COM2004 Introduction to Information Technology

Prerequisite

Nil

Exclusion

This module is not available to BA-AHCC, BMSIM, and BSC-DSBI students

Module Description

This module introduces the essential concepts necessary to make effective use of the computer. The need for effective computer skills is essential in all fields. The module develops students to use technology and software applications to perform and coordinate the various activities in their future career. In addition, telecommunications are the backbone of the IT infrastructure of the enterprise in today's global environment. This module provides a foundation in the concepts of telecommunications. Secure telecommunications infrastructure meets modern needs and protects information assets. Therefore, the module also addresses cyber security and cyber ethics topics.

Module Intended Learning Outcomes (MILO)

Upon completion of this module, students should be able to: 
a. understand the components and functionalities of a computer system; 
b. identify a secure telecommunications infrastructure based on modern needs and requirements to align with organization strategies; 
c. use common application packages such as word processing, spreadsheets, and presentation software in high level; 
d. critically evaluate how cyber security and cyber ethics issues are relevant to a reliable and secure telecommunications infrastructure that protects information assets.

Module Content

1. Introduction

1.1 Components of a computer system
1.2 Functionalities of a computer system

2. Telecommunications infrastructure

2.1 Defining telecommunications infrastructure
2.2 Telecommunications and networking in modern world

3. Common application packages

3.1 Word processing
3.2 Spreadsheet
3.3 Presentation

4. Intellectual Property

4.1 What are intellectual property rights?
4.2 Protecting intellectual property

5. Cyber ethics

5.1 Defining cyber ethics
5.2 The cyber ethics evolution

6. Cyber security

6.1 Defining cyber security
6.2 Types of cyber crimes
6.3 Preventions of cybercrimes

Assessment Methods

1. Class participation (10%)
2. Test (30%)
3. Project (20%)
4. Assignments (40%)

Texts & References

1. Joan, L., Curtis, F. (2015). Microsoft Office 2016 Step by Step (1 st ed.). : Pearson.*
2. Parsons, J. J. (2016). New perspectives on computer concepts 2016, Introductory (18th ed.). Boston, Mass: Course Technology, Cengage Learning.
3. Shelly, G. B., Vermaat, M. E., Quasney, J. J. Sebok, S. L. & Freund, S. M. (2012). Discovering Computers: Your interactive guide to the digital world: complete. Australia: Course Technology, Cengage Learning.
4. Kurose, J. F. & Ross, K. W. (2013). Computer networking: A top-down approach (6th ed.). Boston, Mass: Pearson.
5. Reynolds, G. W. (2010). Ethics in information technology (3rd ed.). Boston, Mass: Thomson Course Technology.
6. Easttom, C. (2012). Computer security fundamentals (2nd ed.). Indianapolis, Ind.: Pearson.