14/02/20141.1.1 Presentation on Technology Management.

57
14/02/2014 1.1.1 Presentation on Technology Management

Transcript of 14/02/20141.1.1 Presentation on Technology Management.

Page 1: 14/02/20141.1.1 Presentation on Technology Management.

14/02/2014 1.1.1

Presentation on Technology Management

Page 2: 14/02/20141.1.1 Presentation on Technology Management.

Content Table

• Basic Concepts of Computer• Types of computers & printers• Networks & Internet• e-commerce• Password Policy, Strong & Weak Passwords• Sify Network – Dos & Don’ts• Summary

14/02/2014 1.1.2

Page 3: 14/02/20141.1.1 Presentation on Technology Management.

Basic Computer Concepts

14/02/2014 1.1.3

Page 4: 14/02/20141.1.1 Presentation on Technology Management.

What is a computer?

• Computer is an electronic device, operating under the control of instructions stored in its own memory unit, that can accept data (input), manipulate the data according to specified rules (process), produce information (output) from the processing, and store the results for future use.

• The list of Instructions is called a computer program and internal storage is called computer Memory

14/02/2014 1.1.4

Page 5: 14/02/20141.1.1 Presentation on Technology Management.

What does a computer do?

• In its simplest form the computer consists of 5 functionally independent parts

14/02/2014 1.1.5

Input Devices

Output DevicesMemory

Processor Control

unit/Arithmetic Logic Unit

Storage Devices

Page 6: 14/02/20141.1.1 Presentation on Technology Management.

Input Devices

• Any hardware component that accepts coded information, programs, commands and user responses from operators

• Keyboards, Mouse, Scanners, Touch pads, Light pens, Joy sticks are examples

14/02/2014 1.1.6

Page 7: 14/02/20141.1.1 Presentation on Technology Management.

Input Devices

14/02/2014 1.1.7

Page 8: 14/02/20141.1.1 Presentation on Technology Management.

Output Devices

• Out put devices obtains processed data from the computer and converts into a format readable by the user

• In short, output devices make the information resulting from processing available for use

• Printers, Monitors, Speakers are some of the examples of output devices

14/02/2014 1.1.8

Page 9: 14/02/20141.1.1 Presentation on Technology Management.

Output Devices

14/02/2014 1.1.9

Page 10: 14/02/20141.1.1 Presentation on Technology Management.

Central Processing Unit

• The Arithmetical Logical Unit in conjunction with the control unit is referred as Central Processing Unit/Processor

• It is the brain of the Computer• ALU performs all arithmetic and logical

operations on Input data• Main memory transfers arithmetical & logical

operations to this unit and gets back the results

14/02/2014 1.1.10

Page 11: 14/02/20141.1.1 Presentation on Technology Management.

Central Processing Unit

14/02/2014 1.1.11

Page 12: 14/02/20141.1.1 Presentation on Technology Management.

About Hardware

• Hardware is any physical piece of equipment, called a device, that is both connected to your computer and controlled by your computer

• Comprehensive term for all of the physical parts of the computer.

• Refers to objects you can touch, like disks, disk drives, display screens , keyboard, printers and chips.

• Internal devices are placed inside the case of the computer

• External devices remain outside the case of the computer

1.1214/02/2014

Page 13: 14/02/20141.1.1 Presentation on Technology Management.

About software

• Exists as ideas, concepts, and symbols• Provides instructions for the hardware to

accomplish tasks.• Can not be touched like the hardware. All

parts are inside the computer.

1.1314/02/2014

Page 14: 14/02/20141.1.1 Presentation on Technology Management.

Primary Memory Storage

• The function of the memory unit is to store programs & data

• Primary storage (Main Memory) is a fast memory capable of operating at electronic speeds. Programs are stored in the main memory dump for their execution

• Primary storage is essential but expensive

14/02/2014 1.1.14

Page 15: 14/02/20141.1.1 Presentation on Technology Management.

RAM & ROM

• Memories in which any location can be reached in a short fixed amount of time after specifying its address is called RAM

• Contents of RAM is volatile & lost when the computer is switched off

• Contents of ROM (Read only Memory) are permanently recorded and cannot be changed

• Contents of ROM is permanent even when computer is switched off

14/02/2014 1.1.15

Page 16: 14/02/20141.1.1 Presentation on Technology Management.

RAM & ROM

14/02/2014 1.1.16

Page 17: 14/02/20141.1.1 Presentation on Technology Management.

Secondary Memory Storage

• It is used to store large amounts of data• It is an external memory and also called as

auxiliary storage• It is slowest and cheapest form of memory• It cannot be processed directly by the CPU• Magnetic disks, tape disks, floppy disks, flash

drives are some examples of secondary storage

14/02/2014 1.1.17

Page 18: 14/02/20141.1.1 Presentation on Technology Management.

Secondary Memory Storage

14/02/2014 1.1.18

Page 19: 14/02/20141.1.1 Presentation on Technology Management.

System Unit

• The motherboard, or system board, is the main circuit board of the system unit

• The processor, also called the central processing unit (CPU), interprets and carries out the basic instructions that operate a computer

• The control unit interprets the instructions• The arithmetic/logic unit (ALU) performs the logical

and arithmetic processes• Memory, also called random access memory, or RAM,

consists of electronic components that store data, instructions, and information, as needed by the processor

14/02/2014 1.1.19

Page 20: 14/02/20141.1.1 Presentation on Technology Management.

System Unit

14/02/2014 1.1.20

power supply

ports

drive bays

processor

memory

sound card

video cardmodem cardnetwork card

Page 21: 14/02/20141.1.1 Presentation on Technology Management.

Interface between computer & devices

14/02/2014 1.1.21

Page 22: 14/02/20141.1.1 Presentation on Technology Management.

Inside the PC

14/02/2014 1.1.22

processor chipadapter cards

memory chips

memory slots

motherboard

Expansionslots for adapter cards

Page 23: 14/02/20141.1.1 Presentation on Technology Management.

Communications Devices

• A communications device is a hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers

Example: MODEM• Communications occur over transmission

media, such as telephone lines, cables, cellular radio networks, and satellites

14/02/2014 1.1.23

Page 24: 14/02/20141.1.1 Presentation on Technology Management.

Quiz

14/02/2014 1.1.24

Page 25: 14/02/20141.1.1 Presentation on Technology Management.

Printers

• Types of printer– Laser, inkjet (ink dispersion), solid ink, thermal

printers, and impact printers

1.2514/02/2014

Page 26: 14/02/20141.1.1 Presentation on Technology Management.

Laser printer

• Uses mechanical, electrical, and optical technologies

• Capable of handling and printing large volumes quickly and continuously

1.2614/02/2014

Page 27: 14/02/20141.1.1 Presentation on Technology Management.

Dot matrix printers

• Overview of dot matrix printer technology:– Low quality of printing compared to other printers– Economical – A print head moves across the width of the paper– Pins are used to print a matrix of dots on the page• Can print multicopy documents • Pins shoot against a cloth ribbon. Ribbon is used for ink

and to lubricate• Ribbon impacts the paper, depositing the ink

1.2714/02/2014

Page 28: 14/02/20141.1.1 Presentation on Technology Management.

Inkjet printers• Overview of inkjet printer

technology:– With Inkjet, ink is applied to

paper using a matrix of small dots• Plates with magnetic charge

direct path to the page– Older inkjets have lower

resolution, but today’s are photo quality

– Images smudge on inexpensive paper• Especially with higher

resolution (wet paper)– Usually cost less

• Print color inexpensively

1.2814/02/2014

Page 29: 14/02/20141.1.1 Presentation on Technology Management.

Thermal printers

• Overview of thermal printer technology– Nonimpact printers that use heat to produce

output– Popular in retail for bar codes and price tags– Wax-based ink heated by heat pins– Print head is as wide as paper, so does not move – Heat pins melt ink onto paper

1.2914/02/2014

Page 30: 14/02/20141.1.1 Presentation on Technology Management.

Types of computers

• Super computers• Mainframe computer• Mini computers• Micro computers• Desktop computers• Lap top computer• Net book• Handheld Device14/02/2014 1.1.30

Page 31: 14/02/20141.1.1 Presentation on Technology Management.

Types of computer

14/02/2014 1.1.31

• Images of types discussed in previous slide

Page 32: 14/02/20141.1.1 Presentation on Technology Management.

NETWORKS

• A network is a collection of computers and devices connected together so users can share data and resources

• A local area network (LAN) connects computers in a limited geographic area

• A campus area network (CAN) connects limited geographical area like university, govt. agency

• A metropolitan area network (MAN) covers a City (a collection of LAN)

• A wide area network (WAN) covers a large geographical area

14/02/2014 1.1.32

Page 33: 14/02/20141.1.1 Presentation on Technology Management.

LAN, MAN, CAN, WAN

14/02/2014 1.1.33

Page 34: 14/02/20141.1.1 Presentation on Technology Management.

Network configuration

• Classification based on how computers behave in a network

• Two classifications are– Peer-to-Peer network– Server based network

1.3414/02/2014

Page 35: 14/02/20141.1.1 Presentation on Technology Management.

Equipments used for networking(LAN/WAN)

14/02/2014 1.1.35

Page 36: 14/02/20141.1.1 Presentation on Technology Management.

Server based network

• Designated computer to administer• Resources centralized• Supports larger networks• Strong security• Expensive

1.3614/02/2014

Page 37: 14/02/20141.1.1 Presentation on Technology Management.

Networks and the Internet

• The world’s largest network is the Internet

• Most users connect to the Internet in one of the two ways:– Internet service

provider– Online service

provider(to be checked)

14/02/2014 1.1.37

Page 38: 14/02/20141.1.1 Presentation on Technology Management.

The World Wide Web• One of the more popular segments of the Internet is

the World Wide Web, (www)also called the Web.• A Web page is a document that contains text, graphics,

sound, and/or video and has built-in connections, or hyperlinks to other Web documents

• A Web site is a related collection of Web pages• You access and view Web pages using a software

program called a Web browser• A Web page has a unique address, called a Uniform

Resource Locator (URL)• A hyperlink is a virtual connection to another place on

the Web14/02/2014 1.1.38

Page 39: 14/02/20141.1.1 Presentation on Technology Management.

More Internet Terms

• Cookies – a text file created by a Web server and your Web browser, that sits on your hard drive

• Search engine – a Web site containing a database of web pages and their content

• Electronic commerce – conducting business online, such as shopping or investing.

• Portal -- a launching point for browsing online; one of the most well-known is Yahoo!, where you can search the Web, shop, chat, check e-mail, build a Web site, and view news articles.

14/02/2014 1.1.39

Page 40: 14/02/20141.1.1 Presentation on Technology Management.

Web Browsers

• Internet Explorer – built into Windows• Netscape – the oldest browser• Opera • Google chrome• Mozilla fox

14/02/2014 1.1.40

Page 41: 14/02/20141.1.1 Presentation on Technology Management.

Uniform Resource Locator (URL)

http://www.yahoo.com

14/02/2014 1.1.41

Page 42: 14/02/20141.1.1 Presentation on Technology Management.

COMMON USES• E-mail--Send messages to other connected users• Shop for goods and services (Online shopping)• Meet and converse with people around the world– Instant Messaging, Windows (MSN) Messenger, face book,

twitter and other social web sites– Web browser plug-ins, such as Skype etc.,

• Access sources of entertainment and leisure, such as online games, magazines, and vacation planning guides

• Access information such as Post office information, news, maps, airline schedules, and stock market data

14/02/2014 42

Page 43: 14/02/20141.1.1 Presentation on Technology Management.

Electronic Commerce

• When you conduct business activities online, you are participating in electronic commerce, also known as e-commerce

• Business to consumer (B2C) involves the sale of goods to the general public

• Consumer to consumer (C2C) involves one consumer selling directly to another

• Business to business (B2B) provides goods and services to other businesses

14/02/2014 1.1.43

Page 44: 14/02/20141.1.1 Presentation on Technology Management.

Short Question & Answer

14/02/2014 1.1.44

Page 45: 14/02/20141.1.1 Presentation on Technology Management.

Network Integration - Introduction

• India Post with a vision to become Technology enabled, Self reliant Market leader has floated 8 contracts under India Post -2012 Project

• Out of 8 contracts, Network Integration contract was awarded to M/s SIFY

• NI Vendor is responsible for Planning, analysis and design of entire DOP Network including transition & integration

14/02/2014 1.1.45

Page 46: 14/02/20141.1.1 Presentation on Technology Management.

Support and Maintenance

• The network equipment (Router and LAN Switch if replaced by SIFY) will have necessary support contract with OEM.

• Sify will maintain the equipment during the contract period which is 5 + 2 = 7 Years

14/02/2014 1.1.46

Page 47: 14/02/20141.1.1 Presentation on Technology Management.

Points to be remembered

• At the time of commissioning of the network all PCs have to be configured with new IP

• Connecting any new PC/Laptop at a latter stage will be possible only with SIFY’s help

• To get the SIFY help, trouble ticket has to be raised (Toll Free No.18603458888 between 0800hrs to 2000 hrs)

• PCs cannot be moved within the office to a different cable termination location as the PCs MAC are bind with the ports of the switches

14/02/2014 1.1.47

Page 48: 14/02/20141.1.1 Presentation on Technology Management.

Training

• SIFY shall conduct training for the System Administrators

• DOP will identify in each Circle System Administrators to be trained

• Training will be on the overall and basics of troubleshooting and coordination

14/02/2014 1.1.48

Page 49: 14/02/20141.1.1 Presentation on Technology Management.

DOs

• Keep the routers and switches always in Power on condition

• Whenever low connectivity/no connectivity is noticed, ping the IP address and inform the speed of the packets to the NI for solution

• Configure the correct IP address supplied by SIFY• Ensure that all the USB ports and CD drives are

disabled except the one required for backups

14/02/2014 1.1.49

Page 50: 14/02/20141.1.1 Presentation on Technology Management.

DON’Ts

• Do not transfer the computer system from one place to another, even within the office

• Do not change the IP address once configured• Whenever network/hardware problem is

noticed, do not try the methods other than that recommended by the hardware vendor/NI

14/02/2014 1.1.50

Page 51: 14/02/20141.1.1 Presentation on Technology Management.

Other Important Points

• There will be a Network Monitoring System – a web portal monitor the Network activities

• Antivirus will be supplied by CSI • Escalation of complaints :– 1st level after 4 hours– 2nd level after 8 hours– 3rd level after 12 hours

• NSP-1 BSNL & NSP-2 Sify- Change over time will be within 5 minutes

• Old Devices will be property of DOP14/02/2014 1.1.51

Page 52: 14/02/20141.1.1 Presentation on Technology Management.

Password Protection

• What does Password Protection mean?• Password protection is a security process • It prevents unauthorized access in to the

application and modification of information therein by unauthorized users.

• Password protection allows only those with an authorized password to gain access to certain information

14/02/2014 1.1.52

Page 53: 14/02/20141.1.1 Presentation on Technology Management.

Strong Password

A Strong password– Is at least eight characters long.– Does not contain your user name, real name, or company

name.– Does not contain a complete word.– Is significantly different from previous passwords.– Contains uppercase letters, Lowercase letters, Numbers &

Special characters– Create an acronym from an easy-to-remember piece of

information– For example, pick a phrase that is meaningful to you such as,

MsbD28/9 (My son’s birthday is 28/12/09)

14/02/2014 1.1.53

Page 54: 14/02/20141.1.1 Presentation on Technology Management.

Weak Password

Weak passwords include:– Words which can be found in a dictionary (English or

foreign) or such words written backwards - password breaking programmes don't mind reading backwards!

– Names of family, pets, friends, co-workers, fantasy characters, birthdays and other personal information such as addresses and phone numbers

– Word or number patterns like aaabbb, qwert, zyxwvuts, 123321 etc

– Any of the above precluded or followed by a digit (e.g. secret1, 1 secret)

14/02/2014 1.1.54

Page 55: 14/02/20141.1.1 Presentation on Technology Management.

Guidelines in choosing a Password Don't pick a password that someone can easily guess if they

know who you are (for example, not your Social Security number, birthday, or maiden name)

Don't pick a word that can be found in the dictionary (since there are programs that can rapidly try every word in the dictionary!)

Don't pick a word that is currently newsworthy Don't pick a password that is similar to your previous password Do pick a mixture of letters and at least one number Do pick a word that you can easily remember

Many networks require that you change your password on some periodic basis.

14/02/2014 1.1.55

Page 56: 14/02/20141.1.1 Presentation on Technology Management.

Summary

Now you have understood• Basic Concepts of Computer• Types of computers & printers• Networks & Internet• e-commerce• Password Policy• Sify Network

14/02/2014 1.1.56

Page 57: 14/02/20141.1.1 Presentation on Technology Management.

14/02/2014 1.1.57