SlideShare a Scribd company logo
PENGANTAR TEKNOLOGI INFORMASI
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
20192019
Introduction Information Technology
1
Basic Concepts of Computer Systems
and Information Technology
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
20192019
Introduction Information Technology
2
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
20192019
Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id
CONTACT ME
3
Objectives
Students are able to explain the opportunities for utilizing IT
strategies in the current era.
4
Reference
5
5th Edition, Irv Englander
John Wiley and Sons
INFORMATION AND TECHNOLOGY
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
20192019
Introduction Information Technology
6
Defining Information
• What is Information?
Information is any knowledge that comes to our attention. That
could be voice, image, text and video
• What is data?
Data is information when dealing with the machine
7
What Counts as information
8
Methods for conveying information
9
Defining Information Technology
• Information Technologies are systems of hardware and/or
software that capture, process, exchange, store and/or
present information using electrical, magnetic and/or
electromagnetic energy.
10
IT Example: Cellular Telephony
11
IT Example: Wireless Internet
12
IT in Society (people)
• Personal Communication
• Conversations (phone, cell)
• Messaging (E-mail, SMS)
• Video Coms
• Entertainment
• Web surfing
• Downloading video and audio files
• Interactive gaming
• Day-to-Day living
Buying airline tecket
Ordering books
Electronic banking/ stock market
13
IT in Society (business)
• Internal Communication
• Computer network
• Corporate website
• Video teleconferencing
• Messaging (SMS, email)
• Electronic Commerce
• Call Centres
• Electronic transactions
• Online sales
• Business operations
Factory operation systems
Databases
14
Examples on IT Careers
• Information Security Jobs
• Address information security
• IT Analyst
• Translate business requirement into
technical specification
• Network Administration
• Configure and operate computer network
• Management Consulting
• Provide consulting for government and
organizations
• Database Administration
Managing corporate database
• Computer Forensics Expert
Extracts computer evidence for
detecting/preventing /prosecuting crimes
• IT Sales:
people on frontline to sell products
• Software development:
develop software solutions
15
An Introduction to Systems Concepts and Systems
Architecture
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
20192019
5th Edition, Irv Englander
John Wiley and Sons
16
What is a system?
• What do the following systems have in common?
1. Plumbing system
2. Solar system
3. Home network system
4. Inventory control system
2-17
Plumbing System
2-18
Solar System
2-19
Home Network System
2-20
Inventory Control System
2-21
Definition of a System
• “A system is a collection of components linked together and organized in
such a way as to be recognizable as a single unit.”
• Linked components of a system also define a boundary for the system
• The environment is anything outside of the system
2-22
General Representation of a System
2-23
System Decomposition
• Components
• May be irreducible or
• May be subsystems
• Decomposition
• The division of a system into its components and linkages
• Hierarchical
2-24
System Architecture
“The fundamental properties, and the patterns of relationships,
connections, constraints, and linkages among the components and
between the system and its environment are known collectively as the
architecture of the system”
2-25
Abstractions of Systems
• How are the following two abstractions of a business system different
from one another?
• How are these abstractions different from the real business system?
2-26
Business Organization Chart
2-27
Business Application Architecture
2-28
IT System Architectures
• Distributed processing systems
• Client-Server Computing
• Two-tier architecture
• Three-tier architecture
• N-tier architecture
• Web-Based Computing
• Cloud Computing
• Peer-to-Peer Computing
2-29
Client-Server Computing
• A program on a client computer requests services from a program on a
server computer
• Examples:
• Email services, file services, print services, directory services, Web services,
database services, application services, remote access services
2-30
Basic Client-Server Architecture
2-31
Advantages of Client-Server Architecture
• Centralization of services permits
• easier administration of services by IT professionals
• easier availability and location by users
• consistency of resources, such as files and data, can be managed and assured
• more efficient and cost-effective hardware procurement through purchasing
a small number of very powerful computers
2-32
Clients and Servers on a Network
2-33
Multi-tier Architectures
• Two-tier architecture
• Two computers are involved in a service
• Example: Web browser and Web server model used in intranets and on
the Internet
• Three-tier architecture
• Three computers are involved in a service
• Example: client computer, Web server, database server
• N-tier architecture
2-34
Three-tier Web-based Email Architecture
2-35
Cloud Computing
• Off-site storage facilities for an organization
• Software as a service (SaaS): applications run on a server or
processing may be divided on server and client
• Platform as a service (PaaS): tools for a developer to create and run
applications on a cloud platform
• Infrastructure as a service (IaaS) – cloud-based hardware emulation of
virtual machines and networking
2-36
Cloud Computing Advantages/Risks
• Advantages
• Client’s datacenter needs are simplified; reduced costs
• Supports collaboration
• Scalable to a variety of host platforms
• Reduced maintenance downtime
• Lower investment for short-term projects
• Risks
• Quality of security is critical
• Outages or loss of connectivity may prevent users from working
• Requires long-term commitment and viability of cloud service
• Changes in operating procedures can result in data loss
2-37
Peer-to-Peer Computing
• Computers on a network are treated as equals
• Each computer can share resources with the other computers on the network
• Disadvantages
• Difficult to establish centralized control of services
• Difficult to locate services
• Difficult to synchronize versions of files or software
• Difficult to secure network from unauthorized access and from viruses
• Advantages
• Sharing files between personal computers
• Internet file sharing
2-38
Hybrid Model of Computing
• Client-server technology used to locate systems and files
• Then systems can participate in peer-to-peer transactions
• Examples
• Instant messaging
• Skype
• Napster
2-39
Google: System Architecture
• Provide powerful, fast search capability for material on the Internet
• Derive income from advertising that is targeted to each user based on their
searches
• Basic requirements
• Capable of responding to millions of simultaneous requests from all over the world
• Perform a web crawl of the Internet to retrieve and organize data
• Establish ranking of results with appropriately targeted advertising
• High reliability of the system
• System is easily scalable and cost effective
2-40
Google Data Center Search Application
Architecture
2-41
Simplified Google System Hardware Architecture
2-42
Facebook’s Application Architecture
• N-tier architecture
• Based entirely on open source software
• Serves as an intermediary between web browser and an application
provider’s Web service
• API and protocols allow information exchange between Facebook
servers and the application server
2-43
Component of IT
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
20192019
5th Edition, Irv Englander
John Wiley and Sons
44
The Components of IT
• Accepting and storing data and information
• Performing mathematical calculations
• Applying logic to make decisions
• Retrieving, displaying, and sending information
• Consistently repeating the above actions many times
45
Information Technology Categories
• Hardware: the electronic and mechanical components you can see
and touch
• Software: the set of instructions that direct the hardware
• Network technology: increases the power of IT by allowing the
sharing of resource
46
IT Platform
47
Hardware Components
• Processing: Directs execution of instructions and the transformation of data
• Memory: Temporarily stores data and instructions before and after processing
• Input: Provides the interface used for data entry into a device
• Output: Provides the interface to retrieve information from a device
• Storage: Stores data, information, and instructions for the long term
• Communications: Connects one IT device to another
48
The Central Processing Unit
• Core of all computing operations is a chip composed of millions of transistors
called the central processing unit (or CPU).
• A transistor is an electronic switch that can be on (1) or off (0).
• By combining multiple transistors we can represent data in a binary format.
• The CPU works together with memory to control the execution of instructions
and the processing of data.
• CPU speed is measured by its clockspeed in billions of cycles per second
(gigahertz).
49
Memory
• There are two types of memory—long term (ROM) memory and
short-term (RAM) memory
• Both types of memory are built onto memory chips
• Both are measured in number of bytes stored:
• 1000’s (kilobytes—KB)
• Millions (megabytes—MB
• Billions (gigabytes—GB)
50
Read Only Memory
• Read Only Memory (ROM) contains instructions that
are not meant to be changed or changed only
infrequently
• ROM is present in most IT devices
• In computers, ROM holds instructions used to
control the startup process
• There are far fewer ROM chips than RAM chips in a
computer
51
Random Access Memory
• Random Access Memory (RAM) is the predominant
form of memory in a computer.
• The CPU can access any item stored in RAM directly
(randomly).
• RAM is temporary memory so anything in RAM is lost
when the computer is shut down.
• Increasing RAM capacity is the easiest way to increase
effectiveness of a computer.
52
Input Hardware
• Input devices provide one interface between the internal processes of an
IS and its environment.
• It allows us to enter data and commands.
• Input devices include:
• Keyboards
• Pointing devices such as a mouse
• Scanning devices such a barcode scanner
53
Keyboard
• Most widely used input device for computers.
• Highly versatile, providing the capability to enter all types of data as well as
instructions.
• Ergonomic keyboards are keyboards that are designed to keep users safe as
well as enabling them to be more productive.
54
Pointing and Scanning Devices
• Pointing devices such as a mouse allow users to provide instructions to a computer
using physical movements, such as “point” and “click”.
• Pointing devices tend to require less training than a keyboard.
• More useful to entering commands than for entering data.
• Scanning devices such as barcode readers improve speed and efficiency or perform a
task more efficiently.
55
Output Hardware
• Output devices convert IT-processed information into a form usable by
knowledge workers (or other machines)
• Quality and speed of output is important in choosing an output device.
• Common output devices include
• Display devices such as liquid crystal displays (LCDs)
• Printers, typically laser or ink-jet as well as plotters
• Speakers
56
IT Storage Hardware
• Storage refers to hardware media and devices used to contain
large amounts of data and instructions for the long term.
• Storage is much slower to access than memory.
• Examples include:
• Hard drive
• CD and DVDs
• USB flash memory
57
Communications Hardware
• Network interface card (NIC) provides the
physical connection between the computer and a
local network
• Wired
• Wireless
• Modems allow you to connect to a remote
network over a telecommunications line
(telephone line or cable TV service)
58
Software
• Software is information that specifies how the device should work
with other data, information, and knowledge.
• Software is legally protected just like music and books.
• Firmware is software built into chips (hardware) like that in cell
phones and PDAs
• Software gets the job done!
• System Software
• Application Software
59
System Software
• Controls the hardware associated with a system
• Supports the execution of application software
• Two main types of systems software
• Operating Systems (OS) Software –coordinates and handles the details of
working with the computer hardware.
• Utility software – provides additional tools to maintain and service your
system (many utility software tasks are now included in the OS).
60
Basic OS Tasks
61
Application Software
• Application software is a complete, self-contained program or set of
programs for performing a specific job.
• Application software is the software you use to get things done.
• Productivity software – software used by knowledge workers to work
with data, information, and knowledge. For example, MS Office and
Intuit’s Quicken software.
62
Types of Productivity Software
• Document Preparation Software: used in creating documents composed of text, images, and
graphics.
• Electronic Spreadsheet Software: used to perform general calculations and analyses.
• Presentation Graphics Software: used for preparing slides and graphics for business
presentations.
• Database Management System (DBMS) software: used to design, create, update, and query
data.
• Personal Information Management (PIM) software: used to manage personal information.
63
Connecting over Networks
• Networks are everywhere! In this section, we concentrate
on a computer networks.
• A computer network consists of nodes that represent
computer hardware and network user with hardware,
software, and communications media forming links
between nodes.
• Network consists of 4 primary components:
• Data
• Special hardware
• Software that allows computers to share data.
• Communications media to link computers together.
64
Network Categories
• Computer networks are commonly described by the
physical size of the network.
• The most commonly use types are LANs and WANs.
• A Local Area Network (LAN) is confined to a
relatively small area like a building.
• A Wide Area Network (WAN) connects computers
over regions, countries, and continents.
65
Network Hardware
• There are three basic categories of network hardware
1. Hardware to connect a device to a network.
2. Specialized hardware for handling network traffic.
3. Specialized computers that control the network and delivery of data on the
network.
66
Network Connection Hardware
• Modems, cable modems, network interface cards, and wireless cards
• The physical link that creates the network connection is referred to as
the carrier or communications medium.
• Copper wire for telephone systems
• Coaxial cable or fiber-optic cables for faster transmission
• Wireless technologies including infrared light, radio waves, and microwaves.
67
Network Traffic Hardware
• A bridge is a device that lets you connect to networks or break a large network into
two smaller, more efficient networks.
• A router is an intelligent bridge that connects, translates, and then directs data that
cross between two networks.
• A hub (or concentrator) serves as a central connection point for devices on a a
network.
• A wireless Access Point (AP) is a special bridge that connects between wireless
devices and a wired network.
68
Specialized Network Computers
• Servers are specialized computers that manage the various functions
on a network.
• A file server is a fast computer with large amount of RAM and
storage.
• File servers run the network operating system as well as storing
shared software applications and data files.
• Computers connected to a file server are called clients or
workstations.
69
Network Software
• Network operating system software manages network functions and
the flow of data over a computer network.
• Network application software provides the instructions that allow for
the creation of data and for transformation to fit appropriate
protocols for transmission over a network.
• A protocol is a standard set of rules that allows the communication of
data between nodes on a network.
70
Network Benefits
• Efficient communication: E-mail and instant messaging are just two ways that networks allow us to
communicate more efficiently.
• Effective resource management: Networks allow easy sharing of software, hardware, and data
resources.
• Complete, accurate, reliable, and timely information: Multiple users can access or update data
quickly from a central database.
• Expanded marketing and customer service capabilities: Businesses and individuals can carry out
remote business transactions anytime and anywhere.
71
The Internet
• Any computer network that connects several networks together is an internet.
• Typically we refer to the single largest and most popular internet as the “Internet.”
• Over 1 billion people had access to the Internet in 2006.
• The Internet uses the TCP/IP suite of packet switching protocols.
• Any computer using software compatible with TCP/IP, regardless of OS, can connect
and communicate over the Internet.
72
Access the Internet
• Home users access the Internet through dial-up over traditional telephone
lines or broadband through cable or DSL.
• Most users connect through an Internet Service Provider (ISP) using
Internet access software.
• Internet access has moved into libraries, airports, or coffee shops using
Wi-Fi.
• Wi-fi stands for 802.11 standards for wireless network access.
73
The World Wide Web
• The World Wide Web (WWW) is one the two most popular Internet applications (e-mail
is the other.)
• The Web provides a hypertext system that operates over the Internet.
• Hypertext provides an easy way to publish information on a network in documents that
incorporate hyperlinks to other information on the network.
• Web browser software enables user to view hypertext document and use hyperlinks to
browse other related documents.
74
Web Standards
The Web relies on three basic standards:
1. A Uniform Resource Locator (URL) which specifies a unique address for each page
that indicates the location of a document.
2. The Hypertext Transfer Protocol (HTTP) provides rules used by browsers and
servers as they respond to each other.
3. Hypertext Markup Language (HTML) provides a language for encoding the
information so a variety of IT devices can display it.
75
THANK YOU ...
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS EKONOMI DAN BISNIS
YUSRA FERNANDO, S.KOM., M.KOM
20192019
76

More Related Content

PPTX
PST SC015 Chapter 1 Intro. to IT 2017/2018
PPTX
Information Technology
PPTX
Introduction to Technology
PPTX
M2M and IoT Design Methodologies
PPTX
Introduction to IoT
PPTX
Concept of information system & networking..
PDF
REP.01 PROJ-FX01 Smart Home RP-v2
PPTX
Ppt on embedded
PST SC015 Chapter 1 Intro. to IT 2017/2018
Information Technology
Introduction to Technology
M2M and IoT Design Methodologies
Introduction to IoT
Concept of information system & networking..
REP.01 PROJ-FX01 Smart Home RP-v2
Ppt on embedded

What's hot (20)

PDF
REP.01 NETW3205 Network Management
PPTX
Sir mumtaz kolai lectures
PDF
IoT and m2m
PPTX
Exploring the Difference Between Information Technology and Information System
PPT
Ict form 4 chapter 1(answer)
PPT
Lesson 22 Managing Information and Information Technology
PPT
1.1 introduction to it and development of it
PPTX
Societal Impacts Of IT (Class X)
PPTX
Lecture notes on_management_information
PPTX
Chapter 9 communications and networks
PPTX
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
DOCX
CV Benard Korir
PPTX
Chapter 15
PPTX
Network management ppt
PPT
IS740 Chapter 06
PPT
Network management objective
PPTX
Ict presentation pptx
PPTX
Uc14 chap15
PPT
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
PPT
Security and ethical issues - Arber Hoxhallari
REP.01 NETW3205 Network Management
Sir mumtaz kolai lectures
IoT and m2m
Exploring the Difference Between Information Technology and Information System
Ict form 4 chapter 1(answer)
Lesson 22 Managing Information and Information Technology
1.1 introduction to it and development of it
Societal Impacts Of IT (Class X)
Lecture notes on_management_information
Chapter 9 communications and networks
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
CV Benard Korir
Chapter 15
Network management ppt
IS740 Chapter 06
Network management objective
Ict presentation pptx
Uc14 chap15
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Security and ethical issues - Arber Hoxhallari
Ad

Similar to Chp 01 PTI - Basic Concepts of Computer Systems and Information technology (shared) (20)

PDF
Chp 01 pti - basic concepts of computer systems and information technology ...
PPTX
Basics of Information Systems.pptx
PPTX
Infrastructure student
PPTX
Chapter #1.pptx
PPTX
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
PPT
Ch12
PPTX
2._Introduction _to_systems.pptx
PPT
Information technology
PPTX
AICT Lecture 01 -Basics of Computer Science.pptx
PPTX
IS 115_IS INNOVATION AND NEW TECHNOLOGIES.pptx
PPTX
Chapter 5-IT infrastructure(REV 2.0).pptx
PDF
Information System Management - Architecture and Infrastructure
PDF
PPT
Ch02
PPTX
Information technology Infrastructure
PPTX
Information Technology Infrastructure.pptx
PPTX
Hi600 ch08_text_slides
PPTX
Information systems
PPTX
Introduction-to-Computer-Technologies.pptx
PPTX
CHAPTER 1 Introduction to Information Technology
Chp 01 pti - basic concepts of computer systems and information technology ...
Basics of Information Systems.pptx
Infrastructure student
Chapter #1.pptx
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Ch12
2._Introduction _to_systems.pptx
Information technology
AICT Lecture 01 -Basics of Computer Science.pptx
IS 115_IS INNOVATION AND NEW TECHNOLOGIES.pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
Information System Management - Architecture and Infrastructure
Ch02
Information technology Infrastructure
Information Technology Infrastructure.pptx
Hi600 ch08_text_slides
Information systems
Introduction-to-Computer-Technologies.pptx
CHAPTER 1 Introduction to Information Technology
Ad

More from YUSRA FERNANDO (20)

PDF
Vs Code - Keyboard-Shortcuts-Windows.pdf
PDF
Chp 03 - Software PTI - (Shared).pdf
PDF
Chp 04 - Hardware PTI - (Shared).pdf
PDF
7. DATA RESOURCE MANAGEMENT.pdf
PDF
8. IT and Decision Making.pdf
PDF
06 - IT Infrastructure (shared).pdf
PDF
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
PDF
Bab 1 pengantar desain web
PDF
Chapter 3.3 css - tugas css (shared)
PDF
Javascript yusra 2021 (shared)
PDF
3. latihan css 01 (shared)
PDF
2 property css (shared)
PDF
Css pengenalan css
PPTX
Chapter 1 introduction html (shared)
PDF
Chapter 00 introduction - web desain -(shared)
PDF
Kepribadian dan Nilai
PDF
Emosi dan Suasana Hati
PDF
Sikap dan Kepuasan Kerja
PDF
Konsep Dasar Perilaku Organisasi
PDF
Konsep Dasar Perilaku Organisasi
Vs Code - Keyboard-Shortcuts-Windows.pdf
Chp 03 - Software PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
7. DATA RESOURCE MANAGEMENT.pdf
8. IT and Decision Making.pdf
06 - IT Infrastructure (shared).pdf
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Bab 1 pengantar desain web
Chapter 3.3 css - tugas css (shared)
Javascript yusra 2021 (shared)
3. latihan css 01 (shared)
2 property css (shared)
Css pengenalan css
Chapter 1 introduction html (shared)
Chapter 00 introduction - web desain -(shared)
Kepribadian dan Nilai
Emosi dan Suasana Hati
Sikap dan Kepuasan Kerja
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
sap open course for s4hana steps from ECC to s4
gpt5_lecture_notes_comprehensive_20250812015547.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology

Chp 01 PTI - Basic Concepts of Computer Systems and Information technology (shared)

  • 1. PENGANTAR TEKNOLOGI INFORMASI UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 20192019 Introduction Information Technology 1
  • 2. Basic Concepts of Computer Systems and Information Technology UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 20192019 Introduction Information Technology 2
  • 3. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 20192019 Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id CONTACT ME 3
  • 4. Objectives Students are able to explain the opportunities for utilizing IT strategies in the current era. 4
  • 5. Reference 5 5th Edition, Irv Englander John Wiley and Sons
  • 6. INFORMATION AND TECHNOLOGY UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 20192019 Introduction Information Technology 6
  • 7. Defining Information • What is Information? Information is any knowledge that comes to our attention. That could be voice, image, text and video • What is data? Data is information when dealing with the machine 7
  • 8. What Counts as information 8
  • 9. Methods for conveying information 9
  • 10. Defining Information Technology • Information Technologies are systems of hardware and/or software that capture, process, exchange, store and/or present information using electrical, magnetic and/or electromagnetic energy. 10
  • 11. IT Example: Cellular Telephony 11
  • 12. IT Example: Wireless Internet 12
  • 13. IT in Society (people) • Personal Communication • Conversations (phone, cell) • Messaging (E-mail, SMS) • Video Coms • Entertainment • Web surfing • Downloading video and audio files • Interactive gaming • Day-to-Day living Buying airline tecket Ordering books Electronic banking/ stock market 13
  • 14. IT in Society (business) • Internal Communication • Computer network • Corporate website • Video teleconferencing • Messaging (SMS, email) • Electronic Commerce • Call Centres • Electronic transactions • Online sales • Business operations Factory operation systems Databases 14
  • 15. Examples on IT Careers • Information Security Jobs • Address information security • IT Analyst • Translate business requirement into technical specification • Network Administration • Configure and operate computer network • Management Consulting • Provide consulting for government and organizations • Database Administration Managing corporate database • Computer Forensics Expert Extracts computer evidence for detecting/preventing /prosecuting crimes • IT Sales: people on frontline to sell products • Software development: develop software solutions 15
  • 16. An Introduction to Systems Concepts and Systems Architecture UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 20192019 5th Edition, Irv Englander John Wiley and Sons 16
  • 17. What is a system? • What do the following systems have in common? 1. Plumbing system 2. Solar system 3. Home network system 4. Inventory control system 2-17
  • 22. Definition of a System • “A system is a collection of components linked together and organized in such a way as to be recognizable as a single unit.” • Linked components of a system also define a boundary for the system • The environment is anything outside of the system 2-22
  • 23. General Representation of a System 2-23
  • 24. System Decomposition • Components • May be irreducible or • May be subsystems • Decomposition • The division of a system into its components and linkages • Hierarchical 2-24
  • 25. System Architecture “The fundamental properties, and the patterns of relationships, connections, constraints, and linkages among the components and between the system and its environment are known collectively as the architecture of the system” 2-25
  • 26. Abstractions of Systems • How are the following two abstractions of a business system different from one another? • How are these abstractions different from the real business system? 2-26
  • 29. IT System Architectures • Distributed processing systems • Client-Server Computing • Two-tier architecture • Three-tier architecture • N-tier architecture • Web-Based Computing • Cloud Computing • Peer-to-Peer Computing 2-29
  • 30. Client-Server Computing • A program on a client computer requests services from a program on a server computer • Examples: • Email services, file services, print services, directory services, Web services, database services, application services, remote access services 2-30
  • 32. Advantages of Client-Server Architecture • Centralization of services permits • easier administration of services by IT professionals • easier availability and location by users • consistency of resources, such as files and data, can be managed and assured • more efficient and cost-effective hardware procurement through purchasing a small number of very powerful computers 2-32
  • 33. Clients and Servers on a Network 2-33
  • 34. Multi-tier Architectures • Two-tier architecture • Two computers are involved in a service • Example: Web browser and Web server model used in intranets and on the Internet • Three-tier architecture • Three computers are involved in a service • Example: client computer, Web server, database server • N-tier architecture 2-34
  • 35. Three-tier Web-based Email Architecture 2-35
  • 36. Cloud Computing • Off-site storage facilities for an organization • Software as a service (SaaS): applications run on a server or processing may be divided on server and client • Platform as a service (PaaS): tools for a developer to create and run applications on a cloud platform • Infrastructure as a service (IaaS) – cloud-based hardware emulation of virtual machines and networking 2-36
  • 37. Cloud Computing Advantages/Risks • Advantages • Client’s datacenter needs are simplified; reduced costs • Supports collaboration • Scalable to a variety of host platforms • Reduced maintenance downtime • Lower investment for short-term projects • Risks • Quality of security is critical • Outages or loss of connectivity may prevent users from working • Requires long-term commitment and viability of cloud service • Changes in operating procedures can result in data loss 2-37
  • 38. Peer-to-Peer Computing • Computers on a network are treated as equals • Each computer can share resources with the other computers on the network • Disadvantages • Difficult to establish centralized control of services • Difficult to locate services • Difficult to synchronize versions of files or software • Difficult to secure network from unauthorized access and from viruses • Advantages • Sharing files between personal computers • Internet file sharing 2-38
  • 39. Hybrid Model of Computing • Client-server technology used to locate systems and files • Then systems can participate in peer-to-peer transactions • Examples • Instant messaging • Skype • Napster 2-39
  • 40. Google: System Architecture • Provide powerful, fast search capability for material on the Internet • Derive income from advertising that is targeted to each user based on their searches • Basic requirements • Capable of responding to millions of simultaneous requests from all over the world • Perform a web crawl of the Internet to retrieve and organize data • Establish ranking of results with appropriately targeted advertising • High reliability of the system • System is easily scalable and cost effective 2-40
  • 41. Google Data Center Search Application Architecture 2-41
  • 42. Simplified Google System Hardware Architecture 2-42
  • 43. Facebook’s Application Architecture • N-tier architecture • Based entirely on open source software • Serves as an intermediary between web browser and an application provider’s Web service • API and protocols allow information exchange between Facebook servers and the application server 2-43
  • 44. Component of IT UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS 20192019 5th Edition, Irv Englander John Wiley and Sons 44
  • 45. The Components of IT • Accepting and storing data and information • Performing mathematical calculations • Applying logic to make decisions • Retrieving, displaying, and sending information • Consistently repeating the above actions many times 45
  • 46. Information Technology Categories • Hardware: the electronic and mechanical components you can see and touch • Software: the set of instructions that direct the hardware • Network technology: increases the power of IT by allowing the sharing of resource 46
  • 48. Hardware Components • Processing: Directs execution of instructions and the transformation of data • Memory: Temporarily stores data and instructions before and after processing • Input: Provides the interface used for data entry into a device • Output: Provides the interface to retrieve information from a device • Storage: Stores data, information, and instructions for the long term • Communications: Connects one IT device to another 48
  • 49. The Central Processing Unit • Core of all computing operations is a chip composed of millions of transistors called the central processing unit (or CPU). • A transistor is an electronic switch that can be on (1) or off (0). • By combining multiple transistors we can represent data in a binary format. • The CPU works together with memory to control the execution of instructions and the processing of data. • CPU speed is measured by its clockspeed in billions of cycles per second (gigahertz). 49
  • 50. Memory • There are two types of memory—long term (ROM) memory and short-term (RAM) memory • Both types of memory are built onto memory chips • Both are measured in number of bytes stored: • 1000’s (kilobytes—KB) • Millions (megabytes—MB • Billions (gigabytes—GB) 50
  • 51. Read Only Memory • Read Only Memory (ROM) contains instructions that are not meant to be changed or changed only infrequently • ROM is present in most IT devices • In computers, ROM holds instructions used to control the startup process • There are far fewer ROM chips than RAM chips in a computer 51
  • 52. Random Access Memory • Random Access Memory (RAM) is the predominant form of memory in a computer. • The CPU can access any item stored in RAM directly (randomly). • RAM is temporary memory so anything in RAM is lost when the computer is shut down. • Increasing RAM capacity is the easiest way to increase effectiveness of a computer. 52
  • 53. Input Hardware • Input devices provide one interface between the internal processes of an IS and its environment. • It allows us to enter data and commands. • Input devices include: • Keyboards • Pointing devices such as a mouse • Scanning devices such a barcode scanner 53
  • 54. Keyboard • Most widely used input device for computers. • Highly versatile, providing the capability to enter all types of data as well as instructions. • Ergonomic keyboards are keyboards that are designed to keep users safe as well as enabling them to be more productive. 54
  • 55. Pointing and Scanning Devices • Pointing devices such as a mouse allow users to provide instructions to a computer using physical movements, such as “point” and “click”. • Pointing devices tend to require less training than a keyboard. • More useful to entering commands than for entering data. • Scanning devices such as barcode readers improve speed and efficiency or perform a task more efficiently. 55
  • 56. Output Hardware • Output devices convert IT-processed information into a form usable by knowledge workers (or other machines) • Quality and speed of output is important in choosing an output device. • Common output devices include • Display devices such as liquid crystal displays (LCDs) • Printers, typically laser or ink-jet as well as plotters • Speakers 56
  • 57. IT Storage Hardware • Storage refers to hardware media and devices used to contain large amounts of data and instructions for the long term. • Storage is much slower to access than memory. • Examples include: • Hard drive • CD and DVDs • USB flash memory 57
  • 58. Communications Hardware • Network interface card (NIC) provides the physical connection between the computer and a local network • Wired • Wireless • Modems allow you to connect to a remote network over a telecommunications line (telephone line or cable TV service) 58
  • 59. Software • Software is information that specifies how the device should work with other data, information, and knowledge. • Software is legally protected just like music and books. • Firmware is software built into chips (hardware) like that in cell phones and PDAs • Software gets the job done! • System Software • Application Software 59
  • 60. System Software • Controls the hardware associated with a system • Supports the execution of application software • Two main types of systems software • Operating Systems (OS) Software –coordinates and handles the details of working with the computer hardware. • Utility software – provides additional tools to maintain and service your system (many utility software tasks are now included in the OS). 60
  • 62. Application Software • Application software is a complete, self-contained program or set of programs for performing a specific job. • Application software is the software you use to get things done. • Productivity software – software used by knowledge workers to work with data, information, and knowledge. For example, MS Office and Intuit’s Quicken software. 62
  • 63. Types of Productivity Software • Document Preparation Software: used in creating documents composed of text, images, and graphics. • Electronic Spreadsheet Software: used to perform general calculations and analyses. • Presentation Graphics Software: used for preparing slides and graphics for business presentations. • Database Management System (DBMS) software: used to design, create, update, and query data. • Personal Information Management (PIM) software: used to manage personal information. 63
  • 64. Connecting over Networks • Networks are everywhere! In this section, we concentrate on a computer networks. • A computer network consists of nodes that represent computer hardware and network user with hardware, software, and communications media forming links between nodes. • Network consists of 4 primary components: • Data • Special hardware • Software that allows computers to share data. • Communications media to link computers together. 64
  • 65. Network Categories • Computer networks are commonly described by the physical size of the network. • The most commonly use types are LANs and WANs. • A Local Area Network (LAN) is confined to a relatively small area like a building. • A Wide Area Network (WAN) connects computers over regions, countries, and continents. 65
  • 66. Network Hardware • There are three basic categories of network hardware 1. Hardware to connect a device to a network. 2. Specialized hardware for handling network traffic. 3. Specialized computers that control the network and delivery of data on the network. 66
  • 67. Network Connection Hardware • Modems, cable modems, network interface cards, and wireless cards • The physical link that creates the network connection is referred to as the carrier or communications medium. • Copper wire for telephone systems • Coaxial cable or fiber-optic cables for faster transmission • Wireless technologies including infrared light, radio waves, and microwaves. 67
  • 68. Network Traffic Hardware • A bridge is a device that lets you connect to networks or break a large network into two smaller, more efficient networks. • A router is an intelligent bridge that connects, translates, and then directs data that cross between two networks. • A hub (or concentrator) serves as a central connection point for devices on a a network. • A wireless Access Point (AP) is a special bridge that connects between wireless devices and a wired network. 68
  • 69. Specialized Network Computers • Servers are specialized computers that manage the various functions on a network. • A file server is a fast computer with large amount of RAM and storage. • File servers run the network operating system as well as storing shared software applications and data files. • Computers connected to a file server are called clients or workstations. 69
  • 70. Network Software • Network operating system software manages network functions and the flow of data over a computer network. • Network application software provides the instructions that allow for the creation of data and for transformation to fit appropriate protocols for transmission over a network. • A protocol is a standard set of rules that allows the communication of data between nodes on a network. 70
  • 71. Network Benefits • Efficient communication: E-mail and instant messaging are just two ways that networks allow us to communicate more efficiently. • Effective resource management: Networks allow easy sharing of software, hardware, and data resources. • Complete, accurate, reliable, and timely information: Multiple users can access or update data quickly from a central database. • Expanded marketing and customer service capabilities: Businesses and individuals can carry out remote business transactions anytime and anywhere. 71
  • 72. The Internet • Any computer network that connects several networks together is an internet. • Typically we refer to the single largest and most popular internet as the “Internet.” • Over 1 billion people had access to the Internet in 2006. • The Internet uses the TCP/IP suite of packet switching protocols. • Any computer using software compatible with TCP/IP, regardless of OS, can connect and communicate over the Internet. 72
  • 73. Access the Internet • Home users access the Internet through dial-up over traditional telephone lines or broadband through cable or DSL. • Most users connect through an Internet Service Provider (ISP) using Internet access software. • Internet access has moved into libraries, airports, or coffee shops using Wi-Fi. • Wi-fi stands for 802.11 standards for wireless network access. 73
  • 74. The World Wide Web • The World Wide Web (WWW) is one the two most popular Internet applications (e-mail is the other.) • The Web provides a hypertext system that operates over the Internet. • Hypertext provides an easy way to publish information on a network in documents that incorporate hyperlinks to other information on the network. • Web browser software enables user to view hypertext document and use hyperlinks to browse other related documents. 74
  • 75. Web Standards The Web relies on three basic standards: 1. A Uniform Resource Locator (URL) which specifies a unique address for each page that indicates the location of a document. 2. The Hypertext Transfer Protocol (HTTP) provides rules used by browsers and servers as they respond to each other. 3. Hypertext Markup Language (HTML) provides a language for encoding the information so a variety of IT devices can display it. 75
  • 76. THANK YOU ... UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS EKONOMI DAN BISNIS YUSRA FERNANDO, S.KOM., M.KOM 20192019 76