Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2
CHAPTER 1: INTRODUCTION TO COMPUTER HARDWARE AND SOFTWARE............................. 2
PART 1: COMPUTER HARDWARE ........................................................................................................ 2
Learning Objectives .............................................................................................................................. 2
Overview of the e-Learning Material ................................................................................................... 2
1.1 Introduction ..................................................................................................................................... 3
1.2 Overview of components of IS Infrastructure/ IS layers ............................................................... 3
1.2.1 People -Users ..................................................................................................................... 4
1.2.2 Application Software .......................................................................................................... 4
1.2.3 Database Management Systems (DBMS) ........................................................................ 5
1.2.4 System Software -Operating Systems .............................................................................. 5
1.2.5 Network ............................................................................................................................... 5
1.2.6 Hardware ............................................................................................................................ 6
1.3 Components of a Computer........................................................................................................... 6
1.3.1 Computer Peripherals ........................................................................................................ 7
1.3.2 What is inside the Computer? ........................................................................................... 8
1.3.3 Memory ............................................................................................................................... 9
1.4 Data representation in Memory- Bits and Bytes .........................................................................12
Data storage media........................................................................................................................13
1.5 Hardware Asset Management .....................................................................................................13
1.5.1 Hardware Acquisition .......................................................................................................14
1.5.2 Hardware Maintenance Program ....................................................................................16
1.5.3 Hardware Monitoring Procedures....................................................................................16
1.5.4 Data and Capacity Management .....................................................................................17
1.5.5 Hardware Retirement .......................................................................................................18
1.6 Auditing Hardware ........................................................................................................................19
1.7 Summary.......................................................................................................................................20
1.8 References ...................................................................................................................................21
Chapter 1, Part 1: Computer Hardware
SECTION 2: CONTENTS
CHAPTER 1: INTRODUCTION TO COMPUTER
HARDWARE AND SOFTWARE
PART 1: COMPUTER HARDWARE
Learning Objectives
To gain understanding of components of Information Systems (IS) Infrastructure
To understand working of computer and peripheral devices
To understand Data Representation in memory and storage
To gain understanding of Hardware Asset Management
To understand Auditing Hardware
DISAs are advised to refer this material before eLearning and also after completing the eLearning
presentations to get more clarity on the topics discussed. However, this material is not expected to
2
Module 1: e-Learning
be comprehensive but is prepared as a starting point for understanding IT. Readers are advised to
refer to the references provided here to get clarifications on specific areas as required. IT is a dynamic
field and is continuously evolving. The material covers IT environment prevalent and relevant at the
time of its preparation. However, it is expected to be updated on regular basis. Please visit the CIT
portal of ICAI (http://cit.icai.org) for the latest updated material.
1.1 Introduction
We cannot think of any enterprise today without Information systems and the critical infrastructure for
developing and maintaining Information Systems is provided by Information Technology (IT). IT is a
key enabler for increasing operational excellence, customer and supplier relations, better decision
making and competitive advantage. In short, IT is required not only to thrive but to survive in the
modern IT age. When IT is integrated with organisation and management, it can provide better ways
of conducting business that empower organisations with a strategic advantage.
Business today is growing exponentially and this growth of business is propelled by information. The
more information a business acquires, the more difficult it becomes to make decisions. In the past,
people could rely on manual processes to make decisions because they had limited amount of
information to process. Today, with massive volumes of available information, it is almost impossible
for management to take decisions without the aid of information systems. Highly complex decisions
must be made in increasingly shorter time frames. All this and more has made adoption of IT an
imperative for running any enterprise.
In deploying IT, management has to determine what types of hardware and software will satisfy their
current and future business needs, the right time to buy the equipment, and how to protect their IT
investments. Auditors also have to understand how the management has deployed IT for their
business and whether it helps them meet their business objectives. This does not imply that auditors
need to be experts in all areas of technology; however, a working knowledge of IT hardware and
software in terms of features and functionalities can help auditors to review and evaluate whether IT
is meeting business needs and is implemented with right level of security at optimum cost. In the
following sections we will understand these various layers of IS. A good understanding of how
technology works and how this can be deployed in organisations to meet business objectives will
3
Chapter 1, Part 1: Computer Hardware
enable auditors to offer new IT enabled services. List of sample services which can be provided by a
CA in the IT areas are covered in the second part of this module (overview of eLearning and IT
Enabled services).
PEOPLE (USERS)
APPLICATIONS
DBMS
SYSTEM SOFTWARE
NETWORK
HARDWARE
Components of IS Infrastructure
4
Module 1: e-Learning
5
Chapter 1, Part 1: Computer Hardware
Control Arithmetic
Unit Logic Unit
ALU Output
Input
Devices
Devices
Memory
Registers Cache
Primary Memory
Secondary Memory
6
Module 1: e-Learning
Computers systems provide output to decision makers at all levels in an organisation to solve
business problems, the desired output may be in visual, audio or digital forms.
Visual output devices like, a display device visually conveys text, graphics, and video information.
Laser printer
A printer that forms images using an electrostatic process, the same way a photocopier
works.
Ink-jet Printer
A printer that makes images by forcing ink droplets through nozzles.
Plotter
A printer that uses computer-directed pens for creating high-quality images, blueprints,
schematics, etc.
Speaker
Gives an audio output
7
Chapter 1, Part 1: Computer Hardware
Processing devices include computer chips that contain the central processing unit and main
memory. Processing caters to the desire of users and displays results. It consists of CPU and Main
Memory.
Storage Devices are available in huge sizes. Programs and data can be stored on storage devices.
Secondary storage differs from primary storage in that it is not directly accessible by the CPU.
Examples of secondary storage are,
Hard drive
Flash drive
CD-ROM drive (mostly outdated) or DVD-ROM drive
1.3.2 What is inside the Computer?
The processor or Central processing Unit (CPU) is the brain of the computer. The main function of
CPU is to execute programs stored in memory. It consists of three functional units:
3. Registers
Small High Speed Memories that store temporary results
o High-speed memory units within CPU for storing small amount of data(Mostly 32 or
64 Bits)
o Registers could be
Accumulators: they can keep running totals of arithmetic values.
8
Module 1: e-Learning
Address Registers: they can store memory addresses which tell the CPU
where in memory an instruction is located.
Storage Registers: they can temporarily store data that is being sent to
or coming from the system memory.
Miscellaneous: general purpose used for several functions
Bus Lines
The CPU is connected through Bus lines with main memory and I/O Devices. The computer buses of
one form or another move data between all of these devices. The basic job of Bus is to move data
from one location to other within the computer.
Machine Cycle: is the steps performed by the CPU for executing an instruction. The steps are Fetch-
Decode-Execute and store which gets executed within CPU.
Fetch Decode
Store Execute
These phases, fetch and decode are done by CU or Control Unit whose job is explaining to ALU or
Arithmetic Logic Unit whose job is to execute and the results are stored in Register
1.3.3 Memory
Virtual
Memory -
Register Cache Primary ------------
Secondary
Memory
9
Chapter 1, Part 1: Computer Hardware
Memory Hierarchy
Memory is where data and programs are stored. Various types of memory devices are
Internal memory
Registers are internal memory within CPU, very fast and very small
Primary Memory
These are devices in which any location can be accessed in any order (in contrast with sequential
order). These are of primarily two types:
PROM (Programmable Read only memory) Non-volatile, Desired data and program
must first be programmed e.g. used by video game manufacturers for game instructions.
EPROM(Erasable Programmable Read only memory)-can be erased using UV light and
reprogrammed e.g. used in Industrial Robots by car Manufacturers, can be changed
with change of car model
EEPROMS( Electrically Erasable Programmable Read only memory)-where chip is
erasable electrically by using higher electric current e.g. used in pen drives
Cache Memory
There is a huge speed difference between Registers and Primary Memory, to bridge these speed
differences we have cache memory. Cache (Pronounced kăsh) is a smaller, faster memory which
stores copies of the data from the most frequently used main memory locations and
processor/registers can access it more rapidly than main memory.
Cache memory is something like, we record frequently used telephone numbers in our mobile
which we can access quickly otherwise we have to go to telephone directory which takes a longer
10
Module 1: e-Learning
time. Cache memory works on the same principle frequently used data is stored in easily
accessible cache memory instead of slower memory like RAM. Because, there is less data in
cache, processor can access it more quickly. There are two types of Cache memory
Virtual Memory
Virtual Memory is in fact not a separate device but an imaginary memory area supported by some
operating systems (for example, Windows) in conjunction with the hardware. If a computer lacks
the random access memory (RAM) needed to run a program or operation, the OS uses a
predefined space on hard disk as an extension of RAM. Virtual memory combines computer’s
RAM with temporary space on the hard disk. When RAM runs low, virtual memory moves data
from RAM to a space called a paging file or swap file. Moving data to and from the paging file
frees up RAM to complete its work.
Thus, Virtual memory is an allocation of hard disk space to help RAM. With virtual memory, the
computer can look for areas of RAM that have not been used recently and copy them onto the
hard disk. This frees up space in RAM to load the new applications. Area of the space on hard
disk which acts as an extension to RAM is called a page file or swap file. In some operating
systems an entire disk or partition can be devoted to virtual memory.
Secondary Memory
CPU refers to the main memory for execution of programs, but these main memories are volatile
in nature and hence cannot be used to store data on a permanent basis. Moreover, they are very
small in sizes. The secondary memories are available in huge sizes. Thus programs and data
can be stored on secondary memories.
Secondary storage differs from primary storage in that it is not directly accessible by the CPU.
The computer usually uses its input/output channels to access secondary storage and transfers
the desired data using intermediate area in primary storage. Secondary storage does not lose
the data when the device is powered down—it is non-volatile.
11
Chapter 1, Part 1: Computer Hardware
Hard Drive
DAT Tapes
Pen Drives
CD, DVD and Blue ray Disks
Smart card
The kind of storage we need would depend on our information system objectives.
This Binary Digit has been abbreviated to Bit. And a combination of 8 bits is called a Byte.
Some other Binary Units are:
o Kilobyte (KB) = 1024 bytes,
o Megabyte(MB) =1024 KB
o Gigabyte (GB) =1024 MB
o Terabyte (TB) =1024 GB
ROM and RAM are composed of electronic components that can be in one of two states "on" and
"off". So the memory chips are divided into small compartments containing bits, each bit is either "on"
or "off” i.e. a 0 or 1.
Memory consists of consecutive bytes it can be more considered like a spreadsheet format. We have
columns and rows. They are 8 bits across and could be millions of rows long depending on how much
memory we have. The CPU tells the memory controller what column and row it wants for data and
the Memory Controller can find it in RAM
Character encoding
To represent numeric, alphabetic, and special characters in a computer's internal storage and on
magnetic media, a coding system has to be used. With 8 bits there are 28 or 256 possible combinations
of "on" or "off" in a byte.
12
Module 1: e-Learning
ASCII (American Standard Code for Information Interchange) is essentially a 7-bit code
which allows the 8th most significant bit (MSB) to be used for error checking.
ANSI (American National Standard Institute) Character set was used by windows. ANSI
is a modified ASCII
UNICODE has replaced all major coding schemes and used 16 bits for character encoding.
Data storage media
Semiconductor
Semiconductor memory uses semiconductor-based integrated circuits to store information, could be
volatile or non-volatile. Primary storage like RAM is volatile semiconductor memory. Secondary
memory like Flash memory (Pen drives) and now flash-based solid-state drives (SSDs) are Non-
Volatile semiconductor memories. Data is represented with switches.
Magnetic
Magnetic storage uses different microscopic magnets of different polarities to store information.
Magnetic storage is non-volatile. Hard Disks, Tape Drives provide Magnetic Storage. In Magnetic
Storage, data (0 or 1) is represented with polarity of Magnetic field.
Optical storage
Optical storage stores information by creating microscopic pits on the surface of a circular disc and
reads this information by illuminating the surface with a laser diode and observing the reflection.
Optical disc storage is non-volatile CDs, DVDs and Blue-ray all use optical means to store Data.
13
Chapter 1, Part 1: Computer Hardware
* COBIT is a business framework created by ISACA (Information System and Control Association) for
the governance and management of enterprise Information Technology. ISACA provides globally
accepted principles, practices, analytical tools and models to help increase the trust in, and value
from, information systems.) COBIT is available as a free download at www.isaca.org.
Evaluation Criteria
Compatibility and Industry Standards
o Is the hardware to be procured compatible with the existing one and does it take
care of future applications?
o Have the workload and performance requirements been calculated and is the
hardware suggested capable of fulfilling them?
o Are there any industry standards for the same, and do the hardware components
comply with them?
Ease of Operations
o Can the hardware be installed and maintained by locally available engineers?
o Can the hardware be serviced, maintained, and upgraded locally?
o Does the hardware need any special training for its operation or will the users be
able to access/use it with minimal additional technological competence?
Support
o What type of technical support will be provided by the vendor?
o Are appropriate manuals for various operations available?
o If so, are they available in a variety of media?
o Can the manuals be understood by intended users?
o Does the vendor have a strong Research and Development Division with adequate
staff?
o Will the vendor help in the smooth transition from the existing application to the new
one?
o What is the quantum of training that the vendor will provide?
o What is the backup facility that the vendor will provide?
Cost
14
Module 1: e-Learning
ITT or RFP
The ITT or RFP documents the requirements of organisation. It has to inter alia include the following:
Turnaround Time: Length of time for submission of the job and receipt of completed output.
15
Chapter 1, Part 1: Computer Hardware
Response Time: Length of time between submission of transaction and first character of
output.
Throughput: The amount of work done over the period of time.
Compatibility: Hardware to be procured compatible with the existing one.
Capacity: In accordance with workload and performance requirements.
Utilisation: Fit for the purpose it is to be acquired.
The organisation must have a hardware maintenance program that takes into consideration the
following:
Which company takes care of what IT resource? For example, computers may be serviced
by one company and printers by another.
How many times during a year does the vendor provide preventive maintenance and when?
Was any problem reported in the past, and what corrective steps were suggested? This has
to be documented.
What is the cost of maintenance? Has, at any time during the year, the amount spent on
maintenance exceeded the budgeted amount? If yes, the details have to be documented.
Apart from the preventive maintenance schedule, how many times during the year did the
vendor come for servicing the equipment because of some snag failure?
What is the MTBF (Mean-Time-Between-Failure) and MTTR (Mean-Time-To-Repair) value?
Typically, MTBF value must be high and MTTR value must be low.
1.5.3 Hardware Monitoring Procedures
Hardware monitoring procedures help in the hardware maintenance program. Malfunctioned
hardware causes server downtime. It is Important to employ tools for hardware monitoring. A good
monitoring solution leverages investment in existing hardware and monitoring agents.
16
Module 1: e-Learning
Volume of transactions,
Complexity of computations, and
Mode of input and output delivery.
For example, the choice of inappropriate and inadequate software can significantly reduce the
operational efficiency of a business and its productivity, which in turn can affect the achievement of
its objectives. In the present age, one of the main issues an organisation has to face is the constant
and never-ending growth of data and requirement for greater storage capacity along with the problem
of data safety, security and integrity. In modern day enterprises, which employ large scale database
applications or multimedia applications, the requirements for disk storage run from gigabytes to
terabytes. If a proper data and storage management mechanism is in place, problems of downtime,
business loss on account of lost data and insufficient storage space can be avoided.
17
Chapter 1, Part 1: Computer Hardware
How to optimize the performance of the data storage hardware and software to ensure
high availability?
What is the best way to achieve greater storage capacity?
How effective is the current data backup and storage management system?
Capacity Planning is planning and monitoring of the computer resources to ensure that the available
resources are being used efficiently and effectively, in terms of
CPU utilisation
Computer Storage Utilisation
Telecommunication and Wide Area Network bandwidth utilisation
Terminal utilisation
I/O channel utilisation etc.
Like every other investment in an organisation, IT investment too has to be justified on the basis of
Returns on Investment (ROI). The capacity of IT resources required, such as processor power, CPU
clock speed, hard disk capacity and number of terminals have to be planned meticulously keeping
the business requirements of the current and the near future and also the rate of technology
obsolescence so that the benefits from IT investments are realised.
It assures appropriate infrastructure capacity levels to support existing and future business
functions.
It reduces resource expenditures and IT operating costs.
It improves application infrastructure availability.
It enables prioritization and reallocation of existing applications, systems, and network
components.
It projects future resource needs, protecting the infrastructure from slow-downs as capacity
demands increase.
It facilitates improved support of new and existing applications.
1.5.5 Hardware Retirement
Computer Systems have a functional life. They should be replaced at the end of their useful life
or when the hardware becomes a barrier to the user. This occurs primarily when the Applications,
or the software required for business activity will not run effectively on the existing hardware; or
when the existing hardware has begun to malfunction on a repeated basis. Some of the key
issues to be addressed in hardware retirement are:
18
Module 1: e-Learning
19
Chapter 1, Part 1: Computer Hardware
1.7 Summary
Modern organisations are heavily dependent on automated information systems for performing
processing of transactions whether it is related to delivery of product or services. The basic
infrastructure required to develop, maintain and sustain Information Systems is IT. Hardware is one
of the important components and includes the input, output, processing and storage devices. It is
important to understand functionality of various components of hardware as hardware is the important
resource in managing capacities for effective and efficient working of an enterprise. Investment in IT
hardware is a major investment and its maintenance is a major component of expenditure. Hence,
effective and optimum utilisation of IT asset is important function in in any organisation to ensure
organisational goals are achieved.
20
Module 1: e-Learning
1.8 References
http://www.cio.in
Ralph M. Stair, George W. Reynolds, ‘Principles of Information Systems’, Cengage Learning
www.whatis.com
www.howstuffworks.com
www.google.com
www.wikipedia.com
www.youtube.com
21