1 / 20

Information Technology Basics

Information Technology Basics. Georgia CTAE Resource Network Curriculum Office, June 2009 To accompany curriculum for the Georgia Peach State Career Pathways June 2009, Kayla Calhoun & Dr. Frank Flanders. Objectives. Define modern information technology.

Download Presentation

Information Technology Basics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Technology Basics Georgia CTAE Resource Network Curriculum Office, June 2009 To accompany curriculum for the Georgia Peach State Career Pathways June 2009, Kayla Calhoun & Dr. Frank Flanders

  2. Objectives • Define modern information technology. • Explain the six functions of data management. • Compare types of networks. • List information technology applications. • Relate information technology skills to careers.

  3. Modern Definition of Information Technology (IT) • Use of computer hardware and software to manage information

  4. Six Functions of Data Management Convert Store Protect Process Transmit Retrieve

  5. Data Conversion • In order to perform any other operations, a computer must convert information into bit (binary digit) format • 0’s and 1’s • In everyday use, this is simply putting data into an electronic format that is stored and retrievable.

  6. Data Storage • After data is converted into bits, it can be stored in bytes (a string of 8 bits) • Primary storage, or memory, is located in the hard drive and can be directly accessed by the central processing unit (CPU) • Secondary storage: located outside the computer; ex: disks, CDs, USB sticks, external hard drives • Good for security purposes

  7. Data Protection • Prevention of data corruption • Limits access to data • Disk encryption • Backup – internal or external copies of data files in case of accidental data loss • Data masking – hiding specific private data within a database • Data erasure – destroys all electronic data on a hard drive to maintain privacy if it is discarded or reused

  8. Data Processing • Conversion of data into usable information • CPU • Fetches instructions for a program from memory • Decodes and reads instructions • Portions of the CPU connect and execute instructions • Writes back the results to memory

  9. Data Transmission Physical transfer of data over a medium, such as copper wire, optical fiber, or wireless Networks: enable two or more computers to share files, printers, and communicate with each other

  10. Networks • Local Area Network (LAN): contained within one building or site • Wide Area Network (WAN): connects more than one site • Ex: Internet

  11. Networks, continued Client-server: client computers are all connected by a central server; can be LAN or WAN Peer-to-Peer: computers are connected to each other, but files are not stored in a central location; can only be LAN

  12. Networks, continued • Server: large & powerful digital storage point that performs a service for other computers in a network; file, print, web, mail • Easier to maintain security and perform backups when files are centrally stored

  13. Internet • Connects millions of computers across the globe • Used for obtaining and providing information • IP Address: each computer has one; enables data to be sent to and received from a specific computer • HTML • E-mail

  14. Data Retrieval • “science of searching” • User enters a query (ex: search string on web search engine or computer hard drive) • Computer information retrieval system scores objects in database by relevancy and displays those most relevant to the query

  15. Common IT Applications Word processors: used to create and edit documents Spreadsheets: used to analyze figures and present information with graphs/charts Databases: stores information about a set of similar items

  16. Common IT Applications • Publishing: more control over formatting and arranging than word processing • PowerPoint: used in business presentations and the classroom to present factual information or for persuasive purposes

  17. Careers in Information Technology • While most workers use information stored electronically daily, IT specialists are needed to manage those information systems. • Some jobs in IT: • Network Engineer • Network Administrator • System Administrator • Database Administrator • IT Project Manager • Chief Information Officer (CIO)

  18. The Top Skills of IT Professionals are: • Computer Networking • Information Security • Database Management • Information Storage and Retrieval • Computer Programming

  19. Summary • Information technology is the use of computer hardware and software to manage information. • IT professionals use computer systems to convert, store, protect, process, transmit, and retrieve data. • Computers are connected to each other by networks.

  20. Summary, continued • Networks sometimes have one or more servers, which store files in a central location. • Some common IT software applications are word processors, spreadsheets, databases, publishing, and PowerPoint • The information age has created the new career field of information technology. • IT specialists must be prepared to learn and adapt to constantly changing technologies.

More Related