Download presentation
Presentation is loading. Please wait.
Published byLenard Warner Modified over 9 years ago
1
Information Technology Basics Georgia CTAE Resource Network Curriculum Office, June 2009 To accompany curriculum for the Georgia Peach State Career Pathways June 2009, Kayla Calhoun & Dr. Frank Flanders
2
Objectives Define modern information technology. Define modern information technology. Explain the six functions of data management. Explain the six functions of data management. Compare types of networks. Compare types of networks. List information technology applications. List information technology applications. Relate information technology skills to careers. Relate information technology skills to careers.
3
Modern Definition of Information Technology (IT) Use of computer hardware and software to manage information Use of computer hardware and software to manage information
4
Six Functions of Data Management Convert Convert Store Store Protect Protect Process Process Transmit Transmit Retrieve Retrieve
5
Data Conversion In order to perform any other operations, a computer must convert information into bit (binary digit) format In order to perform any other operations, a computer must convert information into bit (binary digit) format 0’s and 1’s0’s and 1’s In everyday use, this In everyday use, this is simply putting data into an electronic format that is stored and retrievable.
6
Data Storage After data is converted into bits, it can be stored in bytes (a string of 8 bits) After data is converted into bits, it can be stored in bytes (a string of 8 bits) Primary storage, or memory, is located in the hard drive and can be directly accessed by the central processing unit (CPU) Primary storage, or memory, is located in the hard drive and can be directly accessed by the central processing unit (CPU) Secondary storage: located outside the computer; ex: disks, CDs, USB sticks, external hard drives Secondary storage: located outside the computer; ex: disks, CDs, USB sticks, external hard drives Good for security purposesGood for security purposes
7
Data Protection Prevention of data corruption Prevention of data corruption Limits access to data Limits access to data Disk encryptionDisk encryption Backup – internal or external copies of data files in case of accidental data lossBackup – internal or external copies of data files in case of accidental data loss Data masking – hiding specific private data within a databaseData masking – hiding specific private data within a database Data erasure – destroys all electronic data on a hard drive to maintain privacy if it is discarded or reusedData erasure – destroys all electronic data on a hard drive to maintain privacy if it is discarded or reused
8
Data Processing Conversion of data into usable information Conversion of data into usable information CPU CPU Fetches instructions for a program from memoryFetches instructions for a program from memory Decodes and reads instructionsDecodes and reads instructions Portions of the CPU connect and execute instructionsPortions of the CPU connect and execute instructions Writes back the results to memoryWrites back the results to memory
9
Data Transmission Physical transfer of data over a medium, such as copper wire, optical fiber, or wireless Physical transfer of data over a medium, such as copper wire, optical fiber, or wireless Networks: enable two or more computers to share files, printers, and communicate with each other Networks: enable two or more computers to share files, printers, and communicate with each other
10
Networks Local Area Network (LAN): contained within one building or site Local Area Network (LAN): contained within one building or site Wide Area Network (WAN): connects more than one site Wide Area Network (WAN): connects more than one site Ex: InternetEx: Internet
11
Networks, continued Client-server: client computers are all connected by a central server; can be LAN or WAN Client-server: client computers are all connected by a central server; can be LAN or WAN Peer-to-Peer: computers are connected to each other, but files are not stored in a central location; can only be LAN Peer-to-Peer: computers are connected to each other, but files are not stored in a central location; can only be LAN
12
Networks, continued Server: large & powerful digital storage point that performs a service for other computers in a network; file, print, web, mail Server: large & powerful digital storage point that performs a service for other computers in a network; file, print, web, mail Easier to maintain security and perform backups when files are centrally stored Easier to maintain security and perform backups when files are centrally stored
13
Internet Connects millions of computers across the globe Connects millions of computers across the globe Used for obtaining and providing information Used for obtaining and providing information IP Address: each computer has one; enables data to be sent to and received from a specific computerIP Address: each computer has one; enables data to be sent to and received from a specific computer HTMLHTML E-mailE-mail
14
Data Retrieval “science of searching” “science of searching” User enters a query (ex: search string on web search engine or computer hard drive) User enters a query (ex: search string on web search engine or computer hard drive) Computer information retrieval system scores objects in database by relevancy and displays those most relevant to the query Computer information retrieval system scores objects in database by relevancy and displays those most relevant to the query
15
Common IT Applications Word processors: used to create and edit documents Word processors: used to create and edit documents Spreadsheets: used to analyze figures and present information with graphs/charts Spreadsheets: used to analyze figures and present information with graphs/charts Databases: stores information about a set of similar items Databases: stores information about a set of similar items
16
Common IT Applications Publishing: more control over formatting and arranging than word processing Publishing: more control over formatting and arranging than word processing PowerPoint: used in business presentations and the classroom to present factual information or for persuasive purposes PowerPoint: used in business presentations and the classroom to present factual information or for persuasive purposes
17
Careers in Information Technology While most workers use information stored electronically daily, IT specialists are needed to manage those information systems. While most workers use information stored electronically daily, IT specialists are needed to manage those information systems. Some jobs in IT: Some jobs in IT: Network EngineerNetwork Engineer Network AdministratorNetwork Administrator System AdministratorSystem Administrator Database AdministratorDatabase Administrator IT Project ManagerIT Project Manager Chief Information Officer (CIO)Chief Information Officer (CIO)
18
The Top Skills of IT Professionals are: Computer Networking Computer Networking Information Security Information Security Database Management Database Management Information Storage and Retrieval Information Storage and Retrieval Computer Programming Computer Programming
19
Summary Information technology is the use of computer hardware and software to manage information. Information technology is the use of computer hardware and software to manage information. IT professionals use computer systems to convert, store, protect, process, transmit, and retrieve data. IT professionals use computer systems to convert, store, protect, process, transmit, and retrieve data. Computers are connected to each other by networks. Computers are connected to each other by networks.
20
Summary, continued Networks sometimes have one or more servers, which store files in a central location. Networks sometimes have one or more servers, which store files in a central location. Some common IT software applications are word processors, spreadsheets, databases, publishing, and PowerPoint Some common IT software applications are word processors, spreadsheets, databases, publishing, and PowerPoint The information age has created the new career field of information technology. The information age has created the new career field of information technology. IT specialists must be prepared to learn and adapt to constantly changing technologies. IT specialists must be prepared to learn and adapt to constantly changing technologies.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.