You are on page 1of 4

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA

COURSE OUTLINE
Kulliyyah Economics & Management Sciences (KENMS) Programme Department Business

Executive Bachelor of Business and Administration (EBBM)

Course Title Course Code Status Level Credit Hours Contact Hours Pre-requisite Teaching Methodology

Information Technology ICTM 1803 Required Undergraduate (Degree) 3 3 None Lecture, Quizzes, Assignments, and Projects .

Method of Evaluation

Instructor

Name : Azlan Mohamed Zain E-mail : azlanmz@gmail.com HP: 019-2343737 The main objectives of this course are as follows: i. To create a natural interest in students to know about the world of computers and other technologies in IT, awareness of their importance, versatility and potential for good and ill in our society. To acquire computer literacy students will learn what computers are, how they work and their functions. This will help students to work with computers in the workplace. To provide basic computer skills. To help students in decision-making and to help them to do evaluation in procuring computers, IT and communication systems.

Course Objectives

ii. iii. iv.

Learning Outcomes

At the end of this course, students will be able to: 1. demonstrate his knowledge, understanding and application of the components of computer and its relevant technology 2. demonstrate the understanding on the application of IT in today world particularly in all fields of specialization 3. apply and use computer applications particularly the web technologies to publish information on the Internet 4. work as part of a team to design and create one website using the free web hosting 5. demonstrate the ability to explore the relevant information technologies in their studies

Using System Software: The Operating System, Utility Programs, and File Management System Software Basics Types of Operating Systems Organizing Your Computer Utility Programs

Chapter 5

Understanding and Assessing Hardware: Evaluating your System Evaluating the Storage Subsystem Evaluating the Video Subsystem Evaluating the Audio Subsystem Evaluating System Reliability

Chapter 6

Digital Lifestyle : Protecting Digital Data and Devices Keeping Your Data Safe Computer Threats Computer Safeguard

Chapter 9

Behind the Scenes: Data Bases and Information Systems Database Building Blocks Database Types Database Management Systems Relational Database Operations

Chapter 11

Behind the Scenes: Networking and Security in the Business World Networking Advantages Network Topologies Transmission Media

Chapter 12

Behind the Scenes: The Internet: How it Works The Management of the Internet Internet Networking Data Transmission and Protocols Communication over the Internet

Chapter 13

Reference

Required: Evans. A, Martins. K, & Poatsy. M.A. (2010). Technology in Action. Complete. 7th Edition. Pearson. Recommended: Bill Daley (2008) Computers are your Future Ninth Edition, Pearson

Prepared by: _______________ (Br. Razi Jalaldeen)

Checked by: __________________ (Prof. Dr.Abu Osman Md Tap)

Approved by: _____________ (Prof. Dr. Mohd Adam Suhaimi)

You might also like