0% found this document useful (0 votes)
57 views

Unit 1: Premendra Kumar Sahu Asst. Professor

The document defines key concepts related to information technology including information, data, and defines information technology as systems that capture, process, exchange, store and present information using electrical and electromagnetic energy. It provides examples of how IT is used in personal communication, entertainment, day-to-day living, and business. It also outlines some common IT careers and generations of computers from vacuum tubes to artificial intelligence. Finally, it discusses database management systems, their components, types including hierarchical, network, relational and object-oriented models.

Uploaded by

Premendra Sahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Unit 1: Premendra Kumar Sahu Asst. Professor

The document defines key concepts related to information technology including information, data, and defines information technology as systems that capture, process, exchange, store and present information using electrical and electromagnetic energy. It provides examples of how IT is used in personal communication, entertainment, day-to-day living, and business. It also outlines some common IT careers and generations of computers from vacuum tubes to artificial intelligence. Finally, it discusses database management systems, their components, types including hierarchical, network, relational and object-oriented models.

Uploaded by

Premendra Sahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 38

UNIT 1

PREMENDRA KUMAR SAHU


ASST. PROFESSOR
Defining Information
● What is Information?
Information is any knowledge that comes to
our attention. That could be voice, image,
text and video.

●What is data?
Data is information when dealing with the
machine
Information Technology
The term information technology
(IT)includes not only the use of computers
but also communications networks and
computer literacy—knowledge of how to
usecomputer technology. As in other fields,
the basic tasks of gathering, allocating,
controlling, and retrieving information are
the same.
What Counts as information
Methods for conveying information
Defining Information Technology

Information Technologies are systems
of hardware and/or software that
capture, process, exchange, store
and/or present information using
electrical, magnetic and/or
electromagnetic energy.
IT Example: Cellular Telephony
IT Example: Wireless Internet
IT in Society (people)

Personal Communication

Conversations (phone, cell)

Messaging (E-mail, SMS)

Video Coms

Entertainment

Web surfing

Downloading video and audio files

Interactive gaming

Day-to-Day living

Buying airline ticket

Ordering books

Electronic banking/ stock market
IT in Society (business)

Internal Communication

Computer network

Corporate website

Video teleconferencing

Messaging (SMS, email)

Electronic Commerce

Call Centres

Electronic transactions

Online sales

Business operations

Factory operation systems

Databases
Examples on IT Careers

Information Security Jobs

Address information security

IT Analyst

Translate business requirement into technical specification

Network Administration

Configure and operate computer network

Management Consulting

Provide consulting for government and organizations

Database Administration

Managing corporate database

Computer Forensics Expert

Extracts computer evidence for detecting/preventing /prosecuting crimes

IT Sales:

people on frontline to sell products

Software development:

develop software solutions
The First Generation: 1945-1956 (The Vacuum Tube Years)

The first generation computers were huge, slow,


expensive, and often undependable.
The Second Generation: 1956-1963 (The Era of the Transistor)

The transistor computer did not last as long as


the vacuum tube computer lasted, but it was
no less important in the advancement of
computer technology.
The Third Generation: 1965-1970 (Integrated Circuits-Miniaturizing
the Computer)

Transistors were a tremendous breakthrough in


advancing the computer. However, no one could predict
that thousands even now millions of transistors (circuits)
could be compacted in such a small space.
The Fourth Generation: 1971-Today (The Microprocessor)

This generation can be characterized by both the jump to


monolithic integrated circuits (millions of transistors put onto
one integrated circuit chip) and the invention of the
microprocessor (a single chip that could do all the processing
of a full-scale computer).
The Fifth Generation: Present & Beyond (Artificial Intelligence)

Artificial intelligence (AI) is intelligence exhibited by machines. In


computer science, an ideal "intelligent" machine is a flexible
rational agent that perceives its environment and takes actions that
maximize its chance of success at some goa.l
Database management system
Database is a collection of related data and
data is a collection of facts and figures that
can be processed to produce information.
Database management system stores data
in such a way that it becomes easier to
retrieve, manipulate, and produce information.
Characteristics of DBMS

1) Real-world entity
2) Relation-based tables.
3) Isolation of data and application
4) Less redundancy
5) Consistency
6) Query Language
7) ACID Properties
8) Multiuser and Concurrent Access
9) Multiple views
10) Security
Components of DBMS

1)Software
2)Hardware
3)Data
4)Procedures
5)Database Access Language
Procedures

Procedures refer to the instructions and rules that help to design the
database and to use the DBMS. The users that operate and manage the
DBMS require documented procedures on hot use or run the database
management system. These may include.
Procedure to install the new DBMS.
To log on to the DBMS.
To use the DBMS or application program.
To make backup copies of database.
To change the structure of database.
To generate the reports of data retrieved from database.
Database Access Language
The database access language is used to
access the data to and from the database.
The users use the database access language
to enter new data, change the existing data in
database and to retrieve required data from
databases.
USERs
Application Programmers
The people who write application programs in programming
languages (such as Visual Basic, Java, or C++) to interact with
databases are called Application Programmer.
Database Administrators
A person who is responsible for managing the overall database
management system is called database administrator or simply DBA.
End-Users
The end-users are the people who interact with database
management system to perform different operations on database
such as retrieving, updating, inserting, deleting data etc.
Types of Database Management
1)Hierarchical databases.
2)Network databases.
3)Relational databases.
4)Object-oriented databases
Hierarchical Databases (DBMS) :
Hierarchical Databases (DBMS) :

Advantage : Hierarchical database can be accessed and


updated rapidly because in this model structure is like as
a tree and the relationships between records are defined
in advance. This feature is a two-edged.
Disadvantage : This type of database structure is that
each child in the tree may have only one parent, and
relationships or linkages between children are not
permitted, even if they make sense from a logical
standpoint. Hierarchical databases are so in their design.
it can adding a new field or record requires that the
entire database be redefined.
Network Database
Relational Databases
Properties of Relational Tables:

It's Values are Atomic


In Each Row is alone.
Column Values are of the Same thing.
Columns is undistinguished.
Sequence of Rows is Insignificant.
Each Column has a common Name.
Relational Databases
Object-Oriented Model
Object-Oriented Model

Each object contains of two elements:


Piece of data (e.g., sound, video, text, or graphics).
Instructions, or software programs called methods, for
what to do with the data.
Disadvantage of Object-oriented databases
Object-oriented database are more expensive to
develop.
In the Most organizations are unwilling to abandon and
convert from those databases.
Two-Tier Architecture

The two-tier is based on Client Server


architecture. The two-tier architecture is like
client server application. The direct
communication takes place between client
and server. There is no intermediate between
client and server. Because of tight coupling a
2 tiered application will run faster.
Two-Tier Architecture
Two-Tier Architecture
Advantages:
1) Easy to maintain and modification is bit easy
2) Communication is faster
3) Fast application development time
4) Available tools are robust and lend themselves to fast
prototyping to insure user needs a met accurately and
completely.
5) Conducive to environments with homogeneous clients,
homogeneous applications, and static business rules.
Two-Tier Architecture
Disadvantages:
1)In two tier architecture application
performance will be degrade upon increasing
the users.
2)Cost-ineffective.
3) Security wise this is complicated as users
need to have separate login information for
every SQL server.
Three-Tier Architecture

Three-tier architecture typically comprise a presentation tier,


a business or data access tier, and a data tier.
Three-Tier Architecture
● Advantages:
● a. Managing data is independent from the physical storage
● b. Migration to new graphical environments is faster
● c. It is possible to make changes on the presentation level without
affecting the other two (business or data access layer)
● d. As each tier is independent it is possible to use different sets of
developers
● e. Since the client doesn’t have direct access to the database
business logic is more secure
● f. When one tier fails there is no data loss, because you are always
secure by accessing the other tier.
Three-Tier Architecture
Disadvantages:
● a. It is more complex structure
● b. More difficult to set up and maintain it as
well
● c. The physical separation of the tiers may
affect the performance between the three
● d. It is more difficult to built a 3-tier application

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy