Module 2 I.T NOTES
Module 2 I.T NOTES
Information Systems
● Components:
○ Hardware – Physical components (computers, servers, network devices).
○ Software – Programs that manage and process data.
○ Data – Raw facts and figures used by the system.
○ Procedures – Guidelines for operating the system.
○ Users – People interacting with the system.
○ Network – Communication channels enabling data exchange.
3. Purpose, Functions, and Types of Hardware
7. Evaluation of HCI
8. Roles of Users
Networking standards define protocols and guidelines for data communication across
networks. Two fundamental models for networking are the OSI Model and the TCP/IP
Model.
Application HTTP, FTP, User interaction and network services (email, web
(Layer 7) SMTP browsing).
Data Link Ethernet, WiFi Organizes data into frames, manages MAC
(Layer 2) (802.11) addressing, and error detection.
Physical (Layer Fiber, Ethernet Transmission of raw binary data over physical
1) cables media.
● Purpose: The OSI Model provides a structured approach for designing network
systems, ensuring interoperability across different hardware and software.
2. Transfer Control Protocol/Internet Protocol (TCP/IP) Model
The TCP/IP Model is the foundational protocol suite for the Internet. It has four layers,
simplifying OSI functionality while ensuring efficient data communication.
Application HTTP, FTP, DNS, Defines protocols for web, email, and file
Layer SMTP transfers.
● Purpose: The TCP/IP model is practical and widely used, forming the backbone
of the Internet and most modern networks.
Comparison: OSI vs. TCP/IP
3.Passwords & keys: Protect access using strong passwords and router
security settings.
13. Configure Simple Networks
● Evaluation of features:
○ Speed – Data processing and transmission rates.
○ Efficiency – Performance relative to resource utilization.
○ Portability – Mobility and usability of devices.
○ Maintainability – Ease of upgrades and repairs.
○ Storage capacity – Ability to store data securely and efficiently.
○ Transmission – Methods of data exchange (wired/wireless).
16. Compare Security Mechanisms
● Data security – Ensuring data is protected from threats and unauthorized access.
● Passwords – Essential for securing access; should be strong and regularly
updated.
● Authentication – Verifies user identity (e.g., biometric, two-factor
authentication).
● Encryption – Converts data into coded format to prevent unauthorized reading.
● Data corruption – Loss or alteration of data due to software/hardware issues.
18. Describe the Structure of the Internet as Interconnected Hypertext
Documents
● Understanding HTML:
○ Hypertext Markup Language (HTML) is the standard language for creating
web pages.
○ Extensible Markup Language (XML) – Used for storing and organizing
data.
● Basic Structure of an HTML Document:
<!DOCTYPE html>
<html>
<head>
</head>
<body>
</body>
</html>