital computers and are not printed.

Basics of it6

Basics of IT

Basics of it7

Basics of IT

Functional Units of a Computer:-1.Input.2Storing3.Processing4.Output5Controlling

Basics of it8






Basics of IT

Basics of it9

Basics of IT

Input Unit Functions:-

Accepts data from outside world.

Converts data to computer acceptable form.

Supplies data for further processing.

Output Unit Functions:-

Accepts results in coded form

Converts coded form into human form.

Gives this to outside world.

Storage Unit Functions:-

Stores data and instructions for processing.

Store intermediate results.

Stores final results after processing.

Basics of it10

Basics of IT

Basics of it11

Basics of IT

  • Arithmetic Logic Unit

  • Here the actual execution of data takes place during processing. All calculations and comparisons are performed.

  • All data before processing is stored in ALU and then transferred for further processing.

  • All intermediate results are stored in the primary storage. After complete processing the final results are stored in storage unit.

  • The engineering design of ALU tells the type and number of operations required. Almost all ALU’s perform basic operations-addition, subtraction, multiplication and division plus comparisons.

Basics of it12

Basics of IT

The microprocessor contains the arithmetic logic unit (ALU) and the control unit for a microcomputer. It is connected to memory and I/O by buses which carry information between the units.

Basics of it13

Basics of IT

  • Control Unit

  • It selects, interprets, and sees over the execution of the programs. It maintains order and directs the operations.

  • It does not process data but only acts as a central nervous system. It manages and coordinates computer system.

  • It issues signals for further processing.

Basics of it14

Basics of IT

  • Central Processing Unit

  • The Control Unit and the ALU are together called the CPU.

  • It is the brain of a computer.

  • All major calculations and comparisons are made inside the CPU .

  • It also activates and controls the other operations. The major processors are Intel, AMB, Celeron, Cyrix.

Basics of it15

Basics of IT

The most basic components your computer needs to work:-

A CPU or Central Processing Unit. Also known as the Processor.

RAM or Random Access Memory.


Hard Disk

Core components

Core Components

Computer CPU(Central Processing Unit)

Also known as the Processor.

The CPU is the brain of the computer. All instructions or decisions are done by the CPU. 

Core components1

Core Components

Computer Memory

Also known as, RAM (Random Access Memory).

  • Ram is used by the CPU to read and write data to.

  • After the CPU does it's work it will write the data back to RAM or, if the CPU needs to read data, it will read the data to RAM before processing it.

Core components2

Core Components

  • Computer Motherboard

  • The mother of all components.

  • Most computer components slots into the motherboard.

  • CPU, RAM and PCI (Peripheral Component Interconnect) devices, is plugged into the motherboard.

  • In the next slide, the motherboard is shown at the center-

  • It depicts how the components slots into the motherboard.

  • There are hundreds of different motherboards and models, but they basically do the same thing, connect all components. 






Transistors & IC’s



Other SLOT

Basics of it16

Basics of IT

Hard Disk

The hard disk is where you store your data. All your documents, music files(mp3's), photos, programs and so on.

The picture show a hard disk that has been opened. The hard disk is encased in metal to protect the platters and heads. Again, like most components, there are a lot of different types of disk and sizes.

Basics of it17

Basics of IT

  • Processors

  • IBM, Intel and AMD are the pioneers in the field of microprocessor manufacturing.

  • All these latest computer processor gained immense popularity after the 1980s as there was great development in the field of computers and technology.

  • Intel 4004 was the first ever single-chip 4-bit microprocessor and it was released on November 15, 1971.

Basics of it18

Basics of IT

  • The first 8-bit processor was 8008 and it released on April 1, 1972.

  • Processors such as Intel 8080, 8085, 8086, 8088, 80186, 80188 and 80286 followed in the forthcoming decade.

Basics of it19

Basics of IT

  • Intel Core is a brand name used for various mid-range to high-end consumer and business microprocessors made by Intel.

  • In general, processors sold as Core are more powerful variants of the same processors marketed as entry-level Celeron and Pentium.

  • Similarly, identically or more capable versions of Core processors are also sold as Xeon processors for the server and workstation market.

Basics of it20

Basics of IT

  • The current lineup of Core processors includes the latest Intel Core i7, Intel Core i5, and Intel Core i3, and the older Intel Core 2 Solo,Intel Core 2 Duo, Intel Core 2 Quad, and Intel Core 2 Extreme lines.

Basics of it21

Basics of IT

Basics of it22

Basics of IT

Popular Input Devices

1.Keyboard2.Mouse3.Light pen4.Audio input units5.Magnetic disks6.Scanner7.Tele terminals8.Joystick9.Digitizer (graphic tablet)10.Magnetic tapes and cassettes11.Floppy and Winchester disks12.Optical mark reader (OMR)13.Magnetic ink character reader (MICR)

Basics of it23

Basics of IT

  • Types of output devices:-

  • Hard copy devices - Hard copy means that the output is in directly usable form, that is, in printing or plotted form. Following hard copy devices are very popular:

  • 1.Printers, 2.Plotters, 3. Photographic output

  • Soft copy devices - Soft copy is in magnetic/audible form that cannot be used directly. These devices do not produce a permanent record. Following soft copy devices are very popular:

  • 1.VDU, 2.Liquid crystal display (LCD) used in laptop

  • Basics of it24

    Basics of IT

    • Types of Printers:-

    Basics of it25

    Basics of IT

    Generation of Computers:-

    1. First Generation Computers (1945 – 1955) - The main component in use were the vacuum tube. Eg. Eniac

    2. Second Generation Computers (1955 – 1965) -

    Computers were built using transistors. Eg. IBM 700 SERIES , IBM 1620, IBM 1401.

    3. Third Generation Computers (1965 – 1970) - Computers were built using Ics. Eg. IBM 360, IBM 370.

    Basics of it26

    Basics of IT

    4.Fourth Generation Computers (1970 ONWARDS) - In this generation LSI and VLSI chips are introduced. Eg. DESK-TOP, LAP-TOP.

    5. Fifth Generation Computers (1982 ONWARDS) -

    Computer are based on artificial intelligence (AI )

    Basics of it27

    Basics of IT

    Classification of Computers:-

    Microcomputers – Its is a microprocessor. The first microcomputer was built around 8-bit microprocessor chips. Includes PC , Desk Top Computers, Laptop. For example: Zilog Z80, MOS 6502, Intel 8080, MC 6809.

    Minicomputers – Minicomputers originated in 1960s. Initially these were 8 bit and 12 bit machines but by 1970s almost all minis were transformed into 16 bit MC68000 Series

    Mainframes-mainframe computers are generally 32-bit machines. these are suited to big org. to manage high volume Cyber Series, Cray Series, Cray X

    Computer components

    Computer Components

    Basics of it28

    Basics of IT


    • Random Access Memory ( RAM )

    • Read Only Memory ( ROM )

    • Cache Memory

    • Clock Speed

    Basics of it29

    Basics of IT







    Basics of it30

    Basics of IT


    • Types of Secondary Devices:-

      • Direct Access Storage Devices

      • Sequential Access Storage Devices

    Basics of it31

    Basics of IT

    Direct Access Storage Devices (DASD):-

    It is any secondary storage device which has relatively low access time relative to its capacity.

    Historically, IBM introduced the term to cover three different device types:

    disk drives

    magnetic drums

    data cells

    The direct access capability, occasionally and incorrectly called random access (although that term survives when referring to memory or RAM), of those devices stood in contrast to sequential access used in tape drives.

    Basics of it32

    Basics of IT

    • Sequential Access Storage Devices (SASD):-

    • It is a class of data storage devices that read their data in sequence.

    • This is in contrast to random access memory (RAM) where data can be accessed in any order.

    • Sequential access devices are usually a form of magnetic memory.

    • While sequential access memory is read in sequence, accesses can still be made to arbitrary locations by "seeking" to the requested location.

    Basics of it33

    Basics of IT

    Generation of Languages:-

    Machine Language

    Low Level Language

    High Level Language

    Fourth Generation Language

    Basics of it34

    Basics of IT

    • Machine Language:-

    • Machine code or machine language is a system of impartibly instructions executed directly by  computer's central processing unit (CPU).

    • Each instruction performs a very specific task, typically either an operation on a unit of data (in a register or in memory, e.g. add or move), or a jump operation (deciding which instruction executes next, often conditional on the results of a previous instruction). 

    Basics of it35

    Basics of IT

    • Low-Level Language:-

    • Low-Level programming language is a programming language that provides little or no abstraction from a computer's instruction set architecture.

    • Generally this refers to either machine code or assembly language.

    • The word "low" refers to the small or nonexistent amount of abstraction between the language and machine language; because of this, low-level languages are sometimes described as being "close to the hardware."

    Basics of it36

    Basics of IT

    • High Level Language:-

    • A high-level programming language is a programming language with strong abstraction from the details of the computer.

    • In comparison to low-level programming languages, it may use natural language elements, be easier to use, or be from the specification of the program, making the process of developing a program simpler and more understandable with respect to a low-level language.

    • The amount of abstraction provided defines how "high-level" a programming language is

    Basics of it37

    Basics of IT

    • Fourth Generation Language:-

    • A fourth-generation programming language (1970s-1990) (abbreviated 4GL) is a programming language or programming environment designed with a specific purpose in mind, such as the development of commercial business software.

    • In the history of computer science, the 4GL followed the 3GL in an upward trend toward higher abstraction and statement power.

    • The 4GL was followed by efforts to define and use a 5GL

    • Fourth-generation languages have often been compared to domain-specific programming languages

    Basics of it38

    Basics of IT




    Basics of it39

    Basics of IT





    Basics of it40

    Basics of IT

    • LAN

    • Local area network, generally called LAN’s are privately-owned networks within a single building or campus of up to a few kilometers in size.

    • They are widely used to connect personal computers and workstations in company offices and factories to share resources and exchange information.

    Basics of it41

    Basics of IT

    • LAN’s are distinguished from other kinds of networks by three characters:

      • Their size

      • Their transmission technology

      • Their topology

    • LAN often use a transmission technology consisting of a single cable to which all the machines are attached.

    • LAN often uses various types of topologies for example tree topology, bus topology, ring topology.

    Basics of it42

    Basics of IT

    • MAN

    • A metropolitan area network or MAN is basically a bigger version of a LAN and normally uses similar technology.

    • It might cover a group of nearby corporate offices or a city and might be either private or public.

    • A MAN can support both data and voice, and might even be related to the local cable television network .

    Basics of it43

    Basics of IT

    • WAN

    • Wide area network spans a large geographical area often a country or continent.

    • It contains a collection of machines intended for running user programs.

    Basics of it44

    Basics of IT

    • Network Hardware

    • Network Interface Card(NIC):-

      • It provides an interface between the cables and the clients.

    • Hub :-

      • Hub acts as an intermediate between the Server and the Clients.

    • Switches:-

      • Switches are also called as intelligent hubs .

    • Bridges:-

      • Different LAN’s can be connected by devices called bridges , which operate on the data link layer.

    Basics of it45

    Basics of IT

    • A computer virus is a computer program that can replicate itself and spread from one computer to another.

    • The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

    Basics of it46

    Basics of IT

    • Malware includes computer viruses, computer worms, Trojan horses, most rootkits , spyware, dishonest adware and other malicious or unwanted software, including true viruses.

    • Viruses are sometimes confused with worms and Trojan horses, which are technically different.

    Basics of it47

    Basics of IT

    • A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions.

    • Worms and Trojan horses, like viruses, may harm a computer system's data or performance.

    • Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves.

    Basics of it48

    Basics of IT

    • Antivirus

    • Antivirus or anti-virus software is software used to prevent, detect and remove malware, such as: 

    • Computer viruses, adware, backdoors, malicious BHOs, dialers, fraud tools, hi , malicious LSPs, rootkits, spyware, Trojan horse and worms. 

    • Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.

    Basics of it49

    Basics of IT

    • There are several methods which antivirus software can use to identify malware.

    • 1.Signature based detection is the most common method:-

    • To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures.

    • Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces.

    Basics of it50

    Basics of IT

    • 2. Heuristic-based detection, like malicious activity detection, can be used to identify unknown viruses.

    • 3. File emulation is another heuristic approach:-

    • File emulation involves executing a program in a virtual environment and logging what actions the program performs.

    • Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.

    Basics of it51

    Basics of IT

    • Hacker Vs Cracker

    • A hacker is a person who is proficient with computers and/or programming to an elite level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker.

    • A cracker is a hacker who uses their proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts, distributing viruses etc.

    Basics of it52

    Basics of IT

    • What the hacker does with their knowledge of systems within the definition of the law is what defines them as a hacker vs a cracker.

    • It's then safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction.

    • The term cracker and hacker are used interchangeably (albeit incorrectly) largely due to the ignorance of the general populace, especially the media.

    Basics of it53

    Basics of IT

    • The major research area of IT are listed below :-

    • Electronic Commerce

    • Strategic IT Management

    • Enterprise Resource Planning

    • Supply Chain Management

    • IT Personnel Management : Careers & Competencies

    • Management of the Outsourcing of IT & Other Business Functions

    • Data mining, Data Modeling and Decision Support Systems

    • E-Government

    • Virtual Communities & Knowledge Management



    Main Reading Books:

    1. P. K. Sinha and Priti Sinha , “Computer Fundamentals”, BPB Publications, 2007.

    2. Alex Leon and Mathews Leon, “Fundamentals of Information Technology”, Leon Techworld, 2007.

    3. V. Rajaraman, “Introduction to Information Technology”, PHI, 2006.


    1. Alex Leon and Mathews Leon, “Introduction to Computers”, Vikas Publishing House,2007.

    2. Norton Peter, “Introduction to computers”, TMH, 4th Ed., 2006.

    3. Simon Haykins, “Communication System”, John Wiley & Sons, 2006.

    4. B. Basaraj, “Digital Fundamentals”, Vikas Publications, 1999.

    5. 6. V. Rajaraman, “Fundamentals of Computers”, PHI, 5th Ed., 2006.

    7. David Anfinson and Ken Quamme, “IT Essentials PC Hardware and Software Component on Guide”, Pearson, 3rd Ed., 2008.

    8. Malvino and Leach, “Digital Principles and Application”, TMH, 1999.

    9. Ramesh S. Gaonkar, "Microprocessor Architecture Programming and Application with 8085”, PHI, 2001.

  • Login