CHAPTER 1: Introduction to ICT & Computer
COURSE INSTRUCTOR:
ENGR. FARHEEN QAZI
COURSE:
COMPUTER APPLICATIONS (CS-353)
DEPARTMENT OF COMPUTER SCIENCE (UBIT)
UNIVERSITY OF KARACHI (UoK)
Grading (subject to adjustment)
10% Assignment
15% Project
10% Presentation
15% Midterm
50% Final
Course Outline
Introduction to ICT
Introduction to Computer
Operating Systems
Scheduling Algorithms
Number System
Boolean Algebra & Logic Gates
Data Communication
Latex Tool
Presentation
Project
Introduction To
Information & Communication Technologies
Introduction to ICT
ICT, or information and communications technology (or
technologies), is the infrastructure and components that
enable modern computing.
Among the goals of IC technologies, tools and systems is to
improve the way humans create, process and share data or
information with each other.
Another is to help them improve their abilities in numerous
areas, including business; education; medicine; real-world
problem-solving; and even leisure activities related to sports,
music, and movies.
Technologies Included in ICT
ICT encompasses the internet-enabled sphere and the mobile
one powered by wireless networks.
It includes antiquated technologies, such
as landline telephones, radio and television broadcast -- all of
which remain widely used alongside today's cutting-edge ICT
pieces, such as artificial intelligence and robotics.
The internet, internet of things, metaverse, virtual
reality and social media are also part of ICT, as are cloud
computing services, video conferencing and collaboration
tools, unified communications systems and mobile
communication networks. Emerging, work-in-progress or still-
nascent technologies like 5G/6G, Web3, and quantum
computing are also in the ICT universe.
Contd….
Any technology, infrastructure, component, or device that
enables communications, data sharing, and global
connectivity between humans and between humans and
machines is included in the umbrella term ICT.
Components of ICT
The list of ICT components is exhaustive
and continues to grow. Some
components, such as computers and
telephones, have existed for decades.
Others, such as smartphones, digital
TVs and robots, are more recent entries.
ICT components include the following:
Devices (hardware)
Software
Middleware
Data
Wired networks
Contd….
Wireless networks
Communication technologies
The cloud
Communications protocols and interfaces
Information security and governance policies
IT VS ICT
IT is often considered to be a subset of ICT that deals with the technical
aspects of managing information, while ICT is a broader term that
encompasses both IT and communication technologies.
While IT deals primarily with computer hardware, software, and
networking technologies, ICT includes not only these technologies but
also communication technologies such as telegraph, telephone, radio
and television.
Advantages of ICT
Below are some of the benefits of information and communication
technology (ICT):
It enables quicker, easier, and far less expensive accessibility to
data and knowledge.
It accelerates commercial transactions, manufacturing, and
managerial operations.
ICT has enabled individuals all around the world to connect to the
internet in novel & fascinating ways.
Business relationships & transactions have become more intimate as
a result of ICT technologies.
Contd….
In current times, it offers a very dependable, versatile, rapid, &
effective way of transmitting the information.
It creates job chances & offers new professional possibilities for
individuals all across the world.
It also serves as one of the most effective means of conveying
information in different sectors.
Challenges of ICT
Its many benefits notwithstanding, ICT has also created problems
and challenges for organizations, individuals and society.
The digitization of data, the expanding use of the high-speed
internet and the growing global network together have created
new opportunities for crime.
Increasingly, bad actors leverage these opportunities to hatch new
schemes to gain unauthorized access to enterprise or government
systems.
They do so to steal money, intellectual property or private
information.
Many cybercrimes are also aimed at disrupting systems that
control critical infrastructure and, ultimately, creating widespread
chaos and panic.
Contd….
In some cases, ICT has let more people limit their face-to-face
interactions with others, creating or exacerbating social issues such
as trolling, cyberbullying, isolation, loneliness and depression.
Introduction To Computer
Computer ?
A data processing machine operated automatically under
the control of a list of the instructions(called a program) stored
in its main memory.
The computer's four major functions are to
1. Gather data (or allow users to input data),
2. Process (manipulate, calculate, or organize) that data,
3. Output data or information (display information in a form
suitable for the user), and
4. Store data and information for later use.
Computer System
Input – Processing - Output
Input
What you type, read, or enter into computer?
Input Devices
Keyboard
Mouse
Scanner
Sensors
Contd….
Processing
Changes the input data via formatting, sorting, and
calculations
Processing Devices
Components on the motherboard
CPU
ALU
Memory
Contd….
Output
Results of computer processing
Output Devices
Screen
Printer
Plotter
Signals
Contd…..
Storage
Save information for later processing
Storage Devices
Memory
Diskette
Hard disk
Tap
Parts of Computer System
A complete computer system includes 4 distinct parts:
Hardware
Software
1. Application Software (e.g: Word processors, compilers, web browsers,
database systems, video games)
2. System Software (e.g: Operating System)
Data
Users
Contd….
Hardware
A computer's hardware consists of electronic devices; the
parts you can see and touch.
The term "device" refers to any piece of hardware used by
the computer, such as a keyboard, monitor, modem,
mouse, etc.
Contd….
Contd….
Software
Software – also called Programs – consists of organized sets
of instructions for controlling the computer.
Some programs exist for the computer's use, to help it
manage its own tasks and devices.
Other programs exist for the user, and enable the computer
to perform tasks for you, such as creating documents
Contd….
Computer Software
Contd….
Data
Data consists of raw facts, which the computer can
manipulate and process into information that is useful to
people.
Computerized data is digital, meaning that it has been
reduced to digits, or numbers. The computer stores and reads
all data as numbers.
Although computers use data in digital form, they convert
data into forms that people can understand, such as text,
numerals, sounds, and images.
Contd….
Contd….
People
People are the computer's operators, or users.
Some types of computers can operate without much
intervention from people, but personal computers are designed
specifically for use by people.
What is an Operating System?
A program that acts as an intermediary between a user of a
computer and the computer hardware
Operating system goals:
Execute user programs and make solving user problems
easier
Make the computer system convenient to use
Use the computer hardware in an efficient manner
(Cont.)
Operating System Definition
OS is a resource allocator
Manages all resources
Decides between conflicting requests for efficient and fair
resource use
OS is a control program
Controls execution of programs to prevent errors and
improper use of the computer
Operating System Definition (Cont.)
No universally accepted definition
“ Everything a vendor ships when you order an operating
system” is a good approximation
But varies wildly
“The one program running at all times on the computer” is the
kernel.
Everything else is either
a system program (ships with the operating system) , or
an application program.
System Components
Process Management
Main Memory Management
File Management
I/O System Management
Secondary Management
Protection System
Command-Interpreter System
Process Management
A process is a program in execution. It is a unit of work within the
system. Program is a passive entity, process is an active entity.
Process needs resources to accomplish its task
CPU, memory, I/O, files
Initialization data
Process termination requires reclaim of any reusable resources
Single-threaded process has one program counter specifying location
of next instruction to execute
Process executes instructions sequentially, one at a time, until completion
Multi-threaded process has one program counter per thread
Typically system has many processes, some user, some operating
system running concurrently on one or more CPUs
Concurrency by multiplexing the CPUs among the processes / threads
Process Management Activities
The operating system is responsible for the following activities in
connection with process management:
Creating and deleting both user and system processes
Suspending and resuming processes
Providing mechanisms for process synchronization
Providing mechanisms for process communication
Providing mechanisms for deadlock handling
Process State
As a process executes, it changes state
new: The process is being created
running: Instructions are being executed
waiting: The process is waiting for some event to occur
ready: The process is waiting to be assigned to a
processor
terminated: The process has finished execution
Five State Process Model
Process State Transition
New → Ready: OS ready to schedule the new process.
Ready → Running: OS Scheduler selects one of the processes in
the ready queue to run.
Running → Exit: Process notifies OS to exit or abort.
Running → Ready: Processes has reached its quantum and OS
uses scheduling algorithm to find the next process in Ready
state. Process can also release the processor.
Running → Blocked: Process issues a request and must wait for
the event.
Blocked → Ready: Event for which the process is waiting has
occurred.
Ready → Exit: Parent process terminates a child process. Parent
process terminates and all child processes also terminates.
Main Memory Management
Memory is a large array of words or bytes, each with its own
address. It is a repository of quickly accessible data shared by
the CPU and I/O devices.
Main memory is a volatile storage device. It loses its contents in
the case of system failure.
The I/O operations implemented via DMA also read and write
data in memory.
To improve both the utilization of CPU and the speed of the
computer’s response to its users, we keep several programs in
memory.
Main Memory Management Activities
The operating system is responsible for the following activities in
connections with memory management:
Keep track of which parts of memory are currently being
used and by whom.
Decide which processes to load when memory space
becomes available.
Allocate and deallocate memory space as needed.
Memory Layout for Multiprogrammed System
File Management
A file is a collection of related information defined by its
creator. Commonly, files represent programs (both source
and object forms) and data.
Data such as text files.
Computers can store information on several different types of
physical media.
Magnetic tape, magnetic disk, and optical disk are the most
common media.
Each of these media has its own characteristics and physical
organization.
File Management Activities
The operating system is responsible for the following activities
in connections with file management:
File creation and deletion.
Directory creation and deletion.
Support of primitives for manipulating files and directories.
Mapping files onto secondary storage.
File backup on stable (nonvolatile) storage media.
I/O System Management
The I/O subsystem consists of:
A memory management component including buffering,
caching and spooling.
A general device-driver interface.
Drivers for specific hardware devices.
Secondary-Storage Management
Since main memory (primary storage) is volatile and too small
to accommodate all data and programs permanently, the
computer system must provide secondary storage to back
up main memory.
Most modern computer systems use disks as the principle on-
line storage medium, for both programs and data.
Secondary-Storage Management
Activities
The operating system is responsible for the following
activities in connection with disk management:
Free space management
Storage allocation
Disk scheduling
Protection System
Protection refers to a mechanism for controlling access by
programs, processes, or users to both system and user
resources.
An unprotected resource cannot defend against use (or
misuse) by an unauthorized or incompetent user.
The protection mechanism must:
distinguish between authorized and unauthorized usage.
specify the controls to be imposed.
Operating System Services
An operating system provides an environment for the
execution of programs.
Program execution
System capability to load a program into memory and to
run it.
Program must be able to end its execution, either
normally or abnormally (indicating error).
I/O operations
Since user programs cannot execute I/O operations
directly, the operating system must provide some means
to perform I/O.
Operating System Services (Cont.)
File-system manipulation
Program capability to read, write, create, and delete files.
Communications
Exchange of information between processes executing
either on the same computer or on different systems tied
together by a network. Implemented via shared memory or
message passing.
Error detection
Ensure correct computing by detecting errors in the CPU
and memory hardware, in I/O devices, or in user programs.
Process and job control
MS-DOS Execution
Process and job control
UNIX Running Multiple Programs
Proprietary VS Open-Source
Operating Systems
Open-Source Proprietary
Purchased with its source code Purchased without its source code
User can get open operating User must pay to get the
proprietary operating system
system for free of charge
User can modify the OS
User can modify the OS
User must have a license from
User can install OS freely into vendor before install into
any computer computer
No one s responsible to the OS Full support from the vendor if
anything happened to the OS
Linux, Ubuntu, fedora etc.
Windows Vista, Windows 10 etc.
End of Chapter 1
Thank you