KEMBAR78
Syllabus and Detailed Explanation of Syllabus | PDF | Computer Network | Operating System
0% found this document useful (0 votes)
9 views12 pages

Syllabus and Detailed Explanation of Syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views12 pages

Syllabus and Detailed Explanation of Syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

PAPER-5: INTRODUCTION TO INFORMATION TECHNOLOGY

(100 Marks – Passing Marks: 40)

Module 1: Introduction to IT (20%)


1. What is IT?
2. Definition and scope of IT.
3. Role of IT in modern organizations.
4. IT Infrastructure.
5. Components of IT Infrastructure (hardware, software, networks, data centers).
6. Overview of hardware component (CPU, RAM, Motherboard, storage).
7. Peripheral devices (printers, scanners, external drives).
8. Cloud computing and virtualization basis.
9. Introduction to Programming.
10. Introduction to Object Oriented Programming.
11. Front-End /Backend Programming.
12. Software Development life cycle (SDLC).
13. Agile Methodology.
14. Operating Systems (OS).
15. Introduction of Operating Systems.
16. What is an OS? (Windows, macOS, Linux).
17. Functions of an OS (memory management, file systems).
18. OS troubleshooting (system utilities, hardware, and software issues)
19. Difference between OS and applications type (ERP, DSS, MIS, EIS)

Module 2: Application Management (40%)


1. Introduction to SAP
2. Overview of SAP ERP (Enterprise Resource Planning) systems
3. Understanding SAP’s role in business processes
4. Navigation and User Interfaces
5. Basic navigation within SAP systems (GUI – Graphical User Interface)
6. Introduction to SAP Fiori for modern interfaces
7. Core Modules
8. SAP FI (Financial Accounting)
9. SAP HCM (Human Capital Management)
10. Security Deposit Solution
11. SAP Project System
12. Data Management
13. Basics of data entry and management within SAP
14. Introduction to SAP data structures (tables, files, records)
15. Reporting and Analytics
16. Introduction to SAP reporting tools (SAP Business Objects or SAP Analytics Cloud)
17. Basic report generation and data analysis
18. Integration and Customization
19. Understanding how different SAP modules integrate with each other
20. Overview of customization options based on business needs
Module 3: Networking Fundamentals (10%)
1. Introduction to Networking
2. What is a network? (LAN, WAN, MAN)
3. OSI model /TCP model
4. Networking devices (routers, switches, access points)
5. IP Addressing and Protocols
6. Basics of IP addressing (IPv4, IPv6)
7. Common protocols (TCP/IP, HTTP, FTP)

Module 4: Mobile Devices, IoT, Big Data (10%)


1. Introduction to Mobile Devices and IoT
2. Types of mobile devices (smartphones, tablets, laptops)
3. Mobile operating systems (Android, iOS)
4. Internet of Things
5. Introduction to Big Data
6. Deep learning
7. Machine learning
8. Natural language processing

Module 5: Security Basics (10%)


1. Introduction to Cybersecurity
2. Importance of Cybersecurity
3. Common threats (malware, phishing, ransomware)
4. Securing Devices and Networks
5. Password management and multi-factor authentication (MF)
6. Data Protection (CIA)
7. Confidentiality, integrity, and availability of data
8. Backups and disaster recovery
9. Secure data disposal methods

Module 6: Troubleshooting and Operational Procedure (10%)


1. Troubleshooting Methodology
2. Identify, Analyze the problem
3. Develop and implement a solution
4. Test and evaluate the solution
5. Document the solution and implement preventive measures
6. Hardware Troubleshooting
7. Troubleshooting common hardware issues (e.g. RAM, CPU, motherboard)
8. Using diagnostic tools (e.g. BIOS, Device Manager)
9. Software Troubleshooting
10. Troubleshooting common software issues (e.g. operating system, application)
11. Using diagnostic tools (e.g. Event Viewer, System Configuration)
12. Network Troubleshooting
13. Network Troubleshooting common network issues (e.g. DNS, DHCP)
14. Using diagnostic tools (e.g. ping, trace route)
15. IT Ethics and Best Practices
DETAILED EXPLANATION OF SYLLABUS
Module 1: Introduction to IT (20%)
1. What is IT?
IT (Information Technology) refers to the use of computers and software to manage data. It includes
storing, retrieving, transmitting, and protecting digital information in businesses and daily life.

2. Definition and Scope of IT


 Definition: IT is the study and use of systems (especially computers and telecommunications) for storing,
retrieving, and sending information.
 Scope: It covers hardware, software, networking, data management, cybersecurity, cloud computing, and
technical support.

3. Role of IT in Modern Organizations


 Speeds up communication
 Automates business operations
 Improves productivity and decision-making
 Stores and secures important data
 Enables remote work and online services

4. IT Infrastructure
This includes all the physical and software components required to run IT systems:
 Hardware (computers, servers)
 Software (OS Operating System, apps Applications)
 Networks (LAN Local Area Network, Wi-Fi Wireless Fidelity)
 Data centers and storage devices

5. Components of IT Infrastructure
 Hardware: Machines like desktops, laptops, servers
 Software: Operating systems, applications
 Networks: Routers, switches, cables, internet
 Data Centers: Large facilities that store critical applications and data

6. Overview of Hardware Components


 CPU (Central Processing Unit): Brain of the computer
 RAM (Random Access Memory): Temporary memory for active processes
 Motherboard: Main circuit board that connects all components
 Storage: HDD Hard Disk Drive /SSD Solid State Drive where data is saved long term

7. Peripheral Devices
External devices that connect to a computer:
 Input: scanner
 Output: printer
 Storage: External hard drives, USB flash drives Universal Serial Bus flash drives

8. Cloud Computing and Virtualization


 Cloud computing: Using internet services to store and access data (like Google Drive)
 Cloud computing means storing and accessing data and programs over the internet instead of your local
computer.
Examples:
 Google Drive (file storage)
 Dropbox, OneDrive
 Amazon Web Services (AWS), Microsoft Azure, Google Cloud

 Virtualization: Running multiple operating systems or applications on the same hardware using software
like VMware
 Virtualization is the process of creating virtual versions of physical hardware, like a virtual computer (VM)
inside a real one.
Examples:
 VirtualBox, VMware, Hyper-V
 You can run Windows inside macOS, or Linux inside Windows

9. Introduction to Programming
Writing instructions (code) to make computers perform specific tasks. Common languages: Python, C++,
JavaScript.

10. Introduction to Object-Oriented Programming Language (OOP)


A method of programming that organizes software design around objects and classes.
Key concepts:
 Class: Blueprint
 Object: Instance
 Encapsulation: Protecting data
 Inheritance: Reusing code
 Polymorphism: Multiple forms of a method

11. Front-End / Back-End Programming Language


 Front-End: What users see (HTML, CSS, JavaScript)
 Back-End: Behind the scenes logic, database, server (Node.js, PHP, Python)

12. Software Development Life Cycle (SDLC)/ Program Development Life Cycle (PDLC)
Phases used to develop software:
1. Requirement gathering
2. System design
3. Development
4. Testing
5. Deployment
6. Maintenance

13. Agile Methodology of SDLC


A flexible approach to software development. It emphasizes:
 Small, frequent updates
 Collaboration
 Quick response to change
Common frameworks: Scrum, Kanban

14. Operating Systems (OS)


System software that manages hardware and software resources.
Examples: Windows, macOS, Linux

15. Introduction to Operating Systems


OS acts as a bridge between users and hardware. It controls input/output, file systems, memory, and user
interface.
16. What is an OS? (Windows, macOS, Linux)
 Windows: Microsoft OS, user-friendly
 macOS: Apple’s OS, mostly used in design/media
 Linux: Open-source, highly customizable, popular on servers

17. Functions of an OS
 Memory management
 File system management
 Process and task management
 Security
 Device control

18. OS Troubleshooting
Finding and fixing problems in the system using:
 System utilities (e.g., disk cleanup)
 Hardware checks (RAM, CPU)
 Software solutions (driver updates, antivirus)

19. Difference Between OS and Application Types (ERP, DSS, MIS, EIS)
 OS: Basic software to run the computer
 Applications:
o ERP (Enterprise Resource Planning): Integrates business functions
o DSS (Decision Support System): Supports decision-making with data
o MIS (Management Information System): Provides management-level reports
o EIS (Executive Information System): Focused on high-level executive summaries

Module 2: Application Management (40%)

1. Introduction to SAP
SAP (Systems, Applications, and Products in Data Processing) is a global ERP software that helps
organizations manage business operations and customer relations across finance, HR, supply chain,
production, etc.

2. Overview of SAP ERP (Enterprise Resource Planning) systems


SAP ERP integrates all departments and business functions into a single system so that everyone accesses
real-time, consistent data.
Examples: Finance, HR, Sales, Procurement, Inventory – all connected.

3. Understanding SAP’s Role in Business Processes


SAP automates and streamlines business processes such as:
 Creating invoices
 Managing payroll
 Tracking inventory
 Generating reports
This reduces manual work, improves accuracy, and saves time.

4. Navigation and User Interfaces


SAP systems have a graphical user interface (GUI) for accessing modules. Users use transaction codes (T-
codes), menus, or search tools to access specific features and screens.

5. Basic Navigation within SAP Systems (GUI – Graphical User Interface)


You learn how to:
 Log in/out of SAP
 Use T-codes (e.g., FB50 for journal entry)
 Navigate menus and toolbars
 Enter data in fields
 Save and view reports
SAP GUI is structured, user-friendly, and highly standardized.

6. Introduction to SAP Fiori for Modern Interfaces


SAP Fiori is a web-based, mobile-friendly UI that provides a better user experience than traditional GUI.
It uses simple, tile-based dashboards to access apps like sales reports, approvals, etc.

7. Core Modules
SAP is divided into different modules. Two major ones are:
 FI (Financial Accounting)
 HCM (Human Capital Management)
Other examples: MM (Material Management), SD (Sales & Distribution), PP (Production Planning)

8. SAP FI (Financial Accounting)


Manages financial transactions of a company:
 General ledger
 Accounts payable/receivable
 Asset accounting
 Bank accounting
 Financial reporting (Balance Sheet, P&L)

9. SAP HCM (Human Capital Management)


Manages employee data and HR tasks:
 Payroll
 Attendance
 Recruitment
 Training
 Performance evaluation

10. Security Deposit Solution


A special SAP feature used by organizations to:
 Record and track security deposits (e.g., utilities, rentals)
 Manage refund processing and reconciliation
Used in government and utility sectors.

11. SAP Project System


Helps manage large projects (construction, IT, events, etc.)
 Plan budgets
 Track tasks and milestones
 Monitor progress
 Control project costs and timelines
12. Data Management
Covers how SAP stores, organizes, and secures business data:
 Master data (like vendor details)
 Transaction data (like invoices, journal entries)
 Reporting data

13. Basics of Data Entry and Management within SAP


Users enter data using:
 Predefined input fields
 Forms and templates
 Validations and checks
SAP ensures data consistency and accuracy across modules.

14. Introduction to SAP Data Structures (Tables, Files, Records)


In SAP:
 Tables: Store structured data (like Excel sheets)
 Fields: Columns in tables (e.g., Vendor ID, Amount)
 Records: Rows in tables (each row is one complete entry)
Example: Table BKPF stores accounting documents; BSEG stores line items.

15. Reporting and Analytics


SAP allows you to:
 Generate real-time reports (financials, inventory, HR)
 Use filters and drill-downs
 Export reports to Excel or PDF
 Make decisions using data

16. Introduction to SAP Reporting Tools (SAP Business Objects or SAP Analytics Cloud)
These tools allow advanced analysis:
 SAP Business Objects (BO): Desktop-based reporting tool
 SAP Analytics Cloud (SAC): Web-based dashboard and visualization tool
They help in forecasting, KPIs, charts, dashboards.

17. Basic Report Generation and Data Analysis


You can:
 Create custom reports
 Use filters like date, department, vendor
 Analyze trends and performance
 Schedule reports for auto-delivery

18. Integration and Customization


SAP modules are highly integrated. Example:
 A purchase (MM) triggers an accounting entry (FI)
 A new hire (HCM) updates payroll records
Customization allows companies to tweak SAP based on their needs using configuration or coding
(ABAP).

19. Understanding How Different SAP Modules Integrate with Each Other
 FI ↔ MM: Purchase invoice affects finance
 HCM ↔ FI: Payroll affects accounting
 SD ↔ FI: Sales orders generate revenue in finance
This integration ensures data is shared automatically, avoiding duplication.

20. Overview of Customization Options Based on Business Needs


Businesses can:
 Add/remove fields in forms
 Modify workflows
 Add new validation rules
 Automate approvals
These are done through configuration, BAPIs, and user exits in SAP.

Module 3: Networking Fundamentals (10%)

1. Introduction to Networking
Networking is the practice of connecting two or more computers to share resources like files, internet,
and printers.
It helps in:
 Fast data sharing
 Centralized administration
 Remote access and communication

2. What is a Network? (LAN, WAN, MAN)


 LAN (Local Area Network): Covers small areas like homes, schools, or offices
 WAN (Wide Area Network): Covers large areas like countries (e.g., the Internet)
 MAN (Metropolitan Area Network): Covers a city or large campus
All types allow devices to communicate and share resources.

3. OSI Open Systems Interconnection Model / TCP/IP Transmission Control Protocol/Internet Protocol
Model
 OSI Model: Theoretical 7-layer model to understand networking:
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
 TCP/IP Model: Practical 4-layer model used in the internet:
1. Link
2. Internet
3. Transport
4. Application

4. Networking Devices
 Router: Connects different networks (like home to the Internet)
 Switch: Connects devices in a LAN
 Access Point: Wireless hub to connect Wi-Fi devices
Other devices: modem, repeater, bridge, gateway

5. IP Addressing and Protocols


 IP Address: A unique number assigned to each device on a network
o E.g., 192.168.1.1
 Protocols: Set of rules for data communication
o Common ones: TCP, IP, HTTP, FTP

6. Basics of IP Addressing (IPv4, IPv6)


 IPv4: 32-bit address (e.g., 192.168.0.1)
o Limited addresses (~4 billion)
 IPv6: 128-bit address (e.g., 2001:0db8:85a3::8a2e:0370:7334)
o Huge address space for modern internet devices

7. Common Protocols (TCP/IP, HTTP, FTP)


 TCP/IP Transmission Control Protocol/Internet Protocol: Core protocol of the internet, ensures data
delivery
 HTTP (HyperText Transfer Protocol): Used for browsing websites
 FTP (File Transfer Protocol): Used for uploading/downloading files from servers

Module 4: MOBILE Devices, IoT, Big Data (10%)

1. Introduction to Mobile Devices and IoT


 Mobile Devices: Portable devices like smartphones, tablets, laptops
 IoT (Internet of Things): Everyday objects (TVs, fridges, cameras) connected to the Internet to collect and
exchange data

2. Types of Mobile Devices


 Smartphones: Most common; touchscreen, calls, apps
 Tablets: Larger screen, no physical keyboard
 Laptops: Portable PCs, more powerful than phones
 Wearables: Smartwatches, fitness bands

3. Mobile Operating Systems (Android, iOS)


 Android: Open-source, used by brands like Samsung, Xiaomi
 iOS: Apple’s closed OS for iPhones, known for security and smooth UX
These OS manage apps, security, updates, and device functions.

4. Internet of Things (IoT)


IoT connects everyday devices to the Internet.
Examples:
 Smart home systems
 Smart agriculture
 Health monitoring devices
They collect, share, and react to data automatically.

5. Introduction to Big Data


Big Data refers to massive, fast, and diverse data that traditional tools can't handle.
It has 5 Vs:
1. Volume (large size)
2. Velocity (speed)
3. Variety (types: text, video, etc.)
4. Veracity (accuracy)
5. Value (usefulness)
Branches of Artificial Intelligence (AI) (Machine Learning, Deep Learning, Natural Language Processing)
6. Deep Learning
A subfield of machine learning that uses neural networks with many layers.
 Mimics human brain processing
 Used in: image recognition, speech-to-text, translation

7. Machine Learning
A method where computers learn from data without being explicitly programmed.
Used in:
 Email spam filters
 Product recommendations
 Fraud detection

8. Natural Language Processing (NLP)


NLP helps computers understand and interact using human languages like English or Urdu.
Used in:
 Chatbots (like me!)
 Voice assistants (Alexa, Siri)
 Google Translate

Module 5: Security Basics (10%)

1. Introduction to Cybersecurity
Cybersecurity is the protection of systems, networks, and data from digital attacks, theft, or damage.
It involves tools, technologies, policies, and best practices to keep digital environments safe.

2. Importance of Cybersecurity
 Prevents data theft and loss
 Builds trust with customers
 Ensures smooth business operations
 Protects national security, financial systems, and personal privacy
 Avoids financial losses due to ransomware or hacking

3. Common Threats (Malware, Phishing, Ransomware)


 Malware: Malicious software like viruses, worms, trojans
 Phishing: Fake emails/websites to steal sensitive info (like passwords)
 Ransomware: Locks data and demands payment to unlock it

4. Securing Devices and Networks


 Use firewalls, antivirus, and anti-malware software
 Change default passwords
 Regular software updates
 Encrypt sensitive data
 Disable unused ports or features

5. Password Management and Multi-Factor Authentication (MFA)


 Strong passwords: Use letters, numbers, symbols
 Password manager: Securely store passwords
 MFA: Adds extra layer (e.g., OTP, fingerprint) for logging in
6. Data Protection (CIA)
CIA = Confidentiality, Integrity, Availability
 Confidentiality: Only authorized people can access the data
 Integrity: Data remains unchanged unless authorized
 Availability: Data is always accessible when needed

7. Confidentiality, Integrity, and Availability of Data


These are the core principles of cybersecurity:
 Prevent unauthorized access (confidentiality)
 Prevent unauthorized modification (integrity)
 Prevent downtime or loss (availability)

8. Backups and Disaster Recovery


 Backups: Copies of important data stored separately (cloud, external drive)
 Disaster recovery: Steps to restore systems after failure (due to hacking, natural disaster, etc.)

9. Secure Data Disposal Methods


 Simply deleting files is not enough
 Use:
o Data wiping tools
o Physical destruction (shredding hard drives)
o Overwriting data multiple times

Module 6: Troubleshooting and Operational Procedure (10%)

1. Troubleshooting Methodology
A step-by-step approach to identify, diagnose, and solve IT problems effectively.

2. Identify, Analyze the Problem


 Listen to user complaints
 Check error messages or behavior
 Identify root cause (e.g., slow performance, network disconnection)

3. Develop and Implement a Solution


 Decide the best fix
 Apply the fix (e.g., update drivers, change settings, restart system)

4. Test and Evaluate the Solution


 After applying the fix, test the system
 Make sure the problem is really gone
 Check related functions

5. Document the Solution and Implement Preventive Measures


 Write down what went wrong and how you fixed it
 Helps in future troubleshooting
 Apply preventive steps (e.g., updates, training)

6. Hardware Troubleshooting
Fixing physical components of the system.

7. Troubleshooting Common Hardware Issues


Examples:
 RAM failure → Random crashes
 CPU overheating → System shutdown
 Motherboard faults → No display or boot

8. Using Diagnostic Tools (e.g., BIOS, Device Manager)


 BIOS: Basic system checks before Windows loads
 Device Manager: Shows hardware status, drivers, errors

9. Software Troubleshooting
Fixing issues in OS, apps, or system software

10. Troubleshooting Common Software Issues


Examples:
 OS not booting
 App crashing or freezing
 Updates failing
Fixes: reinstall, update, reset settings

11. Using Diagnostic Tools (e.g., Event Viewer, System Configuration)


 Event Viewer: Shows system errors, warnings, logs
 System Configuration (msconfig): Manage startup items, services

12. Network Troubleshooting


Fixing internet or LAN connection problems

13. Troubleshooting Common Network Issues (e.g., DNS, DHCP)


 DNS failure: Websites don’t load
 DHCP issue: Device doesn’t get IP address
Fixes:
 Restart router
 Flush DNS
 Renew IP using command prompt

14. Using Diagnostic Tools (e.g., Ping, Traceroute)


 Ping: Tests connection between two devices
 Traceroute: Shows each hop from your device to the destination
Helps identify where the connection breaks.

15. IT Ethics and Best Practices


 Respect privacy and data ownership
 Don’t use unauthorized software
 Keep user data secure
 Report security incidents
 Follow organizational policies and legal guidelines

You might also like