SlideShare a Scribd company logo
1 of 13
Information & CommunicationInformation & Communication
TechnologyTechnology
ByBy
Dr. Pravin H. GhosekarDr. Pravin H. Ghosekar
M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D.M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D.
HOD Computer DepartmentHOD Computer Department
Dhanwate National CollegeDhanwate National College
NagpurNagpur
08/10/201008/10/2010
Information Technology
The word Data is the plural of Datum. It is defined as raw facts or
observations, or business transactions .
Information :
Data :
•The processed data is known as information. It is an finished
product.
•The information must be received by the recipient on time & it
should be correct.
•The Technology plays an important role in delivering timely and
accurate information to its recipient.
•Technology includes H/W, S/W, database, communication system.
Information Technology
Information Technology means
the collection, storage,
processing, disseminations and use
of information using Technology.
Communication
Communication is a process in which
information is enclosed into packets and is
send from sender to receiver using some
medium/channel.
Information and Communication
Technology ( ICT )
ICT is effective use of communications (telephone
lines and wireless signals) in modern information
technology.
ICT consists of all technical means used to handle
information and communication aid , including both
computer and network hardware as well as necessary
software.
In other words, ICT consists of IT as well as
telephony, broadcast media, and all types of audio and
video processing and transmission.
Computer
The word “Computer” means ‘to compute’ or ‘to
calculate’.
It may be defied as a device that can operate upon
information or data.
A computer accepts data from an input device and
processes it into useful information which it displays
on its output device.
Thus, Computer is an electronic device that stores,
retrieves and processes data. It can perform various
arithmetic and logical operations as per instructions
given.
Block Diagram/Architecture
Secondary
Storage
Primary
Storage
Control
Unit
Arithmetic
Logic Unit
Input Unit Output Unit
Storage Unit
Central Processing Unit (CPU)
indicates flow of
instructions & data
Indicates the control
generated by the
control unit
Block Diagram of Computer
CPU
Central Processing Unit
• Memory Unit
• Control Unit
• ALU (Arithmetic and Logical Unit)
Generation of Computers
• 1st
Generation (1940-56) : Vacuum Tube
• 2nd
Generation (1956-63) : Transistors
• 3rd
Generation (1964-71) : IC or SSI
• 4th
Generation(1971-Present) : LSI/VLSI
• 5th
Generation (Present & Beyond)
‘Generation’ in a computer terminology is a
‘steps’ in a technology
Types of Computer
• Analog Computer
• Digital Computer
• Hybrid Computer
Classification of Computer
• Micro Computer
• Mini Computer
• Mainframe Computer
• Super Computer
Characteristics of Computers
• Speed
• Accuracy
• Memory
• Diligence
• Versatility
• Reliability
• Reduced cost
ThanksThanks

More Related Content

What's hot

History of Computer Technology
History of Computer TechnologyHistory of Computer Technology
History of Computer TechnologyDanz Magdaraog
 
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFETHE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFEsyifaaismail
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt Babasab Patil
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Mohamed Thawuship
 
History of Computers - Grade 6
History of Computers - Grade 6History of Computers - Grade 6
History of Computers - Grade 6FarmerCh
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplacekmodasia
 
CLASSIFICATION OF COMPUTERS
CLASSIFICATION OF COMPUTERSCLASSIFICATION OF COMPUTERS
CLASSIFICATION OF COMPUTERSSwarnima Tiwari
 
DATA PROCESSING CYCLE
DATA PROCESSING CYCLEDATA PROCESSING CYCLE
DATA PROCESSING CYCLEZaheer Abbasi
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationJibin Sr. Plamoottukada
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 

What's hot (20)

History of computing
History of computingHistory of computing
History of computing
 
History of Computer Technology
History of Computer TechnologyHistory of Computer Technology
History of Computer Technology
 
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFETHE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
THE IMPORTANCE OF INFORMATION TECHNOLOGY IN OUR LIFE
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 
Computer and Information Technology
Computer and Information TechnologyComputer and Information Technology
Computer and Information Technology
 
A brief history of computers
A brief history of computersA brief history of computers
A brief history of computers
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
History of Computers - Grade 6
History of Computers - Grade 6History of Computers - Grade 6
History of Computers - Grade 6
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
CLASSIFICATION OF COMPUTERS
CLASSIFICATION OF COMPUTERSCLASSIFICATION OF COMPUTERS
CLASSIFICATION OF COMPUTERS
 
Computer safety
Computer safetyComputer safety
Computer safety
 
DATA PROCESSING CYCLE
DATA PROCESSING CYCLEDATA PROCESSING CYCLE
DATA PROCESSING CYCLE
 
Lecture 1 introduction to computing
Lecture 1 introduction to computingLecture 1 introduction to computing
Lecture 1 introduction to computing
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint Presentation
 
Storage unit
Storage unitStorage unit
Storage unit
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
I.C.T notes
I.C.T notesI.C.T notes
I.C.T notes
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 

Similar to Introduction to Computer & ICT

Similar to Introduction to Computer & ICT (20)

Eskwela ict basics
Eskwela ict basicsEskwela ict basics
Eskwela ict basics
 
Intro to Computers
Intro to ComputersIntro to Computers
Intro to Computers
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
Answers[1].docx
Answers[1].docxAnswers[1].docx
Answers[1].docx
 
It
ItIt
It
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Introduction to ICT lab 01.pptx
Introduction to ICT lab 01.pptxIntroduction to ICT lab 01.pptx
Introduction to ICT lab 01.pptx
 
Lab 1 computer intro
Lab 1   computer introLab 1   computer intro
Lab 1 computer intro
 
Information technology
Information technologyInformation technology
Information technology
 
The Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to StudentsThe Advantages and Disadvantages of Technology to Students
The Advantages and Disadvantages of Technology to Students
 
CAB unit-1.pdf
CAB unit-1.pdfCAB unit-1.pdf
CAB unit-1.pdf
 
Theory lecture01-prt i
Theory lecture01-prt iTheory lecture01-prt i
Theory lecture01-prt i
 
Principles of IT-Unit v
Principles of IT-Unit vPrinciples of IT-Unit v
Principles of IT-Unit v
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
List the name of computer components
List the name of computer components List the name of computer components
List the name of computer components
 
Ict
IctIct
Ict
 
ICTConcepts (1).ppt
ICTConcepts (1).pptICTConcepts (1).ppt
ICTConcepts (1).ppt
 
ICTConcepts.ppt
ICTConcepts.pptICTConcepts.ppt
ICTConcepts.ppt
 
ICTConcepts
ICTConceptsICTConcepts
ICTConcepts
 
ICTConcepts.ppt
ICTConcepts.pptICTConcepts.ppt
ICTConcepts.ppt
 

More from PravinGhosekar

Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPravinGhosekar
 
Introduction to Hardware and Software
Introduction to Hardware and SoftwareIntroduction to Hardware and Software
Introduction to Hardware and SoftwarePravinGhosekar
 
Role of ICT in Teaching Learning
Role of ICT in Teaching LearningRole of ICT in Teaching Learning
Role of ICT in Teaching LearningPravinGhosekar
 
Overview of BCCA Project
Overview of BCCA ProjectOverview of BCCA Project
Overview of BCCA ProjectPravinGhosekar
 
Impact of Web Application on Education
Impact of Web Application on EducationImpact of Web Application on Education
Impact of Web Application on EducationPravinGhosekar
 
Introduction to Multimedia
Introduction to MultimediaIntroduction to Multimedia
Introduction to MultimediaPravinGhosekar
 
Job opportunities in IT
Job opportunities in ITJob opportunities in IT
Job opportunities in ITPravinGhosekar
 
Job opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insuranceJob opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insurancePravinGhosekar
 
Communication fundamentals
Communication fundamentalsCommunication fundamentals
Communication fundamentalsPravinGhosekar
 
Introduction to system
Introduction to systemIntroduction to system
Introduction to systemPravinGhosekar
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 

More from PravinGhosekar (18)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Introduction to Hardware and Software
Introduction to Hardware and SoftwareIntroduction to Hardware and Software
Introduction to Hardware and Software
 
Input Output devices
Input Output devicesInput Output devices
Input Output devices
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Wireless Banking
Wireless BankingWireless Banking
Wireless Banking
 
Role of ICT in Teaching Learning
Role of ICT in Teaching LearningRole of ICT in Teaching Learning
Role of ICT in Teaching Learning
 
Overview of BCCA Project
Overview of BCCA ProjectOverview of BCCA Project
Overview of BCCA Project
 
Impact of Web Application on Education
Impact of Web Application on EducationImpact of Web Application on Education
Impact of Web Application on Education
 
Introduction to Multimedia
Introduction to MultimediaIntroduction to Multimedia
Introduction to Multimedia
 
Job opportunities in IT
Job opportunities in ITJob opportunities in IT
Job opportunities in IT
 
Job opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insuranceJob opportunities in e-comm, export, insurance
Job opportunities in e-comm, export, insurance
 
Communication fundamentals
Communication fundamentalsCommunication fundamentals
Communication fundamentals
 
dbms
dbmsdbms
dbms
 
Project management
Project managementProject management
Project management
 
Introduction to system
Introduction to systemIntroduction to system
Introduction to system
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Introduction to Computer & ICT

  • 1. Information & CommunicationInformation & Communication TechnologyTechnology ByBy Dr. Pravin H. GhosekarDr. Pravin H. Ghosekar M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D.M.Sc.(C/S), MCM, DBM, M.Phil(IT), M.Phil(Comm), MBA, BJ. Ph.D. HOD Computer DepartmentHOD Computer Department Dhanwate National CollegeDhanwate National College NagpurNagpur 08/10/201008/10/2010
  • 2. Information Technology The word Data is the plural of Datum. It is defined as raw facts or observations, or business transactions . Information : Data : •The processed data is known as information. It is an finished product. •The information must be received by the recipient on time & it should be correct. •The Technology plays an important role in delivering timely and accurate information to its recipient. •Technology includes H/W, S/W, database, communication system.
  • 3. Information Technology Information Technology means the collection, storage, processing, disseminations and use of information using Technology.
  • 4. Communication Communication is a process in which information is enclosed into packets and is send from sender to receiver using some medium/channel.
  • 5. Information and Communication Technology ( ICT ) ICT is effective use of communications (telephone lines and wireless signals) in modern information technology. ICT consists of all technical means used to handle information and communication aid , including both computer and network hardware as well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, and all types of audio and video processing and transmission.
  • 6. Computer The word “Computer” means ‘to compute’ or ‘to calculate’. It may be defied as a device that can operate upon information or data. A computer accepts data from an input device and processes it into useful information which it displays on its output device. Thus, Computer is an electronic device that stores, retrieves and processes data. It can perform various arithmetic and logical operations as per instructions given.
  • 7. Block Diagram/Architecture Secondary Storage Primary Storage Control Unit Arithmetic Logic Unit Input Unit Output Unit Storage Unit Central Processing Unit (CPU) indicates flow of instructions & data Indicates the control generated by the control unit Block Diagram of Computer
  • 8. CPU Central Processing Unit • Memory Unit • Control Unit • ALU (Arithmetic and Logical Unit)
  • 9. Generation of Computers • 1st Generation (1940-56) : Vacuum Tube • 2nd Generation (1956-63) : Transistors • 3rd Generation (1964-71) : IC or SSI • 4th Generation(1971-Present) : LSI/VLSI • 5th Generation (Present & Beyond) ‘Generation’ in a computer terminology is a ‘steps’ in a technology
  • 10. Types of Computer • Analog Computer • Digital Computer • Hybrid Computer
  • 11. Classification of Computer • Micro Computer • Mini Computer • Mainframe Computer • Super Computer
  • 12. Characteristics of Computers • Speed • Accuracy • Memory • Diligence • Versatility • Reliability • Reduced cost