Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

20
Chapter Two Introduction to Information Technology Prepared by: Eman Amer

description

Prepared by: Eman A. Amer Computer Performance 1) CPU clock speed:  Clock speed means how many instructions the processor can execute in one second.  It is measured in megahertz or gigahertz.  One megahertz equals to one million cycles per second,  One gigahertz equals one billion cycles per second.  if you have a higher clock speed, your computer will work more faster.

Transcript of Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Page 1: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Chapter TwoIntroduction to Information Technology

Prepared by: Eman Amer

Page 2: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Computer Performance

Factors that affect the performance of the Processor or (CPU):

1. CPU clock speed2. RAM size 3. Hard disk speed 4. Hard disk storage5. Hard disk space (free space)6. Multitasking

Page 3: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Computer Performance

1) CPU clock speed: Clock speed means how many instructions the processor can

execute in one second. It is measured in megahertz or gigahertz. One megahertz equals to one million cycles per second, One gigahertz equals one billion cycles per second. if you have a higher clock speed, your computer will work more

faster.

Page 4: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Computer Performance

2) RAM size if you use more of RAM size , system speed will drop down.

3) Hard disk speed Disk access time, is measured in milliseconds. if this access time is smaller, then the hard disk will store, or retrieve

data more faster.

4) Hard disk storageThe disk storage capacity is measured in Gigabytes.

Page 5: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Computer Performance5) Hard disk space (free space)

More hard disk space, the computer will be more faster.

6) Multitasking- Means run more than one program at a time.- The more programs that are running at the same time, the system

will be more slower.Examples:a) Playing racing games such as Need for Speed.b) Editing a large high definition video for instance can take up a lot of

CPU time.

Page 6: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Workgroup Computing

Workgroup: groups of people working together so they can share their resources with each other.

People within the workgroup can:- Share information on their hard disks.- Sharing printers, modems and scanners.

Page 7: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Workgroup Computing

Workgroup can consist of:- a few computers at a single location connected physically to each

other via a network cable.OR - it may be a workgroup of computers connected globally via the

Internet.

Page 8: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Workgroup ComputingAdvantages of workgroup computing:

1. There is no reliance on a central computer.2. No need for a network administrator as long as the members of the

workgroup have the authority and access right to share data with other members.

3. Cost savings

Page 9: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Workgroup ComputingDisadvantages of workgroup computing:

1. Sharing files on your PC with other people, can slow down the running of your PC.

2. The security of the computer network may not be that good.

3. You may give total access to the files on your PC, which may then be damaged or even deleted, by other members of the workgroup.

Page 10: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Internet, Intranet and Extranetintranet Extranet Internet

An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization.

An extranet is a private network that uses Internet protocols, network connectivity. An extranet can be viewed as part of a company's intranet that is extended to users outside the company, usually via the Internet.

The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

Page 11: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Internet, Intranet and ExtranetInternet, Intranet and Extranet

Page 12: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Broadband vs. Dial-up Internet connection services

Broadband Dial-up

You are permantly connected to the internet

You need to dial up your ISP, whenever you want to connect to the internet

You will be charged every month You will be charged every second that you connect to the internet

The speed depends on how much you pay to your provider, but in general the internet access is fast.

Internet access is very slow

Page 13: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

The use of IT in everyday life

Computers are more appropriate than people in some areas such as:

1. Repetitive tasks.2. Easily automated tasks.3. Mathematical calculations.4. Dangerous situations.

Page 14: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

The use of IT in everyday life

There are some uses of large-scale computer applications in education such as:

1. Student registration and timetabling.2. Computer Based Training (CBT.3. Using the Internet as a homework resource.4. Distance learning systems (E-learning is a term used to describe studying

via the Internet).

Page 15: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Tele-working

Tele-working is a broad term which refers to people working at home connected to the rest of the organization via a computer network.

Advantages:1) Flexible schedules.2) Reduced office desk space requirements.

Disadvantages:1) Negative impact on teamwork.2) Self-discipline.

Page 16: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Information Security

Information security is a general term which covers all aspects of computer security. It covers:

1. Protection against viruses and hackers.2. Password and access control policies.3. Procedures for the regular backing up of data.

Page 17: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Information Security

Be ware of the following:

1. Do not give your password to anyone.2. Do not write the password on a card or at any place.3. Do not forget your passwords.

Page 18: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Information Security

Things that should be avoided to keep your computer work properly:

1) Dust.2) Drinking and eating over the keyboard.3) Heat, Cold.4) Moisture.5) Moving the system while it is switched on.6) Placing objects on top of monitors. 7) Placing floppy disks near monitors.

Page 19: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Copyright and the Law

- Most programs which you purchase are copyrighted and you must not copy them.

FAST (Federation Against Software Theft): one of organizations that is dedicated to preventing the illegal copying of software.

Page 20: Chapter Two Introduction to Information Technology Prepared by: Eman Amer.

Prepared by: Eman A. Amer

Types of software license agreements:

1) Freeware: software that is designed to let you use the product freely.

2) Shareware: software that is designed to let you use the product freely for a limited period of time.

3) Open source: software license that makes the programming code available to anyone who wishes to enhance or develop the code.

Copyright and the Law