ICT Chapter One For Certificate

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 81

GILGELE BELSE COLLAGE OF TEACHER

EDUCATION
Introduction to ICT (ICTE341)for primary grade
Chapter one
Introductory Concepts of ICT
Outile
 Introduction ICT
 Characteristics of information
 Sources of information
 Application of ICT
04/30/2024 1
Objective
At the end of this unit, the student teachers will
be able to:
define ICT and related terms.
relate data, information and knowledge.
identify sources of information.
describe the basic characteristics of
information
mention the application areas of ICT in
education.
04/30/2024 2
Definition of ICT
Brain stormHow do you describe the term ICT?
I stands Information
 It is collection of data
 It is meaning full data
 Processed data
 Organized data
 Used to make decision making
 E.G Abebe is a student.
Data:- collection of raw facts and figures
 It is not have meaning by itself
 Not organized
 Not processed
 It used as input for making information
04/30/2024 3
Cont---
No.
Meaning of information Meaning of data
1
It is collection of data It is figures and facts
2
It is organized data It is not organized data
3
It is processed data It is not processed data
Recorded data It is not have meaning:- e.g
numbers, images, words, letters,
and sound,characters

4
E,g Abebe is a students e.g Abebe, is, a, students

C stands for Communication


 it is the exchange of message among devices
 the act of giving, receiving, and sharing information
T stands Technology
 IT is a body of knowledge used to create tools, process things,
and extract materials.
04/30/2024 4
Cont
 It is the system or knowledge how to use the technology.
 It is the system of managing information system.
 It is making, modification, adaptation and usage of tools,
techniques, systems or machine in order to solve problems.
Generally ICT
 It is the technology used to provide or access of information
using different technology.
 It is an umbrella that includes all technology for communicate
information.
 It refers to a form of technology that are used to create
information, processing, storage, retrieve, communication and
sharing of information.
 TV,Radio,Cellular phone,Computer, network hardware,Software,Satellite
system.
04/30/2024 5
Characteristics of Valuable information
 accurate - conveys the true situation.
 Timely - is available in time to make decisions.
 Complete - provides all necessary data.
 Precise - has the required level of detail.
 Flexible: used more than one purpose
 Economical
 Reliable:
 Accessible: Information should be easily accessible by authorized users.
 Simple: simple to understand
 Relevant: the information must be important to make a decision
 Verifiable and Reliable: the information must be checked whether it is
true or false sources.
 Secure: - Information should be secure from access by unauthorized
users.

04/30/2024 6
Data processing
 The data processing cycle is the set of operations used to
transform data into useful information.
 After data is processed it is converted into information
 Data is processed digitally or electronically
 We process data in order to get a usable information
Data Processing Cycle steps
Step 1: Collection. The collection of raw data is the first step of the
data processing cycle. ...
Step 2: Preparation. ...
Step 3: Input. ...
Step 4: Data Processing. ...
Step 5: Output. ...
Step 6: Storage
Step 7: Feedback
Output
Input
04/30/2024
Process 7
Conti……

There are 3 types of data processing systems:


(i). Manual:- Activities are carried out manually by human clerks mentally
(ii). Mechanical:-Systems whose activities are carried out by human clerk with the aid of
electronic calculating devices e.g. calculator.
Data is input by the human clerk but manipulation is by the
machine.
(iii).Electronic systems:-
Data processing involving sophisticated machines such as
computers.
Input should be in machine readable form.
Processing is done automatically under the influence of a set of
stored instructions (program).
Output is influenced by the type of output device in use.
Control is under the influence of stored programs.
04/30/2024 8
Sources of Information

04/30/2024 9
Aplication Areas of ICT
 In higher education: ICT can be used as a teaching tool, as a
good source of information, as a means of communication, and as a
method to improve education quality through Electronic learning(e-
learning)
 Communication: ICT can be used as one of the fastest means of
communication medium in bringing the world into one information village
through Internet.
 Telecommunications and Airline industries: - ICT also acts as
the backbone for handling, processing data and communicating
information timely in telecommunications and Airline industries .
 Research and experiments: - ICT is highly utilized in scientific
research and experiments including Astronomy.
 Data exploration and management: - In data exploration and
management of institutions and organizations, e-commerce and others.

04/30/2024 10
Aplication of ICT in Education

Computers can support meaningful learning by:


i. reducing time spent on mechanical tasks such
as rewriting, producing graphs, etc
ii. helping find information
iii. helping organize information
iv. making it easier to share information and
ideas with other

04/30/2024 11
Cont---
It provide
Computer based training, computer assisted learning,
computer assisted instruction programs are available, and
they can be used to improve the teaching- learning process.
The use of Internet facilitates communication among
students and teachers
students can use computers to learn reading and writing, to
prepare reports, gathering and analyzing data, communicate
their ideas using pictures, tables and graphs, record sounds
ICT can enhance the quality of education in several ways: by
increasing learner motivation and engagement, by
facilitating the acquisition of basic skills, and by enhancing
teacher training
ICTs have also been used to improve access to and the
quality of teacher training.
04/30/2024 12
ICT and E-learning
E-learning is a type of learning that is
facilitated and supported via information and
communications technology (ICT).
It is called
Web-based training
 computer-based training or web-based learning,
online learning are a few synonymous terms that have
over the last few years been labeled as e-Learning.
“just-in-time”
It is flexible learning

04/30/2024 13
Distance Learning

• It has 3 meanings
 Distance Education
 Distributed Learning
 Remote Education.

Distance Learning will be defined by the


following criteria:
 The teacher and students are separated by distance
 The instruction is delivered via print, voice, video, or
computer technologies
 The communication is interactive in that the student receives
support and feedback from the teacher. The feedback may be
immediate or delayed.

04/30/2024 14
Types of Distance Learning
• It divided into
A. Synchronous delivery:- the teacher and the student
interact with each other in "real time. Example telephone
conversations and video conference.
B. Asynchronous delivery:- does not take place
simultaneously. Example email

04/30/2024 15
Benefits of Distance Learning
Convenience: distance learning technologies can provide
convenient locations for both students and instructors.
 Flexibility:
 Effectiveness: distance learning is both convenient and effective.
 Multi-sensory: there is a wide variety of materials that can meet
everyone's learning preference. For example, some students learn from
visual stimuli, such as video, and others learn best by listening or
interacting with a computer program.
 Interactivity:

04/30/2024 16
End of chapter
Comments
Question welcome!!!

04/30/2024 17
Chapter two
computer
Outline
 Computer
 Generation of computer
 Types of computer
 Characteristics and limitation of computer

Objective of the chapter


At the end of this chapter the student will answer:
 Describe about the meaning of computer
 List and explain each generation of computer
 Compare and contrast each types of computer
 Discus among each other about the characteristics of computer
04/30/2024 18
Definition of Computer
 Computer is a word derived from the Greek term compute
which means to calculate.
 Computer is an electronic device that accepts and processes
data, store and display results by the control of instruction.
Generation of computer
Based on the following computer divided into five parts
 Dominant type of electronic circuit elements used.
 Major secondary storage media used.
 Computer language used.
 Types or characteristic of operating system used.
 Memory access time (time to store or retrieve a word or
data from memory).

04/30/2024 19
First Generation
 The period of first generation was 1946-1959
 IT was used vacuum tubes for processing data.
 were very expensive and could be afforded only by very large
organizations.
 mainly batch processing operating system were used.
 The operating speed was quite slow.
 Punched cards, paper tape, and magnetic tape were used as input and
output devices
 magnetic drams were used for internal storage.
 They used primitive or operator controlled operating system(machine
language)
 Power consumption was very high.
 Large size and has small speed. Some computers of this generation were:
 ENIAC
 EDVAC
 UNIVAC
 IBM-701
 IBM-6
04/30/2024 20
Second generation of computer

 The period of second generation was 1959-1965.


 Use of transistors
 The concept of CPU, memory, programming language, input and output
units were developed during this period of generation.
 magnetic cores were used as primary memory and magnetic tape and
magnetic disks as secondary storage devices.
 They still relied on punched card for input and printout for output.
 used batch processing and multiprogramming operating system.
 Reliable in comparison to first generation computers
 Smaller size as compared to first generation computers
 Generated less heat as compared to first generation computers
 Consumed less electricity as compared to first generation computers
 Faster than first generation computers
 till very costly
 Supported machine and assembly languages - They require less
frequent maintenance
04/30/2024 21
Third Generation
 The period of third generation was 1965-1971.
 Used Integrated circuit for processing data
 They were use magnetic disk as secondary storage
 Remote processing, time-sharing, multi-programming operating
system were used and structured programming language were
introduced.
 Smaller size
 Generated less heat
 Faster
 Lesser maintenance
 Still costly
 Consumed lesser electricity
 Supported high-level language
 More reliable in comparison to previous two generations
04/30/2024 22
Fourth generation
 The period of fourth generation was 1971-1980.
 Uses very large scale integration (VLSI) for processing data
 Fourth generation computers also saw the development of GUIs,
the mouse and handheld devices.
 They more powerful, compact, reliable, and affordable
 In this generation time sharing, real time, networks, distributed
(virtual) operating system were used.
 Very cheap
 Portable and reliable
 Use of PC's
 Very small size
 Pipeline processing
 Concept of internet was introduced
 Great developments in the fields of networks
04/30/2024 23
Fifth Generation

The period of fifth generation is 1980-till date.


Uses Ultra Large Scale Integration for processing
data
This generation is based on parallel processing
hardware and AI (Artificial Intelligence)
software
AI includes:
 Robotics
 Neural Networks
 Game Playing
 Development of expert systems to make decisions in real life
situations.
 Natural language understanding and generation.
04/30/2024 24
Cont.----

The main features of fifth generation are:


 ULSI technology
 Development of true artificial intelligence
 Development of Natural language processing
 Advancement in Parallel Processing
 Advancement in Superconductor technology
 More user friendly interfaces with multimedia feature
 Availability of very powerful and compact computers at
cheaper rates.
 Some computer types of this generation are:
 Desktop
 Laptop Note
 Note Book
 Ultra Book
04/30/2024  Chrome Book 25
Classifications of Computer
Classification of Computers are classified according to:
I. storage capacity and performance efficiency
II. The type of data they handle and process.
III. The purpose they are designed
storage capacity and performance efficiency
A, Super computer
 Support Multi-user
 Support multiprocessor
 very high efficiency and storing capacity.
 They are the largest of all computers in terms of their physical size, storage capacity,
processing speed and their cost.
 They are specially used to solve scientifically complex problems such as
 forecasting the weather and global climates
 for military research
 defense systems
 designing automobile
 Aircraft
 space craft designing.

04/30/2024 26
B. Mainframe Computer:
It is the second powerful multi-user computer
used in large business organizations, industries
and in defense to process data of complex nature.
It responds for several hundred requests very
quickly.
It uses several CPU for data processing.
More than 100 users can use mainframe
computer at a time because it works on time
sharing mode.
Its word length is 48 bits to 64 bits.

04/30/2024 27
C. Minicomputer(mid range)
Minicomputers are larger and more powerful than
most microcomputers
are smaller and less powerful than mainframe
computers.
 Minicomputers can do all the tasks of mainframe
computers but in a reduced scale. So
minicomputers are multi-user computer and
support more than dozens of people at a time.
It is costlier than microcomputer.
They are used small to medium sized organizations
such as universities
04/30/2024 28
D. Microcomputer

Microcomputers are the most popular and


widely used type’s computers.
They are also known as Personal computer
(PC) because they are single user computers.
Students, professionals other individual use
them due to their small size, low price, and low
maintenance cost and easy in 10 operation.
There are many different types of
microcomputers, such as Desktop, Laptops,
tablet computers and smart phones.
04/30/2024 29
II. Classification of computers based on type of data they handle

A. Digital computers
 Digital computer is electronic devices that process discrete data and
calculations using digits represented by number forms in high speed.
 Binary system is used to represent the values of variables and quantities.
B. Analogue computers
 work on wave’s principle. T
 hey are used in specific to measure continuous flow of data which can
expressed in tangible quantities such as atmospheric pressure, temperature,
and voltage.
 They are used in scientific and engineering fields to give round results.
C. Hybrid computers
 incorporate the qualities of the previous two types (digital and analogue).
 They are used in scientific fields processing necessary data from both kinds.
 They are characterized by their digital processing the ability to store data,
high accuracy, and the ability to create arithmetic functions (correlations).
 Their disadvantages high cost, inevitable errors, and overlapped
programming

04/30/2024 30
III. Classification of computer based on their purpose Computers

a. General Purpose computers


 Designed for multipurpose functions such as salaries
and wages, and processing the storage operation in
factories and establishments, analyze sales for they
are flexible to assure efficiency, commercial,
scientific, medical, and engineering fields.
b. Special Purpose computers
 Designed for specific functions such as early alarm
devise and computers used in industrial operations,
which may be microcomputers or minicomputer

04/30/2024 31
04/30/2024 32
CHARACTERISTICS OF COMPUTER
 Speed: computers can work very fast
 it measured using HZ
 micro second (10-6 one millionths)
 nano second (10-9 one billionths)
 Pico second (10-12 one trillionths).
 Storage: can store a large amount of data
 computer capacity measured using byte.
 Hierarchy of byte
 bit
 Byte
 Kilobyte
 Megabyte
 Gigabyte
 terabyte
 Accuracy: computers are free of committing errors by themselves unless there is error
from the user.
 Automatic: Once a program is in the computer’s memory, it continues without the need
for human intervention until completion.
 Versatility: computers now days are general purpose
 Diligence: free from tiredness, lack of concentration, fatigue, etc. It can work for hours
without creating any error
04/30/2024
 Power of remembering 33
Limitation of computers
 Can’t Think:
 No Feeling: It does not have feelings or emotion, taste,
knowledge and experience.
 No IQ: Computer is a dumb machine and it cannot do
any work without instruction from the user.
 Computer can only operate on the user provided data.
 A computer needs well-defined instructions to perform
any operation.
 It cannot identify its problem.
 It cannot decide the input needed to solve the problem
 Software that generate automatically is also designed by
humans
 Computers are merely tools, useless without humans 34
04/30/2024
End of chapter 2
!!!!!!!
If you have any comment, please write by
biresb5@gmail.com

04/30/2024 35
Assignment
Define about:-
1. Batch processing
2. Parallel processing
3. Punch card
4. Magnetic drum
5. High level language

04/30/2024 36
Chapter 3
Computer Systems
Unit Learning Objectives
At the end of this unit, the student teachers will
be able to:
 Describe the components of computer system.
 Distinguish Hardware and software components of the computer system.
 State the functions of computer hardware
 Identify the units of data representation
 Explain the main purpose of system software and application software.

04/30/2024 37
Computer system

A system is a group of related components that are


working together to achieve some defined goal or
objectives or purpose.
A Computer system is a group of hardware
components and associated software, designed and
assembled to perform a specific function or group of
functions.
In general a complete computer system includes four
distinct parts: Data, Users, Hardware and Software.
A computer system has two main parts namely
hardware and software

04/30/2024 38
Physical setup of computer

04/30/2024 39
Physical setup of computer
The System Unit
 is also called a case
 It is a box that houses the motherboard
The motherboard
 this is the largest rectangular circuit board
inside the computer
 in which processor and RAM chips are plugged
 provides connectivity to all parts of the
computer

04/30/2024 40
Cont.…
 It also limits the computer’s speed
 Used to expand the capability of a computer by adding different
boards

 Keyboard and Mouse: They are input devices used to enter


inputs in the form of data and instructions into the computer
memory.
 Monitor, Speaker and Printer: they are output devices used
for displaying results of processing back to the user.
04/30/2024 41
Operational Setup of Computers

04/30/2024 42
Hardware Components
• Is a parts of computer which is called peripheral
• The touchable parts of the computer
• The physical part of the computer
• Examples of Hardware
 Monitor, printer, modem….
 Keyboard, scanner, motherboard…..
 Mouse, CPU, RAM, NIC, CMOS battery….

Types of hardware
A, input devices
B, Output devices
C, Process devices
D, Storage devices
04/30/2024 43
Input devices
It is defined as an electronic device that allows
the user to feed information (data) into the
computer for analysis, storage, and to give
commands to the computer.
Input devices can be classified into the following
categories:
Keyboard:- the user can type text and execute commands.
Keyboard:- parts of keyboard
Alphanumeric key pad ( A,B,C,….Z) used for typing
Numeric key pad(0,1,2,3,…9 ,+,-,*,/)
Function key( F1,F2,F3,…..F12)
Modifier key (Alt, Ctrl, Shift)
Cursor movement key :- used to move cursor
04/30/2024 44
Pointing device
it is used to communicate with the computer
by pointing to location on the monitor screen.
user can move a cursor on the screen and
perform move, click or drag operations.
 used to communicate with the computer by pointing
 Some of the commonly used pointing devices are
Mouse
Trackball
Joystick
Light en

04/30/2024 45
Cont.….

Scanning devices:
Used to convert images such as pictures and
text into digital images
The digital image can be manipulated by
computer

Microphone
 Used to accept and convert audio input into
digital data

04/30/2024 46
Output Devices
convert machine readable data or information
into human readable form
The computer output generated by output
devices is of two forms
Hard copy information
Soft copy information
• Examples of output devices are:- monitor,
printer, Speaker, PC projector…etc
Monitor:-
 Display processed data in the form of image
 Monitor is classified based on
a) The color they produce
04/30/2024 47
b) The type of technology they use
Cont.
 Based on the color they produce monitor is classified into three:
a) Monochrome: single color monitors
b) Gray scale : black and white monitors
c) Colored : produce and use multiple colors.
Monitor
 Based on the technology they use, monitors are classified as
I. CRT (Cathode Ray Tube):- –These monitors use three electrodes each
representing the three primary colors (Red, Blue and Green). The dots are
grouped into picture elements called pixels, which glow when struck by electrons
II. LCD (Liquid crystal Display):-LCD displays are made of two layers of a polarizing
material with a liquid crystal solution in between. An electrical signal makes the
crystals line up in a way that keeps light from going through entirely or just
partly.
• Printer:-
 peripheral device that produces a hard copy
• Speaker:-
 Outlets the Audio data/information
• PC Projector:-
 Projects/ displays monitor data in large on the screen
04/30/2024 48
Processes devices
CPU central processing unit
 It is the portion of the computer system
 Some time called brain of computer or processor
 Carries out the instructions of computer program
 Perform the basic arithmetical, logical, and input operations
 It is considered to be the brain of the compute
 It is a place where data is processed
 It has two major function
1. It co-ordinates and controls the computer’s activities
2. It performs arithmetic and Logic operations using bits

 CPU has three major parts

 ALU ( Arithmetic and Logical Unit):- Performs numerical arithmetical & Logical (=,+,-,, /, shift,

Rotate, and, or, implication, negation)

 Control unit:-control the over all operation


 directs and coordinates all operation
 Activates the appropriate circuits necessary for inputs and output devices
 Causes the entire computer system to operate in an automatic manner
 Register:- special kind of memory in the CPU
 It store data & instruction currently used by CPU
04/30/2024 49

Storage Device or Computer Memory
• Is a place where data and instruction are stored
• The storage unit comprises of two types of storage
Primary Storage or Main Memory
Secondary or Auxiliary Storage Devices

04/30/2024 50
Primary Storage or Main Memory

It is also called internal storages or memory


Called main storages
Are located in the motherboard
Is divided in to RAM and ROM
store programs and data currently being processed
by CPU
If power off, data/instruction will be lost
Temporary storage or volatile

04/30/2024 51
Cont.
 (RAM)-Main Memory has several uses
 Input area – where the data is stored
 Operating system – controls the operation of the computer
 Working storage – where calculations are performed and
data is stored temporarily
 Output area: where the information is stored prior to output
 Application program area – where the user program is held
Read Only Memory(ROM)
 Is non-volatile storage
 Store programs that put by computer manufactures
 It contains a BIOS( basic input output system) reference
 It controls the keyboard, monitor, and disk drive and so on.

04/30/2024 52
Secondary or Auxiliary Storage Devices

• It is much cheaper than primary storage


• It holds the program instructions, data, and information
• It is permanent data/information storage
• two technologies for secondary storage
a) Magnetic storage:-
 Floppy disk, hard disk, magnetic tape
b) Optical storage:-
 CD-ROM, DVD-ROM, CD-R, CDRW

04/30/2024 53
Software
• Is a set of instructions that tell the computer hardware how, what and when
to do a given task or operation
• It is a sequence of instructions stored in the memory of the computer
system
• It is an executable file(.exe)
• Software can be categorized in to
a) System software
b) Application software
• System software
a) Operating system
b) Utility program
c) Programming language
I. Low level language:- COBOL, FOTRAN
A. Machine language
B. Assembly language
II. High level language :- C++, VB, Java….
04/30/2024 54
Units of Data Representation
 Bit: It is the smallest unit of memory. A bit has the value 0 or 1
but not both.
 Byte: One byte means a group of eight bits.
 Kilobyte (KB). A kilobyte (KB) is 1,024 bytes. (1KB=210 bytes)
 Megabytes (MB) - (MB) is approximately one million bytes
(1,048,576bytes, or 1,024 kb or 1,024 × 1,024 bytes, to be exact).
• Gigabyte (GB). Giga means one billion. A gigabyte (GB) is actually
1,073,741,824 bytes or 1,024 MB (i.e., 1,024 × 1,024 × 1,024
bytes). The storage capacity of a hard drive in modern personal
computer is often many gigabytes.
• Terabyte (TB): One trillion bytes (actually, 1,099,511,627,776
bytes) is a terabyte (TB).
• Word: Word refers to the number of bits or bytes that a
computer process at a time or a transmission media transmits at
a time. Computer is either 32 bits or a 64 bits that indicate the
amount of data it can process at a time.
04/30/2024 55
System software
 a set of one or more programs designed to control the operations
 It performs the following functions
 Provides user interface
 Monitors the effective use of various hardware resources
 Support the development and execution of other application
software
 Programming language
 primary interface of a programmer with a computer
 development of software
 System Utilities
 performing tasks of routine nature
 help users in maintenance tasks
 formatting a hard disk
 scanning a compute
04/30/2024 56
Operating system
 controls the resources of a computer system
 provides a link between the hardware, application
software and the computer user
 Recognizing input from the keyboard
 Sending output to the display screen
 Keeping track of files and directories on a disk
 Controlling peripheral devices
 The most widely used operating system software
o MS –DOS,
o Windows 95,
o Windows 2000,
o Windows XP,
o Windows Vista,
o Windows 7,
o Window 8.1, 10
o
04/30/2024, Mac, 57
o UNIX
Application Software

• used to accomplish specific tasks


• It consists of single program
• It may consists a package program
• Examples of application software
Word processor (wordpad, notepad, MS word)
Spread sheet (MS Excel, Lotus 1-2-3)
Database Management Systems (DBMS)( Access,
Sql)
Desktop Publishing (DTP) ( publisher)
Presentation Software ( power point)

04/30/2024 58
Cont.

04/30/2024 59
UNIT four
computer network and internet
Outline
Computer network
Types of networking
Advantage and disadvantage of networks
Internet
Search engine
Malicious program
ethical and unethical uses ICT

04/30/2024 60
Objective of the chapter
At the end of this unit, the student teachers will be
able to:
 Define terms related to computer networks and
internet.
 Explain advantages and disadvantages of computer
networks.
 Defines search engines and their effective searching
techniques.
 State malicious software and computer securities
 Differentiate the difference between ethical and
unethical uses ICT
04/30/2024 61
Computer network
 Network :- connection of more than one computer.

 Linking of computer and other network devices such


as switch, router, hub, bridge, etc together in order
to share resources.
04/30/2024 62
Advantages of computer network

 User access control: sensitive information are used by only owner


users.
 Information storing and sharing:
 Connections: Administrators, instructors, and even students and
guests can be connected using the campus network
 Services: Colleges, universities and schools can provide services,
such as registration, school directories, course schedules, access to
research, and email accounts
Internet: The school can provide network users with access to the
internet, using gateways.
• Computing resources: The school can provide access to special
purpose computing devices which individual users would not
normally own.
 Flexible access: School networks allow students to access their
information from connected devices throughout the school.

04/30/2024 63
DISADVANTAGES OF NETWORKS

Expensive to install:
Requires Administrative Time:
Servers Fail
Cables May Break:
Security and compliance

04/30/2024 64
Types of Computer Networks

Computer networks can be classified based on two main methods.


A. Based on geographic coverage
B. Based on security and access
• Classification Based on Geographic Coverage
1. Local area network (LAN)
 Cover a small geographical area, such as an office, building or campus.
 It connects computers and other devices within a
limited physical geographic area such as an office, classroom, building etc.
2. Metropolitan area networks (MANs)
 Covers town or city
 Collection of LAN
 They typically use wireless infrastructure or optical fiber connections to link their sites.
3. Wide area network (WAN)
 it is collection
 It covers large geographical area
 Connects connect continent to connect
 LANs connect to other LANs with the help of network devices called routers.
 The biggest WAN in the world is, is called the Internet.

04/30/2024 65
Classification Based on Security and Access
a. Peer-to-peer networks:
 in this type of network all computers are equal.
 Peer-to-peer networks are characterized by the following:
 Security is not centralized
 Network is not scalable; it is good only for 10 or less number of computers.
 Each user is responsible for taking local backup.
 No specialized network operating system software is required
b. Client/server networks:
Server :- provide resource to the client(response to client)
Client :- get data from server(request to get resources)
Characteristics of Client/Server network
 The network has centralized, tighter security.
 The network is highly scalable; you can have tens of thousands of
workstations in the network
 Backup is centralized and is done by a person responsible for the job
(backup operator).
 Specialized networking operating systems are required, such as
04/30/2024 66
Windows NT 4.0 server, Windows 2008 server, Novell NetWare, etc.
Internet

 The Internet is a huge collection of computer


networks that can communicate with each other
 Network of networks
 It is a collection of internetworked computer networks around
the world used for communication and sharing of global
resources among different individuals, institutions and
organizations.
How the Internet Works
i. A physical connection between the computers
II. Using TCP/IP connection protocol
Methods of Making Connected to Internet:
 dial-up :dialing into an Internet service provider's (ISP) computer
 Broadband or leased line: direct connection to an Internet
service provider’s broad band or leased line internet connection.
04/30/2024 67
Internet Protocols
 Protocols are the formal rules governing the exchange of information
between computers so as to provide reliable and efficient transfer of
information.
Uses of TCP and IP Protocols
 TCP: it divides the data into manageable units called packets and attaches
to each packet the information necessary to reassemble the data and check
for errors.
 IP (Internet protocol) :labels all the packets with a header containing the
address of the destination and sends them on their way.
Basic Internet Terms
 Web Server:-it responds to the requests that comes from web browsers for
Internet resources.
 Home Page :-the first hypertext document to be shown when a user
follows a link to the web server.
 Hyper Text Transfer Protocol (HTTP)- the protocol used by the Web to
transfer hypertext documents and other Internet resources.

04/30/2024 68
cont.…

Uniform Resource Locator (URL)


 a special scheme that tells the user exactly where a resource
is located on the Internet.
 It refers to the complete address of resource located on a
computer on the Internet. For example: http://
www.hcte.edu.etc
 Web Browser - a program that allows a user to display and
interact with a hypertext document. Both browsers have a
simple toolbar for navigating the web including buttons to
move backward and forward through pages you have visited,
as well as buttons to reload the current page

04/30/2024 69
Services of the Internet

1. Web (WWW)World Wide :-


 is a vast collection of documents stored on Internet computers.
 WWW uses Hypertext Mark-up language (HTML) to design a web document.
The web documents contain links that lead to other web pages and they contain graphics,
sound and so on
A, The web is not linear :-a user can click on any of the links and jump to the related
document.
B, The web is rich in media elements – it includes text, voice, video, pictures, etc.
C, The web is interactive - A web user can fill in forms on-line, run programs, select options
2. E-Mail ( Electronic Mail) :-a user can send and receive mail through computers to and from
any Internet user.

 E-mail can be used transmit text, messages, audio and video clips.
 E-Mail allows users to send a message to just one user or a group of users.
 Large documents can be attached.
 Users can read, print, forward, answer or delete a message.
 E-mail is much cheaper and faster in comparison to other communication services.
 Each E-mail user is assigned a unique address, which is used by the e-mail network to
deliver the message.
04/30/2024 70
Cont.…

3. FTP (File Transfer Protocol)


 It allows a user to transfer data between computers on
the Internet.
 It can send and receive data to/from any distant
computer on the Internet from/to the user's computer.
 It provides commands that allow users to manage files.
 The ftp applications allow the users to download files
from computers connected to the Internet.
4. Search Engine

 Search engines are special software used on internet for


searching different types of information around the world

04/30/2024 71
videoconference
 A videoconference is a live connection between people in separate locations for the purpose
of communication, usually involving audio and often text as well as video .
 It also known as a video teleconference
 is a set of interactive telecommunication technologies which allow
two or more locations to interact via two-way video and audio
transmissions simultaneously.
Impact of Video Conferencing on Education

 It provides students with the opportunity to learn by participating in a 2-way


communication platform.
 Students from diverse communities and backgrounds can come together to learn
about one another.
 Students are able to explore, communicate, analyze and share information and
ideas with one another.
 students can visit another part of the world to speak with others, visit a zoo, a
museum and so on, to learn.
04/30/2024 72
Requirements for Video Conferencing
1. Hardware requirements for Videoconferencing:
 PC with fast processing speed and large RAM
 Video camcorder which requires a video capture card
 Speaker and Microphone
2. Internet connection requirements for Videoconferencing:
 ISDN or ADSL or Two way cable modem
 Other high speed connection
3. Software
 CU-SeeMe is a videoconferencing program which combines
audio, video and text-based chat capabilities
 Microsoft's NetMeeting is an Internet videoconferencing
package. It can be used over the local LAN, the Internet, ISDN,
or over 14.4kbps pus modems.

04/30/2024 73
Malware:-
 it t is software designed to damage a computer system without the
owner's knowledge.
 It includes:-
 computer viruses:-program or file enabling it to spread from one
computer to another. it can damage your hardware, software or files. all
viruses are attached to an executable file, which means the virus may exist
on your computer but it actually cannot infect your computer unless you
run or open the malicious program. t is important to note that a virus cannot
spread without a human action .it transfer from device to device by sharing
infecting files or sending e-mails with viruses as attachments in the e-mail
and when using secondary storage.
 worms:- is similar to a virus by design and is considered to be a sub-class
of a virus. It spread from computer to computer, but unlike a virus, it has
the capability to travel without any human action. The biggest danger
with a worm is its capability to replicate itself on your system. worm
consumes too much system memory or network bandwidth, causing
Web servers, network servers and individual computers to stop
04/30/2024 74
responding.
 Trojan horses:-will appear to be useful software but will actually
do damage once installed or run on your computer. It causes
changing your desktop, adding silly active desktop icons) or
they can cause serious damage by deleting files and destroying
information on your system.
 Spyware:- is a malicious program and is similar to a Trojan horse
in that users unwittingly install the product when they install
something else. Spyware can gather information about e-mail
addresses and even passwords and credit card numbers.
 It is not the same as defective software, that is, software which has
a legitimate purpose but contains harmful bugs.

04/30/2024 75
Computer security and ICT ethics
Computer security :-it is the process of ensuring confidentiality, integrity, and
availability of computer, their programs, hardware devices and data. Hence, lack of
computer security results from failure of these three properties
 Lack of confidentiality is unauthorized access to a computer system or a program.
 A failure of integrity results from unauthorized modification of data or damage to
computer system or program.
 A lack of availability of computing resources results in what is called denial of
service.
 Threat:- An act or event that has the potential to cause a failure of computer
security
 Vulnerabilities:- Threats that are not countered by controls
 Kinds of controls are physical, administrative, logical, cryptographic, legal, and
ethical.
 To prevent theft of or damage to the hardware
 To prevent theft of or damage to the information
 To prevent disruption of service.

04/30/2024 76
Common Signs of Infection of Computers by Malwares
Here are a few primary indicators that your system might be infected
 Runs consistently slower than normal
 Stops responding or locks up often
Crashes and restarts every few minutes
 Restarts on its own and then fails to run normally
 Applications don't work properly
 Disk drives are inaccessible
 Printing doesn't work correctly
 You see unusual error messages
 You see distorted menus and dialog boxes

04/30/2024 77
Methods of Protecting your Computer against Viruses

Protect your computer current with the latest updates


 Use a firewall:- it is a system that prevents unauthorized
use and access to your computer. A firewall can be either
hardware or software.
 Subscribe to industry standard antivirus software and keep it
current.
Never open an e-mail attachment from someone you don't
know.
Avoid opening an e-mail attachment from someone you know,
unless you know
exactly what the attachment is. The sender may be unaware
that it contains a virus.
If you use Microsoft Office applications, it's a good idea to keep
them updated too .
04/30/2024 78
ICT ethics
 Ethics is set of standards of “rights” or “wrong” or “good” or “bad” in one’s
conduct.
 It is a guiding principle used for deciding what is right and what is wrong.
Ethical uses of ICT

 Ethics in ICT is all about “rights” and “duties”.


 There are three “rights” which are
 Right to know:- about to know which extent to in using a database to access
information.
 property right:- our computer is being protected; we cannot misuse or abuse
our computer. For example, we can protect our computer from viruses.
 right to privacy:- students are also responsible to protect their password from
being used by other people.
 Students are also advised not to leave their confidential information on the screen
without switch their computer properly logged off.
 student is to protect the confidentiality of our computer resources from unauthorized
access.
 Students can also share their knowledge that they get from internet
04/30/2024 79
 Generally good ethics is always practical especially when we use a
computer at school or at work.
Unethical uses of ICT

 Plagiarism:-means using someone intellectual property such as


ideas and written works and claim that ideas is yours. Students
always do the plagiarism by copy and paste in order to
accomplish their assignments or thesis.
 Hacking:-is breaking into computer systems for unauthorized
purposes, which may be either malicious or non-malicious.
modifying or destroying files to which one has not been granted
access, releasing computer viruses, stealing passwords or files and
exposing personal information.
 improper use of ICT resources:-Students may use the college
internet resource to download or view or store content that is
either illegal or against the colleges’ ICT usage policies.
04/30/2024 80
End of the course
If you have comment and any problem, you can
ask!!!!!

04/30/2024 81

You might also like