You are on page 1of 33

FUNDAMENTALS OF

INFORMATION
TECHNOLOGY 101
Facilitator: Shingi Changunda
Chapter 3
Software
3.2. Software

A system is a set of elements or components that interact to accomplish goals.

Example: car wash


Input: Dirty car, water, liquid soap, car wax
Processing mechanism: selecting which cleaning option you want
(wash only, wash with wax) and the components (the liquid sprayer, foaming
brush and air dryer) interact to create a clean car
Output: a clean car
Feedback mechanism: check how clean the car is
3.2. Software
System software manages the hardware components, e.g. Microsoft Windows

Application software consists of programs that support day-to-day business functions and
provide users with the information they need. Microsoft Office and Adobe Creative Suite

Software Personal Workgroup Enterprise


Systems Smartphone, tablet computer, Network operating Server and
software personal computer and systems mainframe operating
workstation Systems
operating systems
Application Word processing, Electronic mail, group General ledger, order
software spreadsheet, database and scheduling, shared entry, payroll and
graphics work and collaboration human resources
3.2. Software

An operating system (OS) is a set of programs that controls a computer’s hardware and acts as an
interface with application software
Combination of PCs, OS and users

Single computer & single Single computer & Multiple computers &
user multiple users multiple users
4.3.1 Functions Performed by the Operating System
The programs that make up the OS perform a variety of activities, including the following:
• Control common computer hardware functions
• Provide a user interface and manage input/output management
• Provide a degree of hardware independence
• Manage system memory
• Manage processing tasks
• Provide networking capability
• Control access to system resources
• Manage files
Common Hardware Functions

The OS enables applications to perform a variety of hardware-related tasks, such as the following:

• Get input from the keyboard or another input device

• Retrieve data from disks

• Store data on disks

• Display information on a monitor or printer


3.3.2 User Interface and Input/Output Management

• A graphical user interface (GUI) displays pictures (called icons) and menus that people use to
send commands to the computer system.
• GUIs are more intuitive to use than command-based interfaces because they try to anticipate the
user’s needs and they provide easy-to-recognise options. Microsoft Windows is one popular
operating system with a GUI.
• Although GUIs have traditionally been accessed using a keyboard and mouse, as technology
developed, people could instead use touch screens and spoken commands.
3.2. Memory management

The OS also controls how memory is accessed, maximising the use of available memory
and storage to provide optimum efficiency.

The memory-management feature of many OSs allows the computer to execute program
instructions effectively and to speed processing.
3.3.5. Processing Tasks

Task management allocates computer resources to make the best use of each system’s assets allowing
for:
• Multitasking
• Time sharing
3.3.6 Networking Capability

Most operating systems include networking


capabilities so that computers can join in a network to
send and receive data and share computing resources.

Operating systems for larger server computers are


designed specifically for computer networking
environments.
3.3.7 Access to System Resources and Security

• The OS needs to provide a high level of security against unauthorised


access to the users’ data and programs over the network.
• OS usually have a logon procedure.
• Access control for various users
3.3.8 File Management
• The OS manages files to ensure that files in secondary storage
are available when needed and that they are protected from
access by unauthorised users.

• Many computers support multiple users who store files on


centrally located disks or tape drives. The OS keeps track of
where each file is stored and who is cleared to access them.
3.3.8 File Management
Utility Programs

• Utility programs: Type of software that performs a specific task usualy related to
managing or maintaining a computer system.
• Many utilities are built into operating systems
• Utilities are also available as standalone products and security suites
• Examples: Antivirus programs, malware removers, middleware
Software Issues and Trends
Software Bugs
A software bug is a defect in a computer program that keeps it from performing as its users
expect it to perform.
Copyrights and Licenses
Most companies aggressively guard and protect the source code of their software from
competitors as well as customers. As a result, most software products are protected by law using
copyright or licensing provisions.
Freeware and Open-Source Software
Some software developers are not concerned about profiting from their intellectual property,
which has given rise to alternative copyrights and licensing agreements.
Software Upgrade
Software companies periodically revise their programs. Deciding whether to upgrade to a new
version of software can be a challenge for corporations and people with a large investment in
software.
Chapter 3
Databases
4.2. Databases and Data Modelling
A database is an organised collection of facts and information, typically consisting of two or more
related data files.
Definitions
Relational Database: A series of related tables, stored together with a minimum of duplication to
achieve consistent and controlled pool of data.
Entity: A person, place or thing about whom or about which an organisation wants to store data.
Records: A row in a table; all the data pertaining to one instance of an entity.
Fields: A characteristic or attribute of an entity that is stored in the database.
Primary key: The column or columns that contain values that uniquely identify each row in a table.
Foreign key: When a primary key is posted into another table to create a relationship between the
two, it is known as a foreign key.
4.2.2. Relationships Between Tables
4.2.3. Designing Relational Databases

A database design is also known as a data model or a database schema. It is a list of all the
tables in the database, along with all the fields, with any primary and foreign keys
identified. The approach has four stages:
a) Identify all entities.
b) Identify all relationships between entities.
c) Identify all attributes.
d) Resolve all relationships.
Chapter 5
Networks
Telecommunications, Networks and the Internet
Telecommunications refers to the electronic transmission of signals for communications, by such
means as telephone, radio and television. Here is a general model of telecommunications:
Guided Transmission Media Types
Telecommunication Hardware

Hubs connect up to 20 PCs to a network. It may be attached to a server or a backbone connection to


a server.
A bridge is a networking device that combines numerous communication networks or network
segments into a single, aggregate network.
A router is a networking device that receives, processes, and sends data packets from one computer
network to another.
LAN

Local Area Networks A network that connects computer systems and devices within a small
area, such as an office, home or several floors in a building, is a LAN.

Small workgroup network


connecting a single server to
three PCs and a laser printer
Source: Bocij and Hickey,
(2015)
MAN

A Metropolitan Area Network (MAN) is a telecommunications network that connects users and
their computers in a geographical area that spans a campus or city.
WAN

Wide Area Network (WAN) is a telecommunications network that connects large geographic regions.
Distributed processing

A distributed computer system consists of multiple software components that are on multiple
computers, but run as a single system.
Client- Server Computing Model
The client/server model involves a series of clients, typically desktop PCs, which are the access
points for end-user applications.

The clients are connected to a more powerful PC or server computer via a local area network
within one site of a company, or a wide-area network connecting different sites and/or
companies.
5.9. Securing Data Transmission
The interception of confidential information by unauthorised individuals can compromise private
information.
Encryption of data is one approach taken to protect the security of communications over both wired and
wireless networks.

You might also like