Professional Documents
Culture Documents
Introduction To Information Technology
Introduction To Information Technology
Handout No: 01
Y. Achchuthan (achchuthany@univ..jfn.ac.lk)
Learning Outcome :
- Define the terms data, information, Information Technology (IT),
and Information and Communication Technology (ICT)
Expenses in rupees
Date
Vegetables Milk Provisions Miscellaneous Daily total
Observe that data is the raw material with which she started, and
information is processed data that allows her to initiate action to
balance her budget.
The data entered in the diary each day may be processed
in other ways too to obtain different information. For example,
if the total monthly expense on milk is divided by the monthly
income, it gives information on the proportion of the budget
spent on milk. This is shown in Fig. 1.2.
(Processing)
obtained in Fig. 1.1 is used as data in Fig. 1.2. This illustrates that
the distinction between data and information is not always clear.
The point to be emphasised is that mere facts and figures about
activities do not enable one to take decisions or to initiate
actions. Only when they are processed and presented in an
effective manner, they become useful.
1. TYPES OF DATA
second and display it on the screen of the PC. We will learn how
this is done later in this book.
Nowadays photographs are taken using digital cameras or
mobile phones. The pictures are colour pictures that are stored in
camera's or mobile phone's memory. The camera or the phone
can be connected to a PC with an appropriate connector or by
wireless and the pictures copied into the PC's memory. The
pictures can then be annotated with information such as date,
place and occasion when they were taken. They can then be
organised for easy retrieval. It is also possible to organise a
slideshow of pictures using software which is available in PCs
11
12
Disseminate
Input data ACQUIRE STORE PROCESS OUTPUT
results
14
15
16
Learning Outcome :
- Assess the uses of information technology in business and real-
life environments
19
ICT for farming:
A range of automatic machines are available today to ease
the work of the farmer who worked hard in the field. These
machines not only ease the work of a farmer but also
enables him to produce high quality yields.
Below are some of the machines used for agriculture in
developed as well as developing countries.
2.11. Transport
We can quote some of the systems which are used to
enhance the road traffic by minimising traffic jams.
Closed Circuit TV (CCTV) : This system which uses the CCTV
(Closed Circuit TV) is helpful in monitoring the road traffic,
accidents, illegal activities and take appropriate actions
accordingly.
Traffic Light Control System : These automated lights are
positioned at road junctions. These lights help in minimising
accidents by controlling the vehicle traffic and pedestrians.
2.12. Entertainment
Various ICT devices and equipment have been invented to
provide some peace of mind to human beings who are
spending a busy and restless life today. These devices
enable us to:
•listen to music to overcome a monotonous life,
•watch missed TV programmes or movies of own choice
through the internet,
•exchange information between friends and relatives who
live abroad or whom we have lost touch through social
media,
•watch high definition video using technology,
21
•surf the internet. This helps children to do learning
activities and play games
during the free time at home,
•read e-books on internet and
•take photographs of interesting places and store them in
the computer.
22
That means you need to not only have a website that's easy to
find and navigate but also maintain a social presence on sites like
Facebook and Yelp, where reviews and testimonials can easily be
seen.
You can still leverage the advantages of computers in business
marketing in other ways. You can even run a text message
campaign or develop a mobile app to take advantage of very
23
24
each attendee. You don't even need a fax machine anymore since
even faxes can be sent and received online.
25
26
27
Learning Outcome :
- Discuss the issues, ethical use of IT and ergonomics in current
business world
28
Piracy
31
Client Privacy
Advertising Online
Several online marketing issues spring from the inherent
anonymity of the Internet. It is often difficult to know the real
identity of an e-business owner. A few online businesses take
advantage of this in unethical or illegal ways. Some e-
businesses track the online activity of their customers so that
they can show advertisements based on the customer’s
32
Copyright Infringements
Due to the Internet’s free flow of information, plagiarism and
copyright infringement is a continual problem. The Digital
Millennium Copyright Act addresses plagiarism and copyright
infringement in the specific context of the Internet and e-
business. Under this law, it is illegal to use online technology
to copy and distribute legally copyrighted material, such as
photography, articles or books, music or videos.
Net Neutrality
Net neutrality is the hotly debated idea that Internet users
should have equal access to all websites. Most computers
retrieve websites at the same speed, depending on the user's
Internet account settings or service, no matter if the site is a
multibillion-dollar company or a neighbour’s blog. But some
Internet providers have the capability to deliver different
websites at different speeds. This is an issue because some
websites could pay providers to deliver their content at faster
speeds, while smaller business with less capital might not be
able to afford the faster processing, and the Internet would
lose its free-access-for-all feel. The Federal Communications
Commission currently supports net neutrality and bans
providers from participating in any program that offers extra
pay for higher speed access to any websites.
33
Ethics
Ethics is the field of study that is concerned with questions of
value or judgements.
!The discipline dealing with what is good & bad and with
moral duty & obligation
!Individual human opinions and beliefs
!Hard to define
34
35
36
possible to alter images and sounds to be almost
anything you want. A copyrighted picture can be scanned
but got the colour and order of objects in the picture
changed or otherwise altered
39
3.2.Threats to Computers and Communications
Systems
Virus
Perhaps the most well known computer security threat, a
computer virus is a program written to alter the way a
computer operates, without the permission or knowledge of
the user. A virus replicates and executes itself, usually doing
damage to your computer in the process.
Hackers
People, not computers, create computer security threats
and malware (Malware is software designed to infiltrate or
damage a computer system without the owner's informed
consent.). Hackers and predators are programmers who
victimize others for their own gain by breaking into computer
systems to steal, change or destroy information as a form of
cyber-terrorism.
Spyware
42
Phishing
A Phishing attack is when you are sent an email that asks you
to click on a link and re-enter your bank or credit card details.
These emails can pretend to be from banks, Internet service
providers, on-line stores and so on, and both the email and
the web site it links to appear genuine. When you enter your
bank or credit card details they are then used fraudulently.
Keylogger
43
45
46