CTC 101

CTC 101 – Introduction to Information Technology Night: Before Exam Crash Guide

1. Information Technology (IT)

  • Definition: Information Technology is the use of computers, networks, storage systems, and digital devices to create, process, store, secure, and exchange electronic data.

2. What is a Computer?

  • Definition: A computer is an electronic device that accepts input, processes data, stores information, and produces output.

3. Four Basic Functions of a Computer

  • Input: Receiving data.

  • Processing: Performing calculations/operations on the data.

  • Storage: Saving information for future use.

  • Output: Producing results from the processed information.

4. Components of a Computer

  • CPU: The brain of the computer, responsible for processing instructions.

  • RAM: Temporary memory that stores data currently being used by the computer.

  • Storage: Permanent storage devices such as HDD (Hard Disk Drive) or SSD (Solid State Drive).

  • Input Devices: Devices such as the keyboard and mouse used to input data into the computer.

  • Output Devices: Devices such as the monitor and printer that output data.

5. Types of Computers

  • Personal Computers (PC): General-purpose computers for individual use.

  • Laptops: Portable computers that combine all components of a desktop computer into a single unit.

  • Mobile Devices: Handheld devices like smartphones and tablets.

  • Servers: Computers that provide data, resources, or services to other computers over a network.

  • Mainframes: Powerful computers used mainly by large organizations for bulk data processing.

  • Supercomputers: Highly advanced computers used for complex applications such as weather forecasting and scientific simulations.

  • Embedded Systems: Specialized computing systems that perform dedicated functions within larger systems.

6. Characteristics of Computers

  • Speed: Computers can process data at incredibly fast rates.

  • Accuracy: Computers perform calculations and operations with high precision.

  • Automation: Ability to perform tasks automatically with minimal human intervention.

  • Storage Capacity: Ability to store vast amounts of data.

  • Interactivity: Capability for users to interact with computers and software in real time.

7. Generations of Computers

  • 1st Generation: Characterized by the use of vacuum tubes for circuitry and magnetic drums for memory.

  • 2nd Generation: Transistors replaced vacuum tubes, leading to smaller, faster, and more efficient computers.

  • 3rd Generation: Integrated circuits further miniaturized and enhanced computer capabilities.

  • 4th Generation: Microprocessors emerged, leading to the development of personal computers.

  • 5th Generation: Focus on Artificial Intelligence (AI) and advancements in computing technology.

8. Computer Networks

  • Definition: A network is a group of interconnected devices that communicate and share resources.

  • ### Types of Networks

    • LAN (Local Area Network): Covers a small geographic area like a single building.

    • WAN (Wide Area Network): Spans a large geographic area, often a country or continent.

    • MAN (Metropolitan Area Network): Designed for a town or city.

    • WLAN (Wireless LAN): A local area network that uses wireless communication.

    • VPN (Virtual Private Network): Provides a secure network connection over the internet.

  • ### Network Components

    • Nodes: Devices that are connected on a network (e.g., computers, printers).

    • Links: Connections between nodes that facilitate communication.

    • Routers: Devices that forward data packets between networks.

    • Switches: Devices that connect devices within a single network segment.

    • Firewalls: Security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

  • ### Network Topologies

    • Bus: All devices share a single communication line.

    • Star: All nodes are connected to a central hub or switch.

    • Ring: Each device is connected to two others, forming a circular network.

    • Mesh: Every device connects to every other device directly.

  • ### Network Protocols

    • TCP/IP: Primary protocol for communication on the internet.

    • HTTP: Protocol for transmitting hypertext via the World Wide Web.

    • FTP: Protocol for transferring files.

    • DNS: System for translating domain names to IP addresses.

9. Operating System (OS)

  • Definition: An Operating System is software that manages computer hardware and software resources and provides a platform for application programs.

  • ### Functions of an Operating System

    • Process Management: Handling processes and tasks for execution.

    • Memory Management: Managing computer memory allocation.

    • File Management: Maintaining files and directories in storage.

    • Input/Output Management: Facilitating communication between the OS and hardware.

    • Security and Resource Allocation: Protecting resources and ensuring secure access.

  • ### Examples of Operating Systems

    • Windows: A widely used OS developed by Microsoft.

    • Linux: An open-source operating system known for its security features.

    • macOS: The operating system developed by Apple for its Mac computers.

    • Android: An OS designed primarily for touchscreen mobile devices.

    • iOS: The operating system developed by Apple for iPhones and iPads.

10. Application Software

  • Definition: Application software performs specific tasks for users such as writing documents, editing images, or browsing the web.

  • ### Examples of Application Software

    • Microsoft Word: Word processing software.

    • Google Docs: Cloud-based word processing application.

    • Photoshop: Image editing software.

    • VLC Media Player: Software for playing media files.

    • Games: Software designed for entertainment and play.

11. Data Management

  • Definition: Data management is the process of collecting, organizing, storing, retrieving, and maintaining data.

  • ### Benefits of Data Management

    • Improved Decision-Making: Facilitated by organized and accessible data.

    • Better Data Security: Protects against data breaches and loss.

    • Increased Efficiency: Streamlines operations and processes.

    • Higher Data Quality: Ensures data is accurate and relevant.

12. Data Mining

  • Definition: Data mining is the process of discovering patterns, trends, and useful information from large datasets.

  • ### Data Mining Techniques

    • Classification: Assigning items in a dataset to target categories.

    • Clustering: Grouping sets of objects in a way that items in the same group are more similar than those in other groups.

    • Regression: Identifying the relationship between variables.

    • Association: Discovering rules that describe large portions of data, such as market basket analysis.

13. Cyber Threats

  • Definition: Cyber threats are malicious activities targeting computers or networks to steal data, cause damage, or disrupt operations.

  • ### Types of Cyber Threats

    • Malware: Malicious software like viruses and ransomware.

    • Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

    • Denial-of-Service (DoS/DDoS): Attacks aimed at making a service unavailable.

    • Man-in-the-Middle Attacks: Interceptions that allow attackers to eavesdrop or modify communications.

    • Social Engineering: Manipulating individuals into divulging personal information.

    • Advanced Persistent Threats: Extended campaigns aimed at stealing information over time.

  • ### Cybersecurity Prevention

    • Use Strong Passwords: Ensuring passwords are difficult to guess.

    • Install Antivirus Software: Protecting against malware and other threats.

    • Update Software Regularly: Ensuring all software is current to defend against vulnerabilities.

    • Avoid Suspicious Emails or Links: Reducing the risk of phishing attacks.

    • Use Two-Factor Authentication: Adding an extra layer of security to accounts.

14. Role of IT in Education

  • Access to Digital Resources: Provides access to e-books, journals, and online resources for learning.

  • Online Communication: Facilitates communication between lecturers and students.

  • Research Tools and Simulations: Supports research activities through various tools and virtual environments.

  • Productivity Tools: Enhances learning using applications like Word, Excel, and PowerPoint.

15. Caleb University IT Systems

  • Student Portal: Platform for registering courses and checking results.

  • Exeat App: App used for applying for leave from studies.

  • Caleb Cares Support System (CCSS): System providing support services to students.

  • Caring Heart Support System (CHSS): Additional support services offered within the university.

  • University Email Management System (UEMS): Manages email communications within the university.

Key Exam Tip

  • Most questions will be definitions, lists, and short explanations. Memorize definitions and important bullet points for the exam.