Introduction to Information Technology(IIT) Syllabus

Syllabus Notes Old Questions & solutions Text & reference books

This page contains Syllabus of Introduction to Information Technology of BIT.

Title Introduction to Information Technology
Short Name IIT
Course code BIT101
Nature of course Theory + Lab
Semester first-semester
Full marks 60 + 20 + 20
Pass marks 24 + 8 + 8
Credit Hrs 3
Elective/Compulsary Compulsary

Course Description

Course Description: This course covers basic concepts of computers, computer hardware, memory, input/output devices, computer software, data representation, database, computer networks, internet, computer security and applications of IT.

Course Objectives: The main objective of this course is to provide basic knowledge of fundamental concepts of computer system and Information Technology.

Units and Unit Content

1. Introduction to Computer
teaching hours: 4 hrs

1.1 Introduction of Computer

Definition and use of computers.

1.3 Characteristics ofComputer

Characteristics of computer (Speed, accuracy, diligence, storage capability, versatility)

1.4 History of Computer

History of computing of how computers evolved from their humble beginnings to the machines of today.

1.5 Generations of Computer

Generations of computers from first to fifth with varying hardware and software technologies.

1.2 Digital and Analog Computers

Definition and uses of digital and analog computers with example. Differences between digital, analog and hybrid computers.

1.6 Classification of Computer based on size

Classification of computers based on size and type: super-computer, mainframe-computer, minicomputer, micro-computer. Characteristics of each class.

1.7 The Computer System

The computer system and their components (Hardware, software, data, users)

1.8 Application of Computers

Applications of computers in different sectors like education, health, agriculture, entertainment, scientific research, sports etc



2. Computer Hardware
teaching hours: 8 hrs

A ] 2.1 Introduction

2.2 CentralProcessing Unit;Components of CPU

CPU and its functions. Different components of CPU (arithmetic logic unit, registers, control unit)

2.4 Instruction Format

What is instruction format? Concept of operation code and operand code.

2.5 Instruction Set

Definition and example of instruction set.

2.6 Instruction Cycle

What is Instruction cycle? Fetching, decoding, executing, and storing steps of instruction cycle.

2.7 Microprocessor

RISC and CISC based architecture. Concept of pipeline and parallel processing.

2.8 Computer Bus

Concept and types of bus. Concept of expansion slots and ports.

2.10 Components of Computer Cabinet (Power Supply, Motherboard, memory chips, expansion slots, ports and interface, processor, cables and Storage devices)

Different components inside a computer cabinet like motherboard, ports and interfaces, expansion slots, memory chips, processor, hard disk etc.

B]Computer memory

3.2 Memory Representation

Description of bit, byte, kilobyte, megabyte, gigabyte and terabyte and Concept of memory organization as a linear array of locations for storing data.

3.3 Memory Hierarchy

Memory hierarchy from registers to magnetic tape.

3.4 CPU Register

Description of CPU registers as working memory.

3.5 Cache Memory

Description cache memory and its levels.

3.6 Primary Memory (RAM, ROM)

What is primary memory? Different types of primary memory.

3.7 Secondary Memory (Magnetic Tape;Magnetic Disk;Optical Disk;Magneto-Optical Disk, Flash Memory Device)

Secondary memory and their types. Working characteristics and features of Magnetic Tape, Magnetic Disk, Optical Disk, Magneto- Optical Disk, Flash Memory Device

3.8 Access types of storage devices (sequential and direct)

Definition and characteristics of Sequential access and direct access devices.

C]Input and Output Devices

4.2 Input-Output Unit;

Definition, uses of input/output devices and how it works.

4.3,4.4,4.5  Input Devices (Human Data Entry Devices; Source Data Entry Devices)

Definition of Human Data Entry Devices and Source Data Entry Devices. Features and description of Human data entry devices (Keyboard, pointing devices—Mouse, trackball, joystick, digitizing tablet, Pick devices—Light pen, touch screen)

Features and description of Source data entry devices (Audio input device (microphone, sound card, speech recognition), Video input device (video camera, digital camera), Optical input devices—Scanner (hand held, flat bed), OCR, MICR, OMR, barcode reader

4.6 Output Devices (Hard copy devices; Soft copy devices)

Definition, uses of output devices and how it works. Classification and functional details of Output devices (Hard copy and soft copy devices).

4.7 I/O Port

Use of I/O ports, types I/O ports

4.8 I/O System

Explain the working of I/O system—I/O devices, device controller, device driver, Application Programs.



3. Computer Software
teaching hours: 6 hrs

 A .6.1 Introduction

6.2 Types of Software

Classification of software (System software and Application software)

6.3 System Software

Functionality and purpose of system software

6.3.2 , 6.3.3 Device Driversand Utility software

Function and example of Device Drivers and Utility software.

6.3.4 Programming Languages

Definition and categories of Programming Languages. Different Generations of Programming Languages.

6.3.5 Language Translators: assembler, compiler

Different kind of translator software (Assembler, Compiler, and Interpreter) and function of each.

6.4 Application Software

Functionality and purpose of application software

B. Operating System

7.1 Introduction

Explain the need of operating system in the computer system

7.2 Objectives of Operating System

Main key Objectives of Operating System

7.3 Types of OS

Single user and single task, single user and multitasking, multiuser, multiprocessing, real time, embedded OS

7.4 Functions of OS

Process management, memory management, file management, device management, protection and security, user interface

7.5 Process Management

Process—Process states (new, ready, running, waiting, terminated)

CPU scheduling—Scheduler, scheduling algorithms (FCFS, SJF, RR)

Process synchronization—Concurrent processes, race condition

Deadlock—Deadlock conditions, deadlock prevention, deadlock avoidance

7.6 Memory Management

 Memory allocation—Multiple partition allocation, paging

 Virtual memory—Demand paging

 7.7 File Management

 Files, directory structure

 7.8 Device Management

 Device drivers, I/O scheduling, buffering, spooling

 7.9 Protection and Security

 Protection mechanism of programs, processes, users and to the   resources.

 7.10 User Interface

 CLI, GUI

 7.11 Examples of Operating Systems

 MS-DOS, Windows family of OS, Linux

Software Licensing

Licensing policy concept of software.

Open-Source Software

Definition and benefits of using Open-Source software

Case study: Unix Vs Windows

Difference between Unix and Windows operating system in various aspects.








4. Data Representation
teaching hours: 5 hrs

5.1 Introduction

What are various kinds of data stored in computer (Numeric, Alphabetic, Alphanumeric, symbol. Different number systems (Decimal number system, Binary number system, Octal number system, and Hexadecimal number system.

5.2 Number System

Representation of various number systems.

5.3 Conversion from Decimal to Binary, Octal, Hexadecimal

Method used for Conversion from Decimal to Binary, Octal, Hexadecimal

5.4 Conversion of Binary, Octal, Hexadecimal to Decimal

Method used for Conversion of Binary, Octal, Hexadecimal to Decimal

5.5 Conversion of Binary to Octal, Hexadecimal

Method used for Conversion of Binary to Octal, Hexadecimal

5.6 Conversion of Octal, Hexadecimal to Binary

Method used for Conversion of Octal, Hexadecimal to Binary

5.7 Binary Arithmetic

Binary arithmetic operations—addition, subtraction of signed and unsigned numbers.

5. Computer Networks and Internet Services
teaching hours: 10 hrs

9.1 Introduction

Brief background about data communication and the computer networks and their importance.

9.2 Importance of Networking

Resource sharing, information sharing, as a communication medium, back-up and support

9.3 Data Transmission Media (Twisted pair, coaxial cable, Optical fiber, RF transmission, microwave transmission, satellite transmission)

Twisted pair, coaxial cable, optical fiber, RF transmission, microwave transmission, satellite transmission

9.4 Data Transmission across Media

o Transmission modes—Simplex, halfduplex, full- duplex

o Transmission speed—Bandwidth, throughput, attenuation, distortion

o Fundamentals of transmission—

Electromagnetic waves, signals

▪ Analog and digital signals

▪ Modulation and demodulation—

 Amplitude, frequency, phase shift

▪ Multiplexing—FDM, WDM

▪ Asynchronous and synchronous transmission

9.5 Data Transmission and Data Networking

Switching - Circuit switching, message switching, packet switching

9.6.1 Network Types

Switching - Circuit switching, message switching, packet switching

9.5 Network Types

o Network types—LAN, MAN, WAN

9.6.2 Network Topology

o Network topologies—Bus, ring, star

9.6.3 Communication Protocol

o Communication protocol—The seven layers of OSI model

9.6.4 Network Devices

o Network devices—NIC, repeater, bridge, hub, switch, router, gateway

9.7 Wireless Networking

Bluetooth technology, wireless LAN, wireless WAN

B. Internet

10.2 History of Internet

TCP/IP, Internet applications, WWW, browser

10.3 Internetworking Protocol

TCP/IP

10.4 The Internet Architecture

Client, local ISP, regional ISP, backbone

10.5 Managing the Internet

ISOC, IAB, IETF, IESG, IRTF, IANA, InterNIC, W3C

10.7 Internet Connections

Dial-up access, leased line, ISDN, DSL, cable modem

10.8 Internet Address; WWW, Domain Name System

WWW, Domain Name System

10.9 Internet Services;E-mail and its working principle; E-commerce and E-governance,

o WWW—Web browser, URL, Internet search engines, WWW development languages

o Electronic mail—E-mail address, e-mail message format, e-mail services (application

o based e-mail, webmail), how email works (client-server model)

o File transfer protocol—How FTP works (client- server model)

o Terminal network

o News

o Internet relay chat

Web2.0

What is Web? Explain web2.0 Ver

Internet of Things (IoT)

What is Internet of Things (IoT)?

Wearable computing

What is Wearable computing?

Cloud computing

Cloud computing and it’s importance
Smart City

Smart cities vs ICT and it’s importance

Case Study: ISP in Nepal and their services

Case Study: ISP in Nepal and their services


6. Database Systems
teaching hours: 5 hrs

Introduction

What is Database, DBMS and RDBMS?
12.2 Database

o File-oriented approach and database approach

o Characteristics of database approach

o Data models, schemas and instances

o Conceptual data model—Entity, attribute, relationship, and E-R model

o Representation data model—Hierarchical, network, relational data model

o Low level, or physical data model

12.3 Database System

o Components of database system— Users, software, hardware, and data

o Architecture of database system—Internal level, conceptual level, and external level

Database Management System

o Data independence—Logical data independence, physical data independence

o Data dictionary, Database Administrator (DBA)

o Database languages—DDL, and DML

12.5 Database System Architectures

o Centralized DBMS architecture, client-server architecture, and distributed database

Database Applications

Different purposes like (1) personal databases; (2) workgroup databases (3) departmental databases and (4) enterprisedatabases

Introduction to Data Warehousing

Concept of Data Warehouse

Data mining

Concept of Data mining

BigData

Concept of BigData




7. Computer Security
teaching hours: 4 hrs

14.1 Introduction (Security attacks, security mechanisms, security services

Background about why we require Computer security with different types of security attacks, mechanism available and various services provided by a system.

14.2 Security Threat and Security Attack

Difference between Security Threat and Security Attack. Types of security attack.

14.3 Malicious Software

Virus, worm, trojan horse, JavaScript, java applet, ActiveX control

14.5 Security Services

Confidentiality, integrity, authentication, non- repudiation

14.6 Security Mechanisms (Cryptography, Digital Signature, Firewall, Users Authentication, Intrusion Detection Systems)

o Cryptography—Secret key cryptography, public-key cryptography, hash function

o Digital signature—Digital signature algorithms

o Firewall—Functions of firewall, working principle, types of firewall (packet filter firewall,

o circuit filter firewall, proxy or application-level firewall)

o Users’ identification and authentication—User name and password, smart card,

o biometrics

o Other security measures—Intrusion detection systems, virus protection software, data

o and information backups, SSL, IPsec protocol

14.12 Security Awareness

Security awareness to enhance the security of the organization’s resources by improving the awareness of the need to secure the system resources.

14.13 Security Policy 

Formulating a security policy


8. Application and Impact of IT
teaching hours: 3 hrs

Application of IT

Describe what is IT and explain various areas where IT can use.

Impact of IT on organization and individuals

Explain how technology and information systems are essential to maintaining, supporting, and enriching many aspects of the lives of individuals, operations of organizations. Explain both Positive and negative impact.

Societal impacts of IT

Explain society and how technology and information systems influencing many aspects of societies.

IT Strategic Planning

Explain the concept of organization Strategic Planning and IT strategic planning to meet organization strategic objectives and business goals.

T and Business Alignment

Explain how IT Operational or tactical (getting technology in place) align with the business objectives and to drive business results.

Lab and Practical works