KEMBAR78
Itm Lecture - 1 | PDF | Computer Data Storage | Security
0% found this document useful (0 votes)
169 views24 pages

Itm Lecture - 1

A computer is an electronic machine that takes input data and instructions from a user, processes that data based on the instructions, and generates output information. It works through the input-process-output cycle. Data and instructions are input through input devices and then processed by the CPU. The CPU transforms the data into information based on the instructions. The processed data is then output. Computers have both primary memory, which temporarily holds active data and instructions, and secondary memory, which permanently stores inactive data. Proper cybersecurity practices like training, software updates, antivirus software, security reviews, strong passwords, avoiding unknown attachments/networks, and backing up data can help protect computers and data from cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
169 views24 pages

Itm Lecture - 1

A computer is an electronic machine that takes input data and instructions from a user, processes that data based on the instructions, and generates output information. It works through the input-process-output cycle. Data and instructions are input through input devices and then processed by the CPU. The CPU transforms the data into information based on the instructions. The processed data is then output. Computers have both primary memory, which temporarily holds active data and instructions, and secondary memory, which permanently stores inactive data. Proper cybersecurity practices like training, software updates, antivirus software, security reviews, strong passwords, avoiding unknown attachments/networks, and backing up data can help protect computers and data from cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

WHAT IS A COMPUTER?

A computer is an electronic machine that takes data and instructions from the user,
performs computations on that data based on those instructions to generate
information.
DEPARTMENT OF DISTANCE AND CONTINUING EDUCATION
UNIVERSITY OF DELHI
INFORMATION TECHNOLOGY MANAGEMENT
MASTER OF BUSINESS ADMINISTRATION (MBAFT 6108)
SEMESTER I

UNIT 1
LECTURE 1
VIDEO LECTURE BY : DR. REEMA THAREJA
CHARACTERISTICS OF A COMPUTER?
APPLICATIONS OF A COMPUTER?

Desktop publishing Music and Movies

Digital video or audio composition Travel and tourism

Government Hospitals

Traffic control Simulation

Legal system Astronomy

Business Weather forecasting

Sports Banking

Education Manufacturing and Designing


THE IPO CYCLE

A computer works on the process of Input -> Process -> Output.

Data and instructions that we enter into the computer are called input. We enter
data and instructions into the computer using an Input Device.

Performing operations (or working) on data is called processing. The CPU (Central
Processing Unit) transforms (or converts) data into information.

The CPU can process data but for that it needs instructions from the user. The
instructions direct the CPU as how that data should be processed.
GENERATION OF COMPUTER
GENERATION OF COMPUTER
CHECK YOUR PROGRESS
The first commercial computer delivered to a business client is:
(a) UNIVAC (b) ENIAC (c) EDSAC (d) None of these

2. The technology used in the manufacture of second generation computers is:


(a) Vacuum tubes (b) Transistors (c) ICs (d) None of these

The brain of the computer is the:


(a) Control unit (b) ALU (c) CPU (d) All of these
CHECK YOUR PROGRESS
Computers work on the GIGO concept. (T / F)

First-generation computers used a very large number of transistors. (T / F)

First-generation computers could be programmed only in binary language. (T / F)

Fifth-generation computers are based on AI. (T / F)

A program is a ________.

Computers operate on ________ based on ________.

Computers can perform ________ calculations in a second.

Raw facts or figures are called ________.

________ is an example of primary memory.


CPU – THE PROCESSING DEVICE
CPU – THE PROCESSING DEVICE
COMPUTER MEMORY
Computer memory is a storage area in the computer used to store data and
programs either temporarily or permanently.
Computer memory can be broadly divided into two groups—primary memory
and secondary memory.
While the main memory holds instructions and data when a program is being
executed, the auxiliary or the secondary memory holds data and programs not
currently in use and provides long-term storage.
To execute a program, all the instructions or data that has to be used by the CPU
has to be loaded into the main memory.
The primary memory is volatile; therefore, the data can be retained in it, only
when the power is on. It is very expensive and thus limited in capacity.
COMPUTER MEMORY
The secondary memory stores data or instructions permanently, even when the power
is turned off. It is cheap and can store large volumes of data.
Data stored in auxiliary memory is highly portable.
The only drawback of secondary memory is that data can be accessed from it at a very
slow speed.
CDs are easily portable from one computer to
another and are therefore used to transfer
data from one computer to another. The
storage capacity of CD-ROM varies from 650
MB to 1 GB
Digital Video Disk or Digital Versatile Disc (DVD-ROM) is an extremely high capacity optical
disc with storage capacity from 4.7 GB to 17 GB.

Most of the DVD-ROMs are double sided discs as they can store data on both the sides of the
disc. A DVD-ROM drive is compatible with CD ROM drives and can therefore read ordinary
CD-ROM disks. Capacity of Blu Ray Disk is 50 GB.

USB flash drives are removable, rewritable, and physically much smaller drives
weighing even less than 30 g. The storage capacity of USB flash drives was as large
as 256 GB.
CHECK YOUR PROGRESS

________ capture videos that can be transferred via the Internet in real-time.

________ is used to feed data and instructions into the computer.

________ is used to read information of an optical Data from marked fields.

________ memory holds data and programs that are currently being executed by the CPU.

________ memory is volatile.

________ memory stores data or instructions permanently.

Select the pointing devices from the following options:

(a) Keyboard (b) Barcode reader (c) Joystick (d) Touchscreen


CHECK YOUR PROGRESS
The CPU uses which memory to store instructions and data that are repeatedly required to
execute programs to improve overall system performance?

(a) Primary memory (b) Auxiliary memory (c) Cache memory (d) Flash memory

Magnetic tapes, floppy disks, optical disks, flash memory, and hard disks are examples of

(a) primary memory (b) auxiliary memory (c) cache memory (d) flash memory

A plotter is used to print vector graphics. (T / F)

A mouse cannot be used with a laptop computer. (T / F)

Soft copy output devices are those that produce a physical form of output. (T / F)

The monitor is a soft copy output device. (T / F)

Primary memory is faster than secondary memory (T / F)


• onduct cybersecurity training and awareness: Every organization must train their staffs on cybersecurity, company policies, and incident reporting
for a strong cybersecurity policy to be successful. If the staff does unintentional or intentional malicious activities, it may fail the best technical
safeguards that result in an expensive security breach. Therefore, it is useful to conduct security training and awareness for staff through seminars,
classes, and online courses that reduce security violations.
• Update software and operating system: The most popular safety measure is to update the software and O.S. to get the benefit of the latest security
patches.
• Use anti-virus software: It is also useful to use the anti-virus software that will detect and removes unwanted threats from your device. This software is
always updated to get the best level of protection.
• Perform periodic security reviews: Every organization ensures periodic security inspections of all software and networks to identify security risks
early in a secure environment. Some popular examples of security reviews are application and network penetration testing, source code reviews,
architecture design reviews, and red team assessments. In addition, organizations should prioritize and mitigate security vulnerabilities as quickly as
possible after they are discovered.
• Use strong passwords: It is recommended to always use long and various combinations of characters and symbols in the password. It makes the
passwords are not easily guessable.
• Do not open email attachments from unknown senders: The cyber expert always advises not to open or click the email attachment getting from
unverified senders or unfamiliar websites because it could be infected with malware.
• Avoid using unsecured Wi-Fi networks in public places: It should also be advised not to use insecure networks because they can leave you
vulnerable to man-in-the-middle attacks.
• Backup data: Every organization must periodically take backup of their data to ensure all sensitive data is not lost or recovered after a security breach.
In addition, backups can help maintain data integrity in cyber-attack such as SQL injections, phishing, and ransomware.

You might also like