Reading Notes for Topic 1: Introduction to Computers
Topic Description
This topic introduces students to the fundamental concepts of computers, data
processing, information systems, and information security. It explores the classification of
computers, their components, and the role of Information and Communication Technology
(ICT) in various sectors. The topic also emphasizes cybersecurity and best practices for
protecting digital assets.
Topic Learning Objectives
By the end of this topic, students should be able to:
1. Define and differentiate between data and information.
2. Explain the key functions and components of a computer.
3. Classify computers based on their size, purpose, and processing power.
4. Describe the role of Information Systems, Information Technology (IT), and
Information and Communication Technology (ICT) in modern society.
5. Discuss the applications of ICT in various sectors such as education, business,
healthcare, and government.
6. Explain the importance of computer security, identify common cybersecurity
threats, and apply best practices for online safety.
1.1 Data and Information: Definitions and Characteristics
Definition of Data
Data refers to raw, unprocessed facts and figures that lack meaning until they are
analyzed. Data can exist in various forms, such as numbers, text, images, audio, and video.
Types of Data
Type of Data Description Example
Structured Organized in a predefined format Databases, Spreadsheets
Data
Unstructured Lacks a specific format Social media posts, Images,
Data Videos
Semi- Combination of structured and XML and JSON files
structured Data unstructured data
Definition of Information
Information is processed or structured data that is meaningful and useful for decision-
making. Information provides context to data, making it valuable.
Example: Data vs. Information
Scenario: A school records students' exam scores in a table.
• Data: "78, 85, 92, 67" (raw scores).
• Information: "The average student score in Mathematics is 80%." (analyzed and
structured data).
Review Questions:
1. What is the difference between data and information?
2. Provide an example of structured and unstructured data.
3. How can data be transformed into meaningful information?
1.2 Definition and Functions of a Computer
Definition of a Computer
A computer is an electronic device that processes data to generate useful information. It
follows the input → processing → output cycle.
Functions of a Computer (IPOS Cycle)
Function Description Example
Input Accepts data from input devices Typing on a keyboard
Processing Processes data using CPU Calculating exam grades
Storage Stores data permanently or temporarily Saving a document on a hard drive
Output Displays results via output devices Viewing a printed document
Real-life Analogy: A Kitchen as a Computer
Computer Component Kitchen Equivalent
Ingredients (Data) Raw vegetables
Chef (Processor) Cook preparing the food
Recipe (Program) Instructions for cooking
Final Dish (Output) Cooked meal
Kitchen Cabinets (Storage) Fridge & pantry
Review Questions:
1. Define a computer and its main functions.
2. Explain the IPOS cycle using an everyday example.
3. What is the role of the CPU in computer processing?
1.3 Main Components of a Computer System
1.3.1 Hardware Components
Component Examples
Input Devices Keyboard, Mouse, Scanner
Processing Unit CPU, GPU
Storage Devices HDD, SSD, USB drive
Output Devices Monitor, Printer, Speakers
1.3.2 Software Components
Type of Software Description Examples
System Software Manages hardware and system Windows, Linux, macOS
resources
Application Used for specific tasks Microsoft Office, Adobe
Software Photoshop
Programming Helps in developing applications Python, Java, C++
Software
Review Questions:
1. What are the main hardware components of a computer?
2. Explain the difference between system software and application software.
3. Give an example of an input and output device working together.
1.4 Introduction to Information Systems, IT, and ICT
In today’s digital world, Information Systems (IS), Information Technology (IT), and
Information and Communication Technology (ICT) play a critical role in managing, storing,
and sharing information efficiently. Understanding these concepts is essential for
leveraging technology in education, business, healthcare, and other sectors.
1.4.1 Definition of Information Systems (IS)
Definition:
An Information System (IS) is a structured combination of people, technology,
processes, and data that work together to collect, process, store, and distribute
information to support decision-making and operational functions.
Key Components of an Information System
Description Example
Component
Physical devices used in an IS. Computers, servers, network
Hardware devices.
Programs that run the system. Operating systems, databases,
Software ERP systems.
Data Raw facts and figures processed into Customer records, financial
information. transactions.
People Users who interact with the system. Employees, IT specialists,
customers.
Procedures and rules for managing Business workflows, data analysis.
Processes data.
Real-Life Example:
A hospital information system (HIS) collects patient records, schedules appointments,
and assists doctors in diagnosing diseases based on past medical history.
1.4.2 Information Technology (IT)
Definition:
Information Technology (IT) refers to the use of computing devices, software,
networks, and databases to store, retrieve, process, and transmit information efficiently.
IT is the backbone of modern digital infrastructure.
Core Components of IT
Component Description Example
Hardware Physical devices and equipment. Computers, smartphones, servers.
Software Programs and applications that Operating systems, office
run on hardware. software, web browsers.
Networks Communication systems for data Internet, LANs, Wi-Fi, 5G.
transfer.
Data Storing and organizing Databases, cloud storage, big
Management information. data analytics.
Real-Life Example:
Banks use IT systems to process transactions, manage accounts, and secure customer data
through encryption.
1.4.3 Information and Communication Technology (ICT)
Definition:
Information and Communication Technology (ICT) is an extension of IT that focuses on
the integration of computing and communication technologies to enhance connectivity,
collaboration, and information exchange.
Key Areas of ICT
Aspect Description Example
Telecommunication Networks for voice and data Mobile phones, fiber optics,
transmission. satellite communication.
Internet Services Web-based tools and Email, cloud computing, online
platforms. learning.
Multimedia Digital media for Video conferencing, social
communication and media, podcasts.
entertainment.
E-Government & E- Digital services for citizens Online tax filing, mobile
Commerce and businesses. banking, e-marketplaces.
Real-Life Example:
A virtual classroom (ICT application in education) allows students to attend online
courses, collaborate on assignments, and interact with teachers using digital tools like
Google Classroom and Zoom.
Comparison of IS, IT, and ICT
Aspect Information Information Information &
Systems (IS) Technology (IT) Communication
Technology (ICT)
A structured system The use of computers, The integration of IT
Definition that collects, software, and with communication
processes, and networks for data technologies for
distributes data. management. enhanced connectivity.
Focus Data management and Computing devices and Communication
Area business processes. digital infrastructure. technologies and digital
transformation.
Business operations, Software Internet, e-learning,
Application decision-making tools. development, mobile technology, and
hardware social networking.
management.
A hospital A company’s IT A remote learning
Example management system department installs system enables online
stores patient data networks and manages education via video
and schedules security. conferencing.
appointments.
Real-Life Analogy:
• IS is like a school’s record system, managing student data, attendance, and
grades.
• IT is like the computers and software used in that school for various tasks.
• ICT is like the use of the internet and mobile applications for e-learning and
communication.
Review Questions
1. What are the main components of an Information System?
2. How does IT differ from ICT?
3. Give examples of how ICT is used in education and healthcare.
4. Why is data management important in Information Systems?
5. How does the internet contribute to ICT applications in daily life?
Further Exploration & References
📖 Microsoft: Introduction to IT
🌍 World Economic Forum: ICT in Digital Transformation
IBM: What is an Information System?
Cisco: Introduction to Networking
Summary
Information Systems (IS) focus on data collection, processing, and decision-making.
Information Technology (IT) focuses on computers, software, and networks for data
management.
Information and Communication Technology (ICT) integrates IT with communication
technologies to enhance digital collaboration and global connectivity.
1.5 Information (or Computer) Security
Key IT Security Terminologies
Before diving into information security, let's define some essential terms used in
cybersecurity:
Term Definition Example
Authentication Process of verifying a user’s Logging into an email account
identity before granting access. with a password and a
fingerprint scan.
Authorization Process of granting specific A manager has access to
permissions to authenticated financial reports, while an
users. intern does not.
Encryption Converting data into a coded WhatsApp uses end-to-end
format to prevent unauthorized encryption to protect
access. messages.
Firewall A security system that monitors A firewall blocks suspicious
and controls incoming and traffic from an untrusted
outgoing network traffic. website.
Malware Malicious software designed to Viruses, ransomware, worms,
harm, exploit, or disrupt and trojans.
systems.
Phishing Fraudulent attempts to obtain A fake PayPal email asking
sensitive information via fake users to enter their
emails or websites. credentials.
Social Engineering Manipulating individuals to reveal A hacker pretending to be IT
confidential information. support asks for login
credentials.
Zero-Day Attack A cyberattack that exploits Hackers targeting a newly
unknown security vulnerabilities released mobile banking app
before they are fixed. with a security flaw.
Brute Force Attack A trial-and-error method used to Hackers use software to try
guess passwords. thousands of password
combinations per second.
Denial-of-Service Overloading a server to make it A DoS attack crashes a
(DoS) Attack unavailable. government website during
elections.
Multi-Factor Using two or more security Logging in with a password and
Authentication methods to verify a user’s a one-time code sent via SMS.
(MFA) identity.
Data Breach Unauthorized access and leakage A hacker steals millions of
of sensitive information. customer records from a
company database.
1.5.1 Key Concepts of Information Security (CIA Triad)
The CIA Triad forms the foundation of IT security:
Figure 1: Terminologies
Concept Definition Example
Confidentiality Ensures sensitive data is Using passwords and encryption
accessible only to authorized to protect personal emails.
users.
Integrity Ensures data remains accurate and Using digital signatures to verify
unaltered unless authorized the authenticity of electronic
changes are made. contracts.
Availability Ensures authorized users can Cloud backup ensures business
access information and services data remains available even after
when needed. a system crash.
Real-Life Analogy:
Think of a bank:
• Confidentiality: Only account holders and authorized bank staff can see account
details.
• Integrity: A customer’s balance cannot be altered without a valid transaction.
• Availability: ATMs and online banking must be accessible 24/7 for transactions.
Figure 2: The Information Security Triad
1.5.2 Cybersecurity Threats & Attacks
Cybercriminals use various techniques to exploit security vulnerabilities.
Figure 3: Security Attack
Threat Description Example
Malware (Malicious Harmful software that Ransomware locks a
Software) damages, disrupts, or gains company’s data and demands
unauthorized access to payment to unlock it.
systems.
Phishing Fake emails, messages, or A fraudulent email
websites designed to steal pretending to be from a
sensitive information. bank asks for login details.
Denial of Service Attackers flood a server with A DDoS attack on an online
(DoS) & Distributed excessive requests, making it shopping site during Black
Denial of Service unavailable. Friday causes a crash.
(DDoS)
Trojan Horse Malicious software disguised A fake "free antivirus"
as a legitimate program that program actually installs
grants hackers access. spyware.
Spyware Secretly records user activity, A browser extension tracks
including keystrokes, browsing and steals login credentials.
history, and personal data.
Zero-Day Exploit Cyberattack that exploits Hackers exploit a new social
unknown software media app bug before an
vulnerabilities before update is released.
developers fix them.
Brute Force Attack Automated trial-and-error Hackers use software to
method to guess passwords. guess thousands of
password combinations per
second.
Social Engineering Manipulating individuals to A hacker calls an employee
reveal confidential information. pretending to be IT support
and asks for login details.
Real-Life Analogy:
Cyber threats are like burglars trying to break into a house:
• Phishing is like a thief pretending to be a delivery person to gain access.
• Malware is like planting a spy camera inside a house.
• Brute Force Attacks are like trying every key on a keychain to unlock a door.
1.5.3 Malware Types
Malware How It Spreads Effects Prevention
Type
Virus Needs a host file Corrupts or deletes Use antivirus, avoid
files unknown attachments
Worm Self-replicates over Slows down networks, Update software, disable
networks crashes systems unused ports
Trojan Disguised as Grants hackers remote Download software from
legitimate software access trusted sites
Spyware Secretly monitors Steals personal data Use anti-spyware tools,
user activity avoid suspicious links
Adware Comes with free Displays intrusive ads, Use ad blockers, avoid
software redirects users freeware sites
Review Questions
1️⃣ How does a virus differ from a worm?
2️⃣ What type of malware is commonly disguised as a useful program?
3️⃣ Why is spyware dangerous for online banking users?
4️⃣ How can adware affect the browsing experience?
5️⃣ What are two best practices to prevent malware infections?
1.5.4 Best Security Practices
To stay protected online, follow these essential cybersecurity habits:
Security Measure Description Example
Use Strong Create complex passwords "SecureMyAccount@2024" instead
Passwords & MFA and enable multi-factor of "123456"
authentication for added
security.
Be Cautious of Verify sender email Hover over links before clicking to
Suspicious Emails addresses and URLs before check authenticity.
& Links clicking on links.
Keep Software & Regularly update operating Install updates to fix vulnerabilities
Devices Updated systems, applications, and exploited by Zero-Day Attacks.
security patches.
Backup Data Save copies of important Use Google Drive, OneDrive, or an
Regularly files on external drives or external hard drive for backups.
cloud storage.
Secure Personal & Lock devices with Encrypt sensitive files stored on
Business Devices passwords or biometric laptops, USB drives, and mobile
authentication. devices.
Use Firewalls & Block unauthorized access Norton, Bitdefender, and
Antivirus Software and detect malware threats. Kaspersky are common antivirus
solutions.
Avoid Public Wi-Fi Public Wi-Fi networks are Use a VPN (Virtual Private
for Sensitive often unsecured and Network) for encrypted
Transactions vulnerable to attacks. communication.
Real-Life Analogy:
Think of cybersecurity as home security:
• Passwords = Strong door locks.
• MFA = A key and fingerprint lock.
• Firewalls = A fence around your house.
• Backups = Keeping copies of important documents in a safe.
Review Questions
1. What are the three key principles of information security?
2. Give a real-world example of a phishing attack.
3. How does ransomware affect individuals and businesses?
4. What is the difference between Trojan Horse and Worms?
5. List three best security practices to protect personal and work data.
6. Why is multi-factor authentication (MFA) important in cybersecurity?
7. Explain how a DDoS attack works using a real-life analogy.
Further Exploration & References
Microsoft: Computer Basics – Microsoft Support
Cybersecurity Awareness – CISA
Internet Safety Tips – Norton
Phishing Scams & How to Avoid Them – Federal Trade Commission (FTC)
Ransomware Explained – Kaspersky
Overall Topic Review Questions for Introduction to Computers
Section 1: Data and Information
1. Define the terms data and information and explain how they differ.
2. Give an example of structured, unstructured, and semi-structured data in real-
life scenarios.
3. Describe the process of transforming raw data into meaningful information.
4. How does data storage and retrieval impact decision-making in modern
organizations?
5. Explain why data accuracy and consistency are critical in an Information System.
Section 2: Definition and Functions of a Computer
6. Define a computer and explain its primary functions.
7. What are the four main stages of the IPOS cycle? Give an example of how they
work in an ATM machine.
8. Compare the functions of the CPU, RAM, and Storage in a computer system.
9. Explain the difference between volatile and non-volatile memory, providing
examples.
10. How do peripheral devices enhance the functionality of a computer system?
Section 3: Main Components of a Computer System
11. Differentiate between hardware and software, providing three examples of each.
12. Explain the role of input, output, storage, and processing devices in a computer
system.
13. Compare System Software vs. Application Software in a tabular format.
14. Describe how a computer network enables hardware and software interaction.
15. What is the function of a Graphics Processing Unit (GPU) in a computer?
Section 4: Introduction to Information Systems, IT, and ICT
16. Define Information Systems (IS) and explain their components.
17. Differentiate between IT and ICT, providing two real-life examples of each.
18. How has ICT impacted modern businesses, healthcare, and education?
19. Explain the importance of database systems in Information Technology.
20. Compare local and cloud computing in terms of efficiency, security, and
accessibility.
Section 5: Information (or Computer) Security
21. What is Information Security, and why is it important in today’s digital world?
22. Explain the CIA Triad (Confidentiality, Integrity, and Availability) with real-life
analogies.
23. Define and compare the following cybersecurity threats:
• Malware vs. Phishing
• Trojan Horse vs. Worm
• DoS vs. DDoS attacks
24. List three best cybersecurity practices that individuals should follow to protect
their personal data.
25. Explain how Multi-Factor Authentication (MFA) enhances security.
26. What is ransomware, and how can organizations protect themselves against it?
27. How do firewalls and antivirus software protect computer systems from cyber
threats?
28. Describe the role of encryption in securing online transactions (e.g., online
banking).
29. Explain the importance of ethical hacking in strengthening cybersecurity
defenses.
30. Discuss the risks associated with using public Wi-Fi networks and how to mitigate
them.
Real-Life Application Questions
31. Imagine you are the IT manager of a company. What steps would you take to
protect your company's data from cyberattacks?
32. How does ICT contribute to remote learning and online collaboration? Provide an
example.
33. A hacker sends a fake email from a bank requesting your login details. How would
you identify this as a phishing attack, and what should you do?
34. Suppose you need to purchase a new computer. What factors would you consider
when choosing the right specifications for your needs?
35. Your organization experiences a server crash, resulting in lost data. How can
disaster recovery strategies help prevent such an issue in the future?