UNIT 1
PREMENDRA KUMAR SAHU
ASST. PROFESSOR
Defining Information
● What is Information?
Information is any knowledge that comes to
our attention. That could be voice, image,
text and video.
●What is data?
Data is information when dealing with the
machine
Information Technology
The term information technology
(IT)includes not only the use of computers
but also communications networks and
computer literacy—knowledge of how to
usecomputer technology. As in other fields,
the basic tasks of gathering, allocating,
controlling, and retrieving information are
the same.
What Counts as information
Methods for conveying information
Defining Information Technology
●
Information Technologies are systems
of hardware and/or software that
capture, process, exchange, store
and/or present information using
electrical, magnetic and/or
electromagnetic energy.
IT Example: Cellular Telephony
IT Example: Wireless Internet
IT in Society (people)
●
Personal Communication
●
Conversations (phone, cell)
●
Messaging (E-mail, SMS)
●
Video Coms
●
Entertainment
●
Web surfing
●
Downloading video and audio files
●
Interactive gaming
●
Day-to-Day living
●
Buying airline ticket
●
Ordering books
●
Electronic banking/ stock market
IT in Society (business)
●
Internal Communication
●
Computer network
●
Corporate website
●
Video teleconferencing
●
Messaging (SMS, email)
●
Electronic Commerce
●
Call Centres
●
Electronic transactions
●
Online sales
●
Business operations
●
Factory operation systems
●
Databases
Examples on IT Careers
●
Information Security Jobs
●
Address information security
●
IT Analyst
●
Translate business requirement into technical specification
●
Network Administration
●
Configure and operate computer network
●
Management Consulting
●
Provide consulting for government and organizations
●
Database Administration
●
Managing corporate database
●
Computer Forensics Expert
●
Extracts computer evidence for detecting/preventing /prosecuting crimes
●
IT Sales:
●
people on frontline to sell products
●
Software development:
●
develop software solutions
The First Generation: 1945-1956 (The Vacuum Tube Years)
The first generation computers were huge, slow,
expensive, and often undependable.
The Second Generation: 1956-1963 (The Era of the Transistor)
The transistor computer did not last as long as
the vacuum tube computer lasted, but it was
no less important in the advancement of
computer technology.
The Third Generation: 1965-1970 (Integrated Circuits-Miniaturizing
the Computer)
Transistors were a tremendous breakthrough in
advancing the computer. However, no one could predict
that thousands even now millions of transistors (circuits)
could be compacted in such a small space.
The Fourth Generation: 1971-Today (The Microprocessor)
This generation can be characterized by both the jump to
monolithic integrated circuits (millions of transistors put onto
one integrated circuit chip) and the invention of the
microprocessor (a single chip that could do all the processing
of a full-scale computer).
The Fifth Generation: Present & Beyond (Artificial Intelligence)
Artificial intelligence (AI) is intelligence exhibited by machines. In
computer science, an ideal "intelligent" machine is a flexible
rational agent that perceives its environment and takes actions that
maximize its chance of success at some goa.l
Database management system
Database is a collection of related data and
data is a collection of facts and figures that
can be processed to produce information.
Database management system stores data
in such a way that it becomes easier to
retrieve, manipulate, and produce information.
Characteristics of DBMS
1) Real-world entity
2) Relation-based tables.
3) Isolation of data and application
4) Less redundancy
5) Consistency
6) Query Language
7) ACID Properties
8) Multiuser and Concurrent Access
9) Multiple views
10) Security
Components of DBMS
1)Software
2)Hardware
3)Data
4)Procedures
5)Database Access Language
Procedures
Procedures refer to the instructions and rules that help to design the
database and to use the DBMS. The users that operate and manage the
DBMS require documented procedures on hot use or run the database
management system. These may include.
Procedure to install the new DBMS.
To log on to the DBMS.
To use the DBMS or application program.
To make backup copies of database.
To change the structure of database.
To generate the reports of data retrieved from database.
Database Access Language
The database access language is used to
access the data to and from the database.
The users use the database access language
to enter new data, change the existing data in
database and to retrieve required data from
databases.
USERs
Application Programmers
The people who write application programs in programming
languages (such as Visual Basic, Java, or C++) to interact with
databases are called Application Programmer.
Database Administrators
A person who is responsible for managing the overall database
management system is called database administrator or simply DBA.
End-Users
The end-users are the people who interact with database
management system to perform different operations on database
such as retrieving, updating, inserting, deleting data etc.
Types of Database Management
1)Hierarchical databases.
2)Network databases.
3)Relational databases.
4)Object-oriented databases
Hierarchical Databases (DBMS) :
Hierarchical Databases (DBMS) :
Advantage : Hierarchical database can be accessed and
updated rapidly because in this model structure is like as
a tree and the relationships between records are defined
in advance. This feature is a two-edged.
Disadvantage : This type of database structure is that
each child in the tree may have only one parent, and
relationships or linkages between children are not
permitted, even if they make sense from a logical
standpoint. Hierarchical databases are so in their design.
it can adding a new field or record requires that the
entire database be redefined.
Network Database
Relational Databases
Properties of Relational Tables:
It's Values are Atomic
In Each Row is alone.
Column Values are of the Same thing.
Columns is undistinguished.
Sequence of Rows is Insignificant.
Each Column has a common Name.
Relational Databases
Object-Oriented Model
Object-Oriented Model
Each object contains of two elements:
Piece of data (e.g., sound, video, text, or graphics).
Instructions, or software programs called methods, for
what to do with the data.
Disadvantage of Object-oriented databases
Object-oriented database are more expensive to
develop.
In the Most organizations are unwilling to abandon and
convert from those databases.
Two-Tier Architecture
The two-tier is based on Client Server
architecture. The two-tier architecture is like
client server application. The direct
communication takes place between client
and server. There is no intermediate between
client and server. Because of tight coupling a
2 tiered application will run faster.
Two-Tier Architecture
Two-Tier Architecture
Advantages:
1) Easy to maintain and modification is bit easy
2) Communication is faster
3) Fast application development time
4) Available tools are robust and lend themselves to fast
prototyping to insure user needs a met accurately and
completely.
5) Conducive to environments with homogeneous clients,
homogeneous applications, and static business rules.
Two-Tier Architecture
Disadvantages:
1)In two tier architecture application
performance will be degrade upon increasing
the users.
2)Cost-ineffective.
3) Security wise this is complicated as users
need to have separate login information for
every SQL server.
Three-Tier Architecture
Three-tier architecture typically comprise a presentation tier,
a business or data access tier, and a data tier.
Three-Tier Architecture
● Advantages:
● a. Managing data is independent from the physical storage
● b. Migration to new graphical environments is faster
● c. It is possible to make changes on the presentation level without
affecting the other two (business or data access layer)
● d. As each tier is independent it is possible to use different sets of
developers
● e. Since the client doesn’t have direct access to the database
business logic is more secure
● f. When one tier fails there is no data loss, because you are always
secure by accessing the other tier.
Three-Tier Architecture
Disadvantages:
● a. It is more complex structure
● b. More difficult to set up and maintain it as
well
● c. The physical separation of the tiers may
affect the performance between the three
● d. It is more difficult to built a 3-tier application