PAPER-5: INTRODUCTION TO INFORMATION TECHNOLOGY
(100 Marks – Passing Marks: 40)
Module 1: Introduction to IT (20%)
1. What is IT?
2. Definition and scope of IT.
3. Role of IT in modern organizations.
4. IT Infrastructure.
5. Components of IT Infrastructure (hardware, software, networks, data centers).
6. Overview of hardware component (CPU, RAM, Motherboard, storage).
7. Peripheral devices (printers, scanners, external drives).
8. Cloud computing and virtualization basis.
9. Introduction to Programming.
10. Introduction to Object Oriented Programming.
11. Front-End /Backend Programming.
12. Software Development life cycle (SDLC).
13. Agile Methodology.
14. Operating Systems (OS).
15. Introduction of Operating Systems.
16. What is an OS? (Windows, macOS, Linux).
17. Functions of an OS (memory management, file systems).
18. OS troubleshooting (system utilities, hardware, and software issues)
19. Difference between OS and applications type (ERP, DSS, MIS, EIS)
Module 2: Application Management (40%)
1. Introduction to SAP
2. Overview of SAP ERP (Enterprise Resource Planning) systems
3. Understanding SAP’s role in business processes
4. Navigation and User Interfaces
5. Basic navigation within SAP systems (GUI – Graphical User Interface)
6. Introduction to SAP Fiori for modern interfaces
7. Core Modules
8. SAP FI (Financial Accounting)
9. SAP HCM (Human Capital Management)
10. Security Deposit Solution
11. SAP Project System
12. Data Management
13. Basics of data entry and management within SAP
14. Introduction to SAP data structures (tables, files, records)
15. Reporting and Analytics
16. Introduction to SAP reporting tools (SAP Business Objects or SAP Analytics Cloud)
17. Basic report generation and data analysis
18. Integration and Customization
19. Understanding how different SAP modules integrate with each other
20. Overview of customization options based on business needs
Module 3: Networking Fundamentals (10%)
1. Introduction to Networking
2. What is a network? (LAN, WAN, MAN)
3. OSI model /TCP model
4. Networking devices (routers, switches, access points)
5. IP Addressing and Protocols
6. Basics of IP addressing (IPv4, IPv6)
7. Common protocols (TCP/IP, HTTP, FTP)
Module 4: Mobile Devices, IoT, Big Data (10%)
1. Introduction to Mobile Devices and IoT
2. Types of mobile devices (smartphones, tablets, laptops)
3. Mobile operating systems (Android, iOS)
4. Internet of Things
5. Introduction to Big Data
6. Deep learning
7. Machine learning
8. Natural language processing
Module 5: Security Basics (10%)
1. Introduction to Cybersecurity
2. Importance of Cybersecurity
3. Common threats (malware, phishing, ransomware)
4. Securing Devices and Networks
5. Password management and multi-factor authentication (MF)
6. Data Protection (CIA)
7. Confidentiality, integrity, and availability of data
8. Backups and disaster recovery
9. Secure data disposal methods
Module 6: Troubleshooting and Operational Procedure (10%)
1. Troubleshooting Methodology
2. Identify, Analyze the problem
3. Develop and implement a solution
4. Test and evaluate the solution
5. Document the solution and implement preventive measures
6. Hardware Troubleshooting
7. Troubleshooting common hardware issues (e.g. RAM, CPU, motherboard)
8. Using diagnostic tools (e.g. BIOS, Device Manager)
9. Software Troubleshooting
10. Troubleshooting common software issues (e.g. operating system, application)
11. Using diagnostic tools (e.g. Event Viewer, System Configuration)
12. Network Troubleshooting
13. Network Troubleshooting common network issues (e.g. DNS, DHCP)
14. Using diagnostic tools (e.g. ping, trace route)
15. IT Ethics and Best Practices
DETAILED EXPLANATION OF SYLLABUS
Module 1: Introduction to IT (20%)
1. What is IT?
IT (Information Technology) refers to the use of computers and software to manage data. It includes
storing, retrieving, transmitting, and protecting digital information in businesses and daily life.
2. Definition and Scope of IT
Definition: IT is the study and use of systems (especially computers and telecommunications) for storing,
retrieving, and sending information.
Scope: It covers hardware, software, networking, data management, cybersecurity, cloud computing, and
technical support.
3. Role of IT in Modern Organizations
Speeds up communication
Automates business operations
Improves productivity and decision-making
Stores and secures important data
Enables remote work and online services
4. IT Infrastructure
This includes all the physical and software components required to run IT systems:
Hardware (computers, servers)
Software (OS Operating System, apps Applications)
Networks (LAN Local Area Network, Wi-Fi Wireless Fidelity)
Data centers and storage devices
5. Components of IT Infrastructure
Hardware: Machines like desktops, laptops, servers
Software: Operating systems, applications
Networks: Routers, switches, cables, internet
Data Centers: Large facilities that store critical applications and data
6. Overview of Hardware Components
CPU (Central Processing Unit): Brain of the computer
RAM (Random Access Memory): Temporary memory for active processes
Motherboard: Main circuit board that connects all components
Storage: HDD Hard Disk Drive /SSD Solid State Drive where data is saved long term
7. Peripheral Devices
External devices that connect to a computer:
Input: scanner
Output: printer
Storage: External hard drives, USB flash drives Universal Serial Bus flash drives
8. Cloud Computing and Virtualization
Cloud computing: Using internet services to store and access data (like Google Drive)
Cloud computing means storing and accessing data and programs over the internet instead of your local
computer.
Examples:
Google Drive (file storage)
Dropbox, OneDrive
Amazon Web Services (AWS), Microsoft Azure, Google Cloud
Virtualization: Running multiple operating systems or applications on the same hardware using software
like VMware
Virtualization is the process of creating virtual versions of physical hardware, like a virtual computer (VM)
inside a real one.
Examples:
VirtualBox, VMware, Hyper-V
You can run Windows inside macOS, or Linux inside Windows
9. Introduction to Programming
Writing instructions (code) to make computers perform specific tasks. Common languages: Python, C++,
JavaScript.
10. Introduction to Object-Oriented Programming Language (OOP)
A method of programming that organizes software design around objects and classes.
Key concepts:
Class: Blueprint
Object: Instance
Encapsulation: Protecting data
Inheritance: Reusing code
Polymorphism: Multiple forms of a method
11. Front-End / Back-End Programming Language
Front-End: What users see (HTML, CSS, JavaScript)
Back-End: Behind the scenes logic, database, server (Node.js, PHP, Python)
12. Software Development Life Cycle (SDLC)/ Program Development Life Cycle (PDLC)
Phases used to develop software:
1. Requirement gathering
2. System design
3. Development
4. Testing
5. Deployment
6. Maintenance
13. Agile Methodology of SDLC
A flexible approach to software development. It emphasizes:
Small, frequent updates
Collaboration
Quick response to change
Common frameworks: Scrum, Kanban
14. Operating Systems (OS)
System software that manages hardware and software resources.
Examples: Windows, macOS, Linux
15. Introduction to Operating Systems
OS acts as a bridge between users and hardware. It controls input/output, file systems, memory, and user
interface.
16. What is an OS? (Windows, macOS, Linux)
Windows: Microsoft OS, user-friendly
macOS: Apple’s OS, mostly used in design/media
Linux: Open-source, highly customizable, popular on servers
17. Functions of an OS
Memory management
File system management
Process and task management
Security
Device control
18. OS Troubleshooting
Finding and fixing problems in the system using:
System utilities (e.g., disk cleanup)
Hardware checks (RAM, CPU)
Software solutions (driver updates, antivirus)
19. Difference Between OS and Application Types (ERP, DSS, MIS, EIS)
OS: Basic software to run the computer
Applications:
o ERP (Enterprise Resource Planning): Integrates business functions
o DSS (Decision Support System): Supports decision-making with data
o MIS (Management Information System): Provides management-level reports
o EIS (Executive Information System): Focused on high-level executive summaries
Module 2: Application Management (40%)
1. Introduction to SAP
SAP (Systems, Applications, and Products in Data Processing) is a global ERP software that helps
organizations manage business operations and customer relations across finance, HR, supply chain,
production, etc.
2. Overview of SAP ERP (Enterprise Resource Planning) systems
SAP ERP integrates all departments and business functions into a single system so that everyone accesses
real-time, consistent data.
Examples: Finance, HR, Sales, Procurement, Inventory – all connected.
3. Understanding SAP’s Role in Business Processes
SAP automates and streamlines business processes such as:
Creating invoices
Managing payroll
Tracking inventory
Generating reports
This reduces manual work, improves accuracy, and saves time.
4. Navigation and User Interfaces
SAP systems have a graphical user interface (GUI) for accessing modules. Users use transaction codes (T-
codes), menus, or search tools to access specific features and screens.
5. Basic Navigation within SAP Systems (GUI – Graphical User Interface)
You learn how to:
Log in/out of SAP
Use T-codes (e.g., FB50 for journal entry)
Navigate menus and toolbars
Enter data in fields
Save and view reports
SAP GUI is structured, user-friendly, and highly standardized.
6. Introduction to SAP Fiori for Modern Interfaces
SAP Fiori is a web-based, mobile-friendly UI that provides a better user experience than traditional GUI.
It uses simple, tile-based dashboards to access apps like sales reports, approvals, etc.
7. Core Modules
SAP is divided into different modules. Two major ones are:
FI (Financial Accounting)
HCM (Human Capital Management)
Other examples: MM (Material Management), SD (Sales & Distribution), PP (Production Planning)
8. SAP FI (Financial Accounting)
Manages financial transactions of a company:
General ledger
Accounts payable/receivable
Asset accounting
Bank accounting
Financial reporting (Balance Sheet, P&L)
9. SAP HCM (Human Capital Management)
Manages employee data and HR tasks:
Payroll
Attendance
Recruitment
Training
Performance evaluation
10. Security Deposit Solution
A special SAP feature used by organizations to:
Record and track security deposits (e.g., utilities, rentals)
Manage refund processing and reconciliation
Used in government and utility sectors.
11. SAP Project System
Helps manage large projects (construction, IT, events, etc.)
Plan budgets
Track tasks and milestones
Monitor progress
Control project costs and timelines
12. Data Management
Covers how SAP stores, organizes, and secures business data:
Master data (like vendor details)
Transaction data (like invoices, journal entries)
Reporting data
13. Basics of Data Entry and Management within SAP
Users enter data using:
Predefined input fields
Forms and templates
Validations and checks
SAP ensures data consistency and accuracy across modules.
14. Introduction to SAP Data Structures (Tables, Files, Records)
In SAP:
Tables: Store structured data (like Excel sheets)
Fields: Columns in tables (e.g., Vendor ID, Amount)
Records: Rows in tables (each row is one complete entry)
Example: Table BKPF stores accounting documents; BSEG stores line items.
15. Reporting and Analytics
SAP allows you to:
Generate real-time reports (financials, inventory, HR)
Use filters and drill-downs
Export reports to Excel or PDF
Make decisions using data
16. Introduction to SAP Reporting Tools (SAP Business Objects or SAP Analytics Cloud)
These tools allow advanced analysis:
SAP Business Objects (BO): Desktop-based reporting tool
SAP Analytics Cloud (SAC): Web-based dashboard and visualization tool
They help in forecasting, KPIs, charts, dashboards.
17. Basic Report Generation and Data Analysis
You can:
Create custom reports
Use filters like date, department, vendor
Analyze trends and performance
Schedule reports for auto-delivery
18. Integration and Customization
SAP modules are highly integrated. Example:
A purchase (MM) triggers an accounting entry (FI)
A new hire (HCM) updates payroll records
Customization allows companies to tweak SAP based on their needs using configuration or coding
(ABAP).
19. Understanding How Different SAP Modules Integrate with Each Other
FI ↔ MM: Purchase invoice affects finance
HCM ↔ FI: Payroll affects accounting
SD ↔ FI: Sales orders generate revenue in finance
This integration ensures data is shared automatically, avoiding duplication.
20. Overview of Customization Options Based on Business Needs
Businesses can:
Add/remove fields in forms
Modify workflows
Add new validation rules
Automate approvals
These are done through configuration, BAPIs, and user exits in SAP.
Module 3: Networking Fundamentals (10%)
1. Introduction to Networking
Networking is the practice of connecting two or more computers to share resources like files, internet,
and printers.
It helps in:
Fast data sharing
Centralized administration
Remote access and communication
2. What is a Network? (LAN, WAN, MAN)
LAN (Local Area Network): Covers small areas like homes, schools, or offices
WAN (Wide Area Network): Covers large areas like countries (e.g., the Internet)
MAN (Metropolitan Area Network): Covers a city or large campus
All types allow devices to communicate and share resources.
3. OSI Open Systems Interconnection Model / TCP/IP Transmission Control Protocol/Internet Protocol
Model
OSI Model: Theoretical 7-layer model to understand networking:
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
TCP/IP Model: Practical 4-layer model used in the internet:
1. Link
2. Internet
3. Transport
4. Application
4. Networking Devices
Router: Connects different networks (like home to the Internet)
Switch: Connects devices in a LAN
Access Point: Wireless hub to connect Wi-Fi devices
Other devices: modem, repeater, bridge, gateway
5. IP Addressing and Protocols
IP Address: A unique number assigned to each device on a network
o E.g., 192.168.1.1
Protocols: Set of rules for data communication
o Common ones: TCP, IP, HTTP, FTP
6. Basics of IP Addressing (IPv4, IPv6)
IPv4: 32-bit address (e.g., 192.168.0.1)
o Limited addresses (~4 billion)
IPv6: 128-bit address (e.g., 2001:0db8:85a3::8a2e:0370:7334)
o Huge address space for modern internet devices
7. Common Protocols (TCP/IP, HTTP, FTP)
TCP/IP Transmission Control Protocol/Internet Protocol: Core protocol of the internet, ensures data
delivery
HTTP (HyperText Transfer Protocol): Used for browsing websites
FTP (File Transfer Protocol): Used for uploading/downloading files from servers
Module 4: MOBILE Devices, IoT, Big Data (10%)
1. Introduction to Mobile Devices and IoT
Mobile Devices: Portable devices like smartphones, tablets, laptops
IoT (Internet of Things): Everyday objects (TVs, fridges, cameras) connected to the Internet to collect and
exchange data
2. Types of Mobile Devices
Smartphones: Most common; touchscreen, calls, apps
Tablets: Larger screen, no physical keyboard
Laptops: Portable PCs, more powerful than phones
Wearables: Smartwatches, fitness bands
3. Mobile Operating Systems (Android, iOS)
Android: Open-source, used by brands like Samsung, Xiaomi
iOS: Apple’s closed OS for iPhones, known for security and smooth UX
These OS manage apps, security, updates, and device functions.
4. Internet of Things (IoT)
IoT connects everyday devices to the Internet.
Examples:
Smart home systems
Smart agriculture
Health monitoring devices
They collect, share, and react to data automatically.
5. Introduction to Big Data
Big Data refers to massive, fast, and diverse data that traditional tools can't handle.
It has 5 Vs:
1. Volume (large size)
2. Velocity (speed)
3. Variety (types: text, video, etc.)
4. Veracity (accuracy)
5. Value (usefulness)
Branches of Artificial Intelligence (AI) (Machine Learning, Deep Learning, Natural Language Processing)
6. Deep Learning
A subfield of machine learning that uses neural networks with many layers.
Mimics human brain processing
Used in: image recognition, speech-to-text, translation
7. Machine Learning
A method where computers learn from data without being explicitly programmed.
Used in:
Email spam filters
Product recommendations
Fraud detection
8. Natural Language Processing (NLP)
NLP helps computers understand and interact using human languages like English or Urdu.
Used in:
Chatbots (like me!)
Voice assistants (Alexa, Siri)
Google Translate
Module 5: Security Basics (10%)
1. Introduction to Cybersecurity
Cybersecurity is the protection of systems, networks, and data from digital attacks, theft, or damage.
It involves tools, technologies, policies, and best practices to keep digital environments safe.
2. Importance of Cybersecurity
Prevents data theft and loss
Builds trust with customers
Ensures smooth business operations
Protects national security, financial systems, and personal privacy
Avoids financial losses due to ransomware or hacking
3. Common Threats (Malware, Phishing, Ransomware)
Malware: Malicious software like viruses, worms, trojans
Phishing: Fake emails/websites to steal sensitive info (like passwords)
Ransomware: Locks data and demands payment to unlock it
4. Securing Devices and Networks
Use firewalls, antivirus, and anti-malware software
Change default passwords
Regular software updates
Encrypt sensitive data
Disable unused ports or features
5. Password Management and Multi-Factor Authentication (MFA)
Strong passwords: Use letters, numbers, symbols
Password manager: Securely store passwords
MFA: Adds extra layer (e.g., OTP, fingerprint) for logging in
6. Data Protection (CIA)
CIA = Confidentiality, Integrity, Availability
Confidentiality: Only authorized people can access the data
Integrity: Data remains unchanged unless authorized
Availability: Data is always accessible when needed
7. Confidentiality, Integrity, and Availability of Data
These are the core principles of cybersecurity:
Prevent unauthorized access (confidentiality)
Prevent unauthorized modification (integrity)
Prevent downtime or loss (availability)
8. Backups and Disaster Recovery
Backups: Copies of important data stored separately (cloud, external drive)
Disaster recovery: Steps to restore systems after failure (due to hacking, natural disaster, etc.)
9. Secure Data Disposal Methods
Simply deleting files is not enough
Use:
o Data wiping tools
o Physical destruction (shredding hard drives)
o Overwriting data multiple times
Module 6: Troubleshooting and Operational Procedure (10%)
1. Troubleshooting Methodology
A step-by-step approach to identify, diagnose, and solve IT problems effectively.
2. Identify, Analyze the Problem
Listen to user complaints
Check error messages or behavior
Identify root cause (e.g., slow performance, network disconnection)
3. Develop and Implement a Solution
Decide the best fix
Apply the fix (e.g., update drivers, change settings, restart system)
4. Test and Evaluate the Solution
After applying the fix, test the system
Make sure the problem is really gone
Check related functions
5. Document the Solution and Implement Preventive Measures
Write down what went wrong and how you fixed it
Helps in future troubleshooting
Apply preventive steps (e.g., updates, training)
6. Hardware Troubleshooting
Fixing physical components of the system.
7. Troubleshooting Common Hardware Issues
Examples:
RAM failure → Random crashes
CPU overheating → System shutdown
Motherboard faults → No display or boot
8. Using Diagnostic Tools (e.g., BIOS, Device Manager)
BIOS: Basic system checks before Windows loads
Device Manager: Shows hardware status, drivers, errors
9. Software Troubleshooting
Fixing issues in OS, apps, or system software
10. Troubleshooting Common Software Issues
Examples:
OS not booting
App crashing or freezing
Updates failing
Fixes: reinstall, update, reset settings
11. Using Diagnostic Tools (e.g., Event Viewer, System Configuration)
Event Viewer: Shows system errors, warnings, logs
System Configuration (msconfig): Manage startup items, services
12. Network Troubleshooting
Fixing internet or LAN connection problems
13. Troubleshooting Common Network Issues (e.g., DNS, DHCP)
DNS failure: Websites don’t load
DHCP issue: Device doesn’t get IP address
Fixes:
Restart router
Flush DNS
Renew IP using command prompt
14. Using Diagnostic Tools (e.g., Ping, Traceroute)
Ping: Tests connection between two devices
Traceroute: Shows each hop from your device to the destination
Helps identify where the connection breaks.
15. IT Ethics and Best Practices
Respect privacy and data ownership
Don’t use unauthorized software
Keep user data secure
Report security incidents
Follow organizational policies and legal guidelines