Make this yours. Add images, text and links, or connect data from your collection.

Introduction to Modern ICT 1 & 2  Course Outline

   Introduction to Modern ICT 1
   Introduction to Modern ICT 2

Course Overview

This is  introductory courses in computer concepts, digital literacy, or computer literacy, often including basic computer networking. With an array of fun and engaging learning tools. This course is also appropriate for students entering into information technology field. It is ideal for students any student who wish to learn computer fundamental

COURSE OUTLINE                                         

 

Using Technology to Change the World

​Technology on the World Stage

The Digital Divide and the Mobile Bridge

Technology and Our Society

Technology Impacts: How We Think; How We Connect; How We Consume

 

Internet

 

Making the Most of the Web

​Working and Playing on the Web

The Internet and How It Works

The Origin of the Internet;

Communicating and Collaborating on the Web

 

Social Networking

 E-Mail; Instant Messaging

Conducting Business Over the Internet: E-commerce

E-Commerce Safeguards; Your Files in the Cloud

Using the Web Effectively; Accessing and Moving 

 

Digital Devices and Media

​Managing a Digital Lifestyle

Mobile Devices & Digital Convergence

Telephony: Smartphones and Beyond

Smartphone Basics & Smartphone Components

How Cell Phone Technology Works

Synchronizing; Text Messaging

Mobile Internet; Smartphone Security

VoIP; Smartphone GPS

Using Technology to Change the World

​Technology on the World Stage

The Digital Divide and the Mobile Bridge

Technology and Our Society

Technology Impacts How We Think; How We Connect; Technology Impacts ​

Securing Your System

 

Protecting Your Digital Data and Devices

Major Threats to Your Digital Assets

Cybercrime and Identity Theft

Computer Viruses

Catching a Virus

Boot-Sector Viruses

Logic Bombs and Time Bombs

Worms

Script and Macro Viruses

E-Mail Viruses

Encryption Viruses

Additional Virus Classifications

Virus Symptoms

Preventing Virus Infections

Antivirus Software

Software Updates

Understanding Hackers

Problems Hackers Can Cause

Trojan Horses and Rootkits

Denial-of-Service Attacks

How Hackers Gain Computer Access

Restricting Access to Your Digital Assets

Firewalls

Types of Firewalls

How Firewalls Work

Knowing Your Computer Is Secure

 

Digital Devices

 

Media Managing a Digital Lifestyle

Mobile Devices

Digital Convergence

Telephony: Smartphones and Beyond

Smartphone Basics

Smartphone Components

How Cell Phone Technology Works

Synchronizing

Text Messaging

Mobile Internet

 

Smartphone Security

VoIP

Smartphone GPS

Making a Choice

The Digital Information Age

Digital Defined

Digital Media

Digital Publishing

Digital Music

Digital Photography

The Shift to Digital Music: A Bumpy Ride

Digital Video

 

ETHICS in IT: Managing Your Copyrights: Copy left Might Simplify Your Life

Application Software: Programs That Let You Work and Play

Programs That Let You Work

The Nuts and Bolts of Software

Productivity and Business Software

Bundled Productivity Software

Course Overview

 

This is  introductory course for students entering into information technology field. It is ideal for students any student who wish to learn computer fundamentals.

 

COURSE OUTLINE

Software Application 

The Boot Process: Starting Your Computer

Step 1: Activating BIOS

Step 2: Performing the Power-On Self-Test

Step 3: Loading the OS

Step 4: Checking Further Configurations and Customizations

Handling Errors in the Boot Process

Using System Software

The Windows Interface

Open Source Software: Why Isn't Everyone Using Linux?

Organizing Your Computer: File Management

The Programs and Features Utility

File Compression Utilities

System Maintenance Utilities

System Restore and Backup Utilities

Understanding and Assessing Hardware

Evaluating Key Subsystems

Your Ideal Computing Device

Evaluating the CPU Subsystem

How the CPU Works

CPU Factors

Measuring the CPU

Evaluating the Memory Subsystem

The RAM in Your System

Adding RAM

Evaluating the Storage Subsystem

Mechanical Hard Drives

Solid-State Drives

How a Hard Drive Works

Optical Drives

Your Storage Capacity and Needs

Video Cards

The New Standard for Data Transfer

Evaluating the Audio Subsystem

Evaluating System Reliability

Understanding Software Programming

The Importance of Programming

The Life Cycle of an Information System

The System Development Life Cycle

The Life Cycle of a Program

Describing the Problem: The Problem Statement

Making a Plan: Algorithm Development

Developing the Algorithm: Decision Making and Design


 

Databases and Information Systems

Database Basics

Database Building Blocks

Databases Versus Lists

Advantages of Using Databases

Database Management Systems

Database Terminology

Planning and Creating the Database

Using Primary Keys

Database Types

Relational Databases

Object-Oriented Databases

Multidimensional Databases

Database Functions

Inputting Data

Data Validation

Viewing and Sorting Data

Extracting or Querying Data

Structured Query Language (SQL)

Outputting Data

Using Excel's Database Functions

How Businesses Use Databases

Data Warehousing and Storage

Data Warehouses

TRENDS in IT: Emerging Technologies: Can Your Business Partner

Populating Data Warehouses

Data Staging

Data Marts

Business Intelligence Systems

Office Support Systems

Transaction-Processing Systems

Management Information Systems

Decision Support Systems

Enterprise Resource Planning Systems

TRENDS in IT: Computers in Society: User-Populated Databases

Data Mining

 

Networking and Security

Client/Server Networks 

Client/Server Network Basics

Comparing Client/Server and Peer-to-Peer Networks

Types of Client/Server Networks

Servers

Authentication and File Servers

Print Servers

Application Servers

Database Servers

E-Mail Servers

Communications Servers

Web Servers and Cloud Servers

Network Topologies

Bus Topology

Ring Topology

Star Topology

Comparing Topologies

 Home Network

Setting Up Business Networks

Transmission Media

Wired Transmission Media

Networking and Security in the Business World

Client/Server Networks and Topologies

Client/Server Network Basics

Networking Advantages

Comparing Client/Server and Peer-to-Peer Networks

Types of Client/Server Networks

Servers

Authentication and File Servers

Print Servers

Application Servers

Database Servers

E-Mail Servers

Communications Servers

Web Servers and Cloud Servers

Virtualization:  Making Servers Work Harder

Network Topologies

Bus Topology

Ring Topology

Star Topology

Transmission Media

Wired Transmission Media

Twisted-Pair Cable

Coaxial Cable

Fiber-Optic Cable

Wireless Media Options

Comparing Transmission Media

Network Adapters

Network Navigation Devices

MAC Addresses

Switches and Bridges

Routers

Network Security

Authentication

Access Privileges

Password Protection and Password Management

Creating Passwords

Managing Your Passwords

Anonymous Web Surfing: Hiding from Prying Eyes

Biometric Authentication Devices

Testing Your Network Security

Protecting Your Digital Property from Yourself

Managing Online Annoyances

Malware: Adware and Spyware

Spam

Computer Forensics: How It Works

Cookies

Keeping Your Data Safe

Protecting Your Personal Information

Backing Up Your Data

Social Engineering

Phishing and Pharming

Scareware

TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches

Protecting Your Physical Computing Assets

Environmental Factors

Power Surges

Deterring Theft

Keep Them Safe: Alarms

Keeping Mobile Device Data Secure

Software Alerts and Data Wipes

.

  • White Twitter Icon
  • White Google+ Icon

© 2020 by  NICESTEP CyberLabs. 

Achiaa House (Eco-Bank Building), Mile 7, Achimota