Professional Documents
Culture Documents
COURSE OUTLINE
Kulliyyah Economics & Management Sciences (KENMS) Programme Department Business
Course Title Course Code Status Level Credit Hours Contact Hours Pre-requisite Teaching Methodology
Information Technology ICTM 1803 Required Undergraduate (Degree) 3 3 None Lecture, Quizzes, Assignments, and Projects .
Method of Evaluation
Instructor
Name : Azlan Mohamed Zain E-mail : azlanmz@gmail.com HP: 019-2343737 The main objectives of this course are as follows: i. To create a natural interest in students to know about the world of computers and other technologies in IT, awareness of their importance, versatility and potential for good and ill in our society. To acquire computer literacy students will learn what computers are, how they work and their functions. This will help students to work with computers in the workplace. To provide basic computer skills. To help students in decision-making and to help them to do evaluation in procuring computers, IT and communication systems.
Course Objectives
Learning Outcomes
At the end of this course, students will be able to: 1. demonstrate his knowledge, understanding and application of the components of computer and its relevant technology 2. demonstrate the understanding on the application of IT in today world particularly in all fields of specialization 3. apply and use computer applications particularly the web technologies to publish information on the Internet 4. work as part of a team to design and create one website using the free web hosting 5. demonstrate the ability to explore the relevant information technologies in their studies
Using System Software: The Operating System, Utility Programs, and File Management System Software Basics Types of Operating Systems Organizing Your Computer Utility Programs
Chapter 5
Understanding and Assessing Hardware: Evaluating your System Evaluating the Storage Subsystem Evaluating the Video Subsystem Evaluating the Audio Subsystem Evaluating System Reliability
Chapter 6
Digital Lifestyle : Protecting Digital Data and Devices Keeping Your Data Safe Computer Threats Computer Safeguard
Chapter 9
Behind the Scenes: Data Bases and Information Systems Database Building Blocks Database Types Database Management Systems Relational Database Operations
Chapter 11
Behind the Scenes: Networking and Security in the Business World Networking Advantages Network Topologies Transmission Media
Chapter 12
Behind the Scenes: The Internet: How it Works The Management of the Internet Internet Networking Data Transmission and Protocols Communication over the Internet
Chapter 13
Reference
Required: Evans. A, Martins. K, & Poatsy. M.A. (2010). Technology in Action. Complete. 7th Edition. Pearson. Recommended: Bill Daley (2008) Computers are your Future Ninth Edition, Pearson