Introduction to Information Technology

Basic Computing Concepts, Including History

Definitions, Descriptions, and Elements

Computing refers to the use of electronic devices and algorithms to process, store, and transmit information. At its core, a computer system consists of hardware (physical components), software (instructions and programs), and data (the information being processed). Key elements include input, processing, storage, and output, which together define the flow of information in digital systems.

Selecting a New Computer

Selecting a computer involves evaluating performance factors (CPU speed, RAM capacity, storage type), form factors (desktop, laptop, tablet, server), and intended use cases (general office work, scientific computing, gaming, data analysis). Criteria such as battery life, expandability, operating system compatibility, and budget also shape the decision.

History of Computers

The history of computers can be divided into generations: - First Generation (1940s–1950s): Vacuum tubes, large mainframes, limited reliability. - Second Generation (1950s–1960s): Transistors replaced tubes, smaller and more efficient. - Third Generation (1960s–1970s): Integrated circuits allowed miniaturization. - Fourth Generation (1970s–1980s): Microprocessors enabled personal computers. - Fifth Generation (1980s–present): Parallel processing, networking, and AI-enabled systems.

The Growth of Personal Computers and the Internet

The 1980s marked the rise of personal computers (PCs) through companies like Apple, IBM, and Microsoft. The 1990s saw the commercial expansion of the Internet, revolutionizing communication, commerce, and research. The transition from dial-up modems to broadband, and later to wireless networking, underpinned the global digital economy.

Readings:


Computer Hardware

Components and Peripherals

Core components include the central processing unit (CPU), memory (RAM), motherboard, power supply, and storage devices. Peripherals—such as keyboards, mice, monitors, and printers—extend usability. External devices like scanners and external drives provide additional input/output functionality.

Ports, Memory, and Secondary Storage

Ports (USB, HDMI, Ethernet) serve as physical interfaces for connectivity. Primary memory (RAM) provides temporary data storage during processing, while secondary storage (hard drives, SSDs, optical discs) provides long-term data retention. Modern trends emphasize solid-state storage for speed and reliability.

Data Types, Data Addresses, and the CPU, GPU

Computers process data types such as integers, floating-point numbers, characters, and logical values. Memory addressing allows precise data retrieval. The CPU performs general-purpose processing, while the GPU accelerates parallel computations, crucial for graphics rendering, AI, and scientific simulations.

Readings:


Computer Software

Identify major classifications of software

Software is classified into system software (operating systems, utilities), application software (word processors, databases, web browsers), and middleware (tools facilitating communication between applications and operating systems).

What an operating system is and what it does

An operating system (OS) manages hardware resources, provides a user interface, and enables application execution. Functions include process scheduling, memory management, file system organization, and device driver support.

Files and file management

Files represent structured units of data stored on secondary devices. File management involves naming, organizing, accessing, and securing files, often within a hierarchical directory system. Modern systems support file compression, encryption, and metadata tagging.

Readings:


Computer Programming

Programming Languages

Programming languages (e.g., Python, Java, C++) provide structured syntax for expressing algorithms. They are categorized into low-level languages (assembly, machine code) and high-level languages (object-oriented, scripting, functional).

Compiling and Interpreting Process for Computer Programs

Compilers translate high-level code into machine code before execution, while interpreters translate line-by-line during execution. Hybrid approaches (e.g., Java with bytecode and the Java Virtual Machine [JVM]) combine both strategies.

Programming Language Constructs

Constructs include variables, data types, control structures (loops, conditionals), functions, and classes. Together, they form the building blocks of software development.

Basic Programming Concepts

Basic concepts include syntax versus semantics, modularity, debugging, and algorithmic thinking. Emphasis is placed on clarity, maintainability, and correctness of code.

Advanced Programming Concepts

Advanced concepts cover concurrency, recursion, memory management, error handling, and design patterns. Contemporary trends include functional programming paradigms and parallel programming for high-performance computing (HPC).

Readings:


Database Management System

How Databases Store Data

Databases organize data into tables (rows and columns), with relational models dominating. Data is stored using indexes for fast retrieval, often supported by transaction management systems for consistency.

Data Modeling and Normalization

Data modeling uses Entity-Relationship Diagrams (ERD) to represent data structures. Normalization ensures data integrity by minimizing redundancy, typically through First Normal Form (1NF), Second Normal Form (2NF), and Third Normal Form (3NF).

Structured Query Language

Structured Query Language (SQL) is the standard language for managing relational databases, supporting data definition (DDL), data manipulation (DML), and data control (DCL) operations.

Structure of Clinical Databases

Clinical databases integrate patient records, laboratory results, imaging data, and genomic information. They must comply with Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and Institutional Review Board (IRB) requirements for security and privacy.

Readings:


Networks

Introduction to Networks and the Internet

A network is a set of interconnected devices that exchange data. The Internet is the global network of networks built on the Transmission Control Protocol/Internet Protocol (TCP/IP) suite.

Basics of Internet Addressing and Network Classification

Internet addressing includes Internet Protocol (IP) addresses (Internet Protocol version 4 [IPv4], Internet Protocol version 6 [IPv6]), domain names, and Media Access Control (MAC) addresses. Networks are classified into Local Area Networks (LANs), Metropolitan Area Networks (MANs), Wide Area Networks (WANs), and Personal Area Networks (PANs) based on geographic scope.

Network Topologies, Protocols, and Standards

Internet addressing includes Internet Protocol (IP) addresses (Internet Protocol version 4 [IPv4], Internet Protocol version 6 [IPv6]), domain names, and Media Access Control (MAC) addresses. Networks are classified into Local Area Networks (LANs), Metropolitan Area Networks (MANs), Wide Area Networks (WANs), and Personal Area Networks (PANs) based on geographic scope.

Wireless Communication and Network Hardware

Wireless communication uses radio frequencies, Wi-Fi (Wireless Fidelity), Bluetooth, and cellular technologies. Essential hardware includes routers, switches, access points, and modems.

Networking Logical Models and the Open Systems Interconnection Model

The Open Systems Interconnection (OSI) model defines seven layers (physical to application) for networking functions. The Transmission Control Protocol/Internet Protocol (TCP/IP) model simplifies this into four layers (network interface, internet, transport, and application).

Readings:


Security and Privacy

Cybercrime and IT Security

Cybercrime involves unauthorized access, data theft, fraud, and disruption of services. Information Technology (IT) security encompasses technical, administrative, and physical controls to prevent such threats.

Hackers Methods

Methods include phishing, malware (malicious software), denial-of-service (DoS) attacks, Structured Query Language (SQL) injection, and social engineering.

Protecting Against Cybercrime

Defensive strategies include firewalls, intrusion detection systems (IDS), multifactor authentication (MFA), and regular patching.

Minimizing Risk of a Successful cyberattack

Organizations employ risk assessments, employee training, encryption, and incident response planning to reduce vulnerabilities.

Health Insurance Portability and Accountability Act (HIPAA)

  • Purpose and Scope

    • U.S. law enacted in 1996

    • Protecting privacy and security of PHI (Protected Health Information)

    • Regulations to streamline administrative processes within healthcare organizations

  • HIPAA Privacy Rule (2003)

    • Use/disclosure of PHI in research

    • De-identification methods

    • Limited Data Set & Data Use Agreements

  • HIPAA Security Rule (2005) Safeguards for electronic PHI (ePHI)

Readings:


Information Systems

What is an Information System?

An information system integrates people, technology, processes, and data to support decision-making, coordination, and analysis.

The Systems Development Process

Development follows structured models such as waterfall, agile, or Development and Operations (DevOps). Core stages include requirements analysis, design, implementation, testing, deployment, and maintenance.

Specialized Information Systems

Examples include Decision Support Systems (DSS), expert systems, Geographic Information Systems (GIS), and Clinical Decision Support Systems (CDSS). These are tailored for domain-specific applications.

Readings: