Week Three
Week Three
DEPARTMENT OF COMPUTING
2024/2025 ACADEMIC SESSION
FIRST SEMESTER LECTURE MATERIAL
COURSE CODE: CSC 112 CREDIT UNIT: 2 UNITS
COURSE TITLE: INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY
DURATION: 2 HOURS CLASS CODE: gkjpo6z LECTURE MATERIAL – WEEK 3
Components of CBIS
1. Hardware: The physical components of the system, including computers, servers,
printers, and networking devices.
2. Software: The programs and operating systems that manage and process data, including
application software, system software, and utility programs.
3. Database: A collection of organized data that is stored and managed by the system.
4. Network: The communication infrastructure that connects the hardware components and
allows data to be shared and exchanged.
5. Procedures: The rules and guidelines that govern the use and operation of the system.
Types of CBIS
1. Transaction Processing System (TPS): A system that processes and records business
transactions, such as sales and inventory management.
2. Management Information System (MIS): A system that provides managers with
reports and data analysis to support decision-making.
3. Decision Support System (DSS): A system that provides interactive analysis and
modeling tools to support decision-making.
4. Executive Information System (EIS): A system that provides senior executives with
strategic information and data analysis.
5. Expert System: A system that mimics the decision-making abilities of a human expert in
a particular field.
Characteristics of CBIS
1. Speed: CBIS processes data quickly and efficiently.
2. Accuracy: CBIS reduces errors and improves data accuracy.
3. Reliability: CBIS provides consistent and dependable performance.
4. Security: CBIS protects data from unauthorized access and breaches.
5. Flexibility: CBIS can be adapted and modified to meet changing business needs.
Benefits of CBIS
1. Improved Efficiency: CBIS automates many tasks, freeing up staff to focus on higher-
value activities.
2. Enhanced Decision-Making: CBIS provides timely and accurate data, enabling better
decision-making.
3. Increased Productivity: CBIS streamlines processes and improves workflow.
4. Better Customer Service: CBIS provides quick and easy access to customer information
and history.
5. Competitive Advantage: CBIS can provide a business with a competitive edge by
enabling it to respond quickly to changing market conditions.
Limitations of CBIS
1. High Initial Cost: Implementing a CBIS can be expensive, especially for small
businesses.
2. Dependence on Technology: CBIS relies on technology, which can be prone to errors
and downtime.
3. Security Risks: CBIS can be vulnerable to cyber threats and data breaches.
4. Training and Support: CBIS requires ongoing training and support to ensure that users
can effectively utilize the system.
5. Obsolescence: CBIS can become outdated quickly, requiring ongoing maintenance and
upgrades.
1. Keyboard
A keyboard is a primary input device used to enter text, numbers, and commands into a
computer.
2. Mouse
A mouse is a pointing device used to interact with graphical user interfaces (GUIs) and select
items on the screen.
3. Scanner
A scanner is an input device used to capture images or text from physical documents and convert
them into digital format.
4. Microphone
A microphone is an input device used to capture audio signals and convert them into digital
format.
5. Camera
A camera is an input device used to capture images or video and convert them into digital
format.
6. Touchpad
A touchpad is an input device used to interact with GUIs and select items on the screen by
tapping or gesturing on the touchpad.
7. Fingerprint Reader
A fingerprint reader is an input device used to capture and authenticate fingerprints for security
purposes.
8. Barcode Reader
A barcode reader is an input device used to capture and decode barcode data from products or
documents.
9. RFID Reader
An RFID reader is an input device used to capture and decode RFID tag data from products or
objects.
10. Game Controller
A game controller is an input device used to interact with video games and other interactive
applications.
Methods of Processing
Computer processing refers to the series of operations managed by a computer's central
processing unit (CPU), which interprets and executes software instructions. This involves
transforming input data into output data, facilitating functionalities across various devices.
Processing involves the execution of instructions and the manipulation of data by the computer's
central processing unit (CPU). The following are some common methods of processing:
3. Co-Processing
Co-processing involves the use of multiple processing components, such as CPUs and GPUs, to
perform tasks concurrently.
4. Parallel Processing
Parallel processing involves the use of multiple processing components to perform tasks
simultaneously, improving overall processing speed and efficiency.
5. Distributed Processing
Distributed processing involves the use of multiple computers or processing components,
connected via a network, to perform tasks concurrently.
6. Cloud Processing
Cloud processing involves the use of remote computing resources, accessed via the internet, to
perform tasks and store data.
Output Methods
Output is the visual, auditory, or tactile perceptions provided by the computer after processing
the provided information. Examples include: text, images, sound, or video displayed on a
monitor or through speaker as well as text or Braille from printers or embossers. Output devices
are used to display or produce the results of processing. The following are some common output
methods:
1. Monitor
A monitor is an output device used to display visual information, such as text, images, and
videos.
2. Printer
A printer is an output device used to produce physical copies of documents, images, and other
visual information.
3. Speaker
A speaker is an output device used to produce audio signals, such as music, voice, and sound
effects.
4. Projector
A projector is an output device used to display visual information, such as presentations, videos,
and images, onto a screen or surface.
5. Braille Display
A Braille display is an output device used to produce tactile output, such as Braille text, for
visually impaired users.
6. Haptic Feedback
Haptic feedback is an output method used to produce tactile sensations, such as vibrations and
forces, to simulate realistic interactions with virtual objects.
COMMUNICATIONS PORT
A communications port, also known as a serial port or COM port, is a hardware interface on a
computer that allows you to connect external devices for data transfer. It serves as a bridge
between your computer and peripherals like printers, modems, and scanners, enabling
communication between them. A communications port is a physical or virtual interface that
enables communication between devices, computers, or networks. In this section, we will delve
into the details of communications ports, including their types, functions, and applications.
2. Virtual Ports
Virtual ports are software-based interfaces that enable communication between devices or
applications over a network. Examples include:
TCP/IP ports: Used for communication between devices over the internet.
UDP ports: Used for communication between devices over the internet, particularly for
real-time applications.
Security Considerations
1. Port Security: Communications ports can be vulnerable to security threats, such as
hacking and unauthorized access.
2. Firewalls: Firewalls can be used to block unauthorized access to communications ports.
3. Encryption: Encryption can be used to secure data transferred over communications
ports.
Best Practices
1. Regularly Update Port Configurations: Regularly update port configurations to ensure
they are secure and up-to-date.
2. Use Secure Protocols: Use secure protocols, such as HTTPS and SSH, to encrypt data
transferred over communications ports.
3. Monitor Port Activity: Monitor port activity to detect and respond to security threats.
Messages are generated by AI and may be inaccurate or inappropriate.
DATA TRANSMISSION
Data transmission is the process of transferring data from one device to another through a
communication channel. In this section, we will explore the fundamentals of data transmission,
including types, methods, protocols, and applications.
1. Sender: It is simply a device that sends data messages. It can be a computer, mobile,
telephone, laptop, video camera, or workstation, etc.
2. File Sharing
Data transmission is used for sharing files over the internet, including cloud storage and file
transfer protocols.
3. Remote Access
Data transmission is used for remote access to devices and networks, including virtual private
networks (VPNs) and remote desktop connections.
2. Coaxial Cable
Coaxial cable is a type of cable used for wired data transmission.
2. Authentication
Authentication is a method of verifying the identity of devices or users before allowing data
transmission.
3. Firewalls
Firewalls are network security systems that monitor and control incoming and outgoing network
traffic based on predetermined security rules.
2. Attenuation
Attenuation refers to the loss of signal strength during data transmission.
3. Congestion
Congestion refers to the slowing down of data transmission due to high network traffic.