0% found this document useful (0 votes)
1 views14 pages

Module 2 I.T NOTES

The document provides an overview of information systems, their components, types, and the roles of users, including IT professionals and end-users. It covers hardware and software functions, human-computer interaction, network components, and security mechanisms. Additionally, it explains the structure of the internet, HTML for web page development, and troubleshooting network issues.

Uploaded by

EMMA SLAY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views14 pages

Module 2 I.T NOTES

The document provides an overview of information systems, their components, types, and the roles of users, including IT professionals and end-users. It covers hardware and software functions, human-computer interaction, network components, and security mechanisms. Additionally, it explains the structure of the internet, HTML for web page development, and troubleshooting network issues.

Uploaded by

EMMA SLAY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1.

Information Systems

●​ Definition: Systems that collect, process, store, and distribute information.


●​ Types:
○​ Transaction Processing Systems (TPS) – Handles routine transactions (e.g.,
point-of-sale systems).
○​ Management Information Systems (MIS) – Provides structured reports for
management decision-making.
○​ Office Automation Systems (OAS) / Knowledge Work Systems (KWS) –
Supports office tasks and professional knowledge work (e.g., word
processors, CAD software).
○​ Decision Support Systems (DSS) – Helps in decision-making using data
models and analytics.
○​ Executive Information Systems (EIS) – Provides high-level summaries for
executives.
○​ Expert Systems – Mimics human expertise for problem-solving (e.g.,
medical diagnosis software).
●​ Personnel: Users include IT professionals, managers, and end-users.
●​ Major Inputs and Outputs:
○​ Inputs: Data, transactions, user queries.
○​ Outputs: Processed information, reports (detailed, summarized,
exception-based, ad hoc).

2. Relationship Among Components in an Information System

●​ Components:
○​ Hardware – Physical components (computers, servers, network devices).
○​ Software – Programs that manage and process data.
○​ Data – Raw facts and figures used by the system.
○​ Procedures – Guidelines for operating the system.
○​ Users – People interacting with the system.
○​ Network – Communication channels enabling data exchange.
3. Purpose, Functions, and Types of Hardware

●​ Purpose: Enables data input, processing, storage, and output.


●​ Functions:
○​ Input Devices – Capture data (e.g., keyboard, scanner).
○​ Output Devices – Display or produce results (e.g., monitor, printer).
○​ Storage Devices – Retain data (e.g., SSD, cloud storage).
○​ Processors – Execute instructions (e.g., CPU).
○​ Peripheral Devices – Extend functionality (e.g., external drives, routers).

4. Purpose, Functions, and Types of Software

●​ Purpose: Facilitates operations, system control, and data management.


●​ Functions:
1.​ Application Software – Performs specific tasks (e.g., word processors, database
software).
2.​ System Software:
○​ Operating Systems – Manages hardware and software resources (e.g.,
Windows, Linux).
○​ Language Translators – Convert programming code (e.g., compilers,
interpreters).
○​ Utilities – Perform maintenance tasks (e.g., antivirus, disk cleanup).
3.​ Embedded Systems – Specialized software in devices for monitoring and control
(e.g., medical devices, smart appliances).

5. Importance of Data and Information

●​ Data: Raw facts and figures (e.g., transaction records).


●​ Information: Processed and meaningful data used for decision-making.
●​ Decision-Making Levels:
○​ Strategic – High-level planning (e.g., company expansion).
○​ Tactical – Mid-level management decisions (e.g., resource allocation).
○​ Operational – Day-to-day processes (e.g., inventory management).
●​ Structure of Information:
○​ Structured – Organized and predefined (e.g., database records).
○​ Semi-Structured – Partially organized (e.g., emails).
○​ Unstructured – Unorganized data (e.g., social media posts).
6. Types of Human-Computer Interaction (HCI)

●​ Forms-Based – Data entry fields and structured forms.


●​ Menu-Based – Options presented as selectable lists.
●​ Command Line Interface (CLI) – Text-based commands for system interaction.
●​ Natural Language – Allows users to interact using spoken or written language.
●​ Graphical User Interface (GUI) – Uses visuals like icons and windows.
●​ Speech-Based – Voice commands for interaction.
●​ Direct Manipulation – Users interact directly with objects on the screen (e.g.,
touchscreens).

7. Evaluation of HCI

●​ Principles & Guidelines:


●​ Ease of Use – User-friendly design.
●​ Ease of Learning – Quick adaptability for new users.
●​ Ease of Navigation – Intuitive flow and minimal confusion.
●​ Alignment – Consistency in elements and structure.
●​ Use of Color – Effective contrast and emphasis.

8. Roles of Users

●​ IT Professionals – System designers, developers, network administrators.


●​ End Users:
○​ Expert Users – Highly skilled in IT systems.
○​ Novice Users – Basic-level users with limited technical knowledge.

9. User Characteristics & Interface Adaptation

●​ Factors Affecting User Interfaces:


○​ Age – Interface complexity should match user experience level.
○​ Education – Simplified interfaces for less technically skilled users.
○​ Persons with Disabilities – Accessibility features (e.g., screen readers).
○​ Cultural Differences – Localization of languages, symbols, and colors.
●​ Adaptations:
○​ Non-Visual Interfaces – Braille displays, voice output.
○​ Sensors – Gesture controls, haptic feedback.
○​ Accessibility Features – Adjustable font sizes, alternative input methods.
10. Purpose & Functions of Network Components

●​ Definition: A system connecting multiple computing devices.


●​ Purpose: Enables communication and resource sharing.
●​ Types of Networks:
○​ LAN (Local Area Network) – Small geographic area (e.g., office).
○​ WAN (Wide Area Network) – Large geographic area (e.g., global
networks).
○​ MAN (Metropolitan Area Network) – City-wide connectivity.
○​ VPN (Virtual Private Network) – Secure remote access.
○​ Mobile Networks – Wireless communication across regions.
○​ Internet, Intranet, Extranet – Public and private networks.
●​ Configuration & Topologies:
○​ Star, Bus, Ring – Different ways devices are connected.
●​ Transmission Media:
○​ Wired (Ethernet, fiber optics) vs. Wireless (WiFi, hotspots).
●​ Network Security:
○​ Firewalls – Protection against unauthorized access.
○​ Encryption – Secures data transmission.
●​ Communication Modes:
○​ Simplex – One-way transmission.
○​ Duplex – Two-way simultaneous transmission.
○​ Half-Duplex – Two-way but only one direction at a time.
●​ Applications:
○​ Telecommuting – Working remotely via network access.
○​ Teleconferencing/Video Conferencing – Remote meetings.
11. Networking Standards

Networking standards define protocols and guidelines for data communication across
networks. Two fundamental models for networking are the OSI Model and the TCP/IP
Model.

1. Open System Interconnection (OSI) Model

The OSI Model is a conceptual framework that standardizes network communication


into seven layers, each responsible for specific functions:

Layer Protocol Function


Examples

Application HTTP, FTP, User interaction and network services (email, web
(Layer 7) SMTP browsing).

Presentation SSL/TLS, Data translation, encryption, and compression.


(Layer 6) JPEG

Session (Layer RPC, NetBIOS Manages communication sessions (establishing,


5) maintaining, and terminating connections).

Transport TCP, UDP Ensures reliable and ordered data transmission


(Layer 4) between systems.
Network (Layer IP, ICMP Routing, addressing, and logical data delivery.
3)

Data Link Ethernet, WiFi Organizes data into frames, manages MAC
(Layer 2) (802.11) addressing, and error detection.

Physical (Layer Fiber, Ethernet Transmission of raw binary data over physical
1) cables media.

●​ Purpose: The OSI Model provides a structured approach for designing network
systems, ensuring interoperability across different hardware and software.
2. Transfer Control Protocol/Internet Protocol (TCP/IP) Model

The TCP/IP Model is the foundational protocol suite for the Internet. It has four layers,
simplifying OSI functionality while ensuring efficient data communication.

Layer Protocol Function


Examples

Application HTTP, FTP, DNS, Defines protocols for web, email, and file
Layer SMTP transfers.

Transport Layer TCP, UDP Ensures reliable or fast data transmission


between devices.

Internet Layer IP, ICMP Handles addressing and routing packets


across networks.

Network Access Ethernet, WiFi Manages physical network transmission and


Layer MAC addresses.

●​ Purpose: The TCP/IP model is practical and widely used, forming the backbone
of the Internet and most modern networks.
Comparison: OSI vs. TCP/IP

●​ OSI Model is more theoretical, used for standardizing network designs.


●​ TCP/IP Model is more practical, serving as the basis for Internet
communication.
●​ OSI has seven layers, TCP/IP has four layers (with combined functions).
12. Design Simple Networks

●​ Use diagrams to illustrate network designs, ensuring clarity in structure and


component connections.
●​ Standard shapes for devices: Represent different components like routers,
switches, and hubs using industry-standard symbols.
●​ Key network components:
○​ Routers – Connect different networks and manage data traffic.
○​ Switches – Enable communication between devices in a local network.
○​ Hubs – Basic network device that forwards data to all connected devices.
○​ Ethernet cables – Wired medium for transmitting data.
○​ SSID (Service Set Identifier) – Unique name that identifies a wireless
network.
○​ WAN (Wide Area Network) & LAN (Local Area Network) – Network
types for broad and localized connections.
●​ Security considerations:
○​ Wired security: Firewalls to prevent unauthorized access.
○​ Wireless security:

1.MAC filtering – Restrict network access based on device MAC


addresses.

2.Encryption protocols: WPA2, WPA3, AES (Advanced Encryption


Standard).

3.Passwords & keys: Protect access using strong passwords and router
security settings.
13. Configure Simple Networks

●​ Network setup based on design:


○​ Choose suitable hardware (routers, switches, hubs).
○​ Define SSID for wireless connections.
○​ Assign IP addresses and gateways for communication.
●​ Understanding network topology:
○​ Bus – Single communication backbone; simple but prone to failures.
○​ Ring – Devices connected in a circular structure; stable but dependent on
all nodes.
○​ Star – Devices linked to a central hub; efficient and easily expandable.
●​ Configuring network settings:
○​ Setting up routers: Define security protocols, DHCP settings, and SSID
configurations.
○​ Cable connections: Ensure proper wiring for LAN/WAN networks.
●​ Security measures:
1.​ Firewalls for protection against external threats.
2.​ Wireless security using encryption (WPA2/WPA3) and password
protection.
3.​ MAC filtering to restrict access by device identity.
14. Troubleshoot Wired & Wireless Network Issues

●​ Key troubleshooting commands:


○​ ipconfig – Displays network configuration details.
○​ ping – Tests connectivity with another device or server.
○​ nslookup – Checks domain name system (DNS) resolution.
●​ Other troubleshooting steps:
○​ Speed test – Verify internet performance.
○​ Firewall configuration – Ensure firewall settings allow necessary
connections.
○​ Check IP address and DNS settings – Resolve incorrect configurations.
○​ Inspect physical connections – Verify cables, ports, and indicator lights
for hardware issues.

15. Compare Information System Components

●​ Evaluation of features:
○​ Speed – Data processing and transmission rates.
○​ Efficiency – Performance relative to resource utilization.
○​ Portability – Mobility and usability of devices.
○​ Maintainability – Ease of upgrades and repairs.
○​ Storage capacity – Ability to store data securely and efficiently.
○​ Transmission – Methods of data exchange (wired/wireless).
16. Compare Security Mechanisms

●​ Physical vs. logical access control:


1.​ Physical measures: Restricted access using swipe/key cards, biometric
authentication.
2.​ Logical security:
○​ Passwords: Must be unique, lengthy, mixed case, and include
numbers/symbols.
○​ Authentication protocols: Multi-factor authentication (MFA) enhances
security.
○​ Encryption: Protects data from unauthorized access.
●​ Data integrity:
○​ Ensures accuracy and consistency.
○​ Methods include hashing, backup strategies, and access control lists.

17. Explain Security Terms in Information Systems

●​ Data security – Ensuring data is protected from threats and unauthorized access.
●​ Passwords – Essential for securing access; should be strong and regularly
updated.
●​ Authentication – Verifies user identity (e.g., biometric, two-factor
authentication).
●​ Encryption – Converts data into coded format to prevent unauthorized reading.
●​ Data corruption – Loss or alteration of data due to software/hardware issues.
18. Describe the Structure of the Internet as Interconnected Hypertext
Documents

●​ Understanding the Internet:


○​ The internet is a vast network of interconnected systems that allow
communication and data exchange globally.
○​ Websites and web pages are accessed using browsers that interpret
hypertext documents.
●​ Key Concepts:
1.​ Browser – Software used to access websites (e.g., Chrome, Firefox, Edge).
2.​ Hyperlinks – Clickable links connecting different web pages/documents.
3.​ Home Page – The main page of a website, typically serving as an introduction.
4.​ World Wide Web (WWW) – A collection of interlinked web pages and
resources.
●​ Web Page vs. Website:
○​ Web Page – A single document available on the internet.
○​ Website – A collection of related web pages under a domain.
●​ Hypertext Transfer Protocol (HTTP) – Defines how messages are formatted and
transmitted over the web.
●​ Universal Resource Locator (URL) – The web address that directs users to
specific web pages.
●​ Domain Name Resolution:
1.​ IP Address – A unique numerical label assigned to each device connected to the
internet.
2.​ Domain Name – A human-readable address mapped to an IP address (e.g.,
google.com).
19. Develop Simple Web Pages Using HTML

●​ Understanding HTML:
○​ Hypertext Markup Language (HTML) is the standard language for creating
web pages.
○​ Extensible Markup Language (XML) – Used for storing and organizing
data.
●​ Basic Structure of an HTML Document:

<!DOCTYPE html>

<html>

<head>

<title>My Web Page</title>

</head>

<body>

<h1>Welcome to My Web Page</h1>

<p>This is a basic HTML document.</p>

</body>

</html>

HTML Elements & Attributes:

●​ Headers – Define headings in different sizes.


●​ Text Formatting – Bold, italics, underline.
●​ Paragraphs – Used to structure content.
●​ Comments – Notes inside the code that are not displayed on the webpage.
●​ Inline Styling – Adding style directly to elements:

<p style="color: blue;">This text is blue.</p>

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy