UNIVERSITI TENAGA NASIONAL COLLEGE OF FOUNDATION AND GENERAL STUDIES Course Outline Business Computing Skill MGMD 113 Semester 2 Academic Year 2013/2014 Mrs. Azlina Mohamat Nor Room: WSAS-02-009 Tel: 09 – 455 2020 (3143) Fax: 09 – 455 2000 Email: azlinamn@uniten.edu.my BUSINESS COMPUTING SKILL Course Code : MGMD 113 Course Status : Core Level : Diploma Semester Taught : 1 Credit : 3 Pre-requisites : None Assessments : Continuous Assessment 60% Final examination 40% Lecturer : Course Description : Azlina Mohamat Nor The ain of this course is to provide knowledge on basic through advanced Computer concepts with an emphasis on both the proposal computer and Enterprise computing. It will introduce the components of hardware, software, internet, security, programming languages, database management, and information systems. Course Outcomes vs. PO matrix: Course Outcomes 1. Comprehend the use of computer, Internet and information system. 2. Comprehend the applications of Internet and network security. PO1 X X PO2 PO3 PO4 PO5 PO6 PO7 PO8 3. Comprehend the functions of system software and application software. X 4. Comprehend the components of computer. X 5. Comprehend the roles of programming language. X 6. Comprehend the functions of database. X 7. Comprehend the development and usage of information system. X Average PO Assessments Methods 1. Final Exam 2. Midterm 3. Quizzes/Assignments/Tutorials 4. Group Project X CO1 CO2 CO3 X X X X X X X X X Total student learning time (SLT) L = Lecture T = Tutorial P = Practical O = Others L T 3x2x14 3x1x14 P Lecture 1. Introduction to Information Technology & Internet Computer components Advantages and disadvantages of using computer Network purpose Internet and World Wide Web System software and application software Categories of computers Elements of an information system Computer applications in society 2. The Internet & World Wide Web Internet access and connection IP address Web address, web browser and website E-commerce 3. Application Software Application software usage Application software categorization CO5 X CO6 X CO7 X X X X X X X Total guided and independent learning Face to face Course Outline : CO4 X X X X O 126 Software distribution Utility programs functions 4. The System Unit System units Motherboard Bit and byte Memory Expansion slots and adapter cards Computer ports 5. Input & Output Devices Mouse, pointing devices, controllers for gaming and media players PDAs, smart phones and tablet PCs Scanners and reading devices Terminals Biometric devices Monitors Printers Speakers, headphones and earphone Fax machine and fax modems 6. Storage Devices & Storage Media Magnetic disk Hard disk Miniature, external and removable hard disk PC card, express card module and miniature mobile storage media Microfilm and microfiche 7. Operating Systems & Utility Programs System software Functions of operating system Startup process on a personal computer Types of operating system: stand-alone operating systems, server operating systems and embedded operating systems Functions of utility programs 8. Communications & Networks Components of communications Uses of computer communications Types of networks: LANs, MANs, and WANs Network architectures: Client/server and peer-to-peer networks, and describe how a P2P networks works Network topologies: star network, bus network, and ring network Network communications standards: Ethernet, token ring, TCP/IP, Wi-Fi, Bluetooth, UWB, IrDA, RFID, WiMAX, and WAP Communications softwares Communications devices: dial-up modems, digital modems, wireless modems, network cards, wireless access points, routers, and hubs and switches Types of home networks Physical and wireless transmission media: twisted-pair cable, coaxial cable, fiber-optic cable, infrared, broadcast radio, cellular radio, microwaves, and communications satellite. 9. Database Management 10. Data and information Data integrity and qualities of valuable information Character, field, record, and file File maintenance techniques (adding records, modifying records, deleting records) and validation techniques File processing approach and the database approach Functions common to most database management systems: data dictionary, file retrieval and maintenance, data security, and backup and recovery Access to Web databases Computer Security, Ethics & Privacy 11. Internet and network attacks and ways to safeguard against these attacks Techniques to prevent unauthorized computer access and use Safeguards against hardware theft and vandalism Ways software manufacturers protect against software piracy Types of devices available that protect computers from system failure Options available for backing up computer resources Risks and safeguards associated with wireless communications Ways to prevent health-related disorders and injuries due to computer use Issues related to information accuracy, intellectual property rights, codes of conduct, and green computing Issues surrounding information privacy, including electronic profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering Information System Development 12. System development cycle Guidelines for system development Project management, feasibility assessment, documentation, and data and information gathering techniques Activities performed in the planning phase Activities performed in the analysis phase Activities performed in the design phase Activities performed in the implementation phase Activities performed in the operation, support, and security phase Programming Languages Machine and assembly languages Procedural programming languages Programming languages for Web pages, including HTML and XHTML, XML and WML, scripting languages, DHTML, Ruby on Rails, Web 2.0 development, and Web page authoring software Popular multimedia authoring programs References: Shelly, G.B., Cashman, T.J. and Vermaat, M.E (2010), Discovering Computers 2011 (Complete), Thomson Course Technology. Joyce, J. and Moon, M. (2007), Microsoft Office System 2007, Mc Graw Hill Technology Education Evan, A., Martin, K. and Poatsy, M. A. (2010), Technology in Action, Pearson Prentice Hall. O’Leary T.J., and O’Leary, L.I. (2010) Computing Essentials 2011, Mac Graw Hill. Program Outcomes PO No. PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 Students graduating from the Foundation Program will have the ability to : Ability to comprehend descriptive and quantitative knowledge in finance Able to show the technical and practical dexterities in financial theories and practices. Able to discuss finance knowledge and skills needed in order to be vigilant of the social, cultural, global and environmental responsibilities. Able to identify a code of ethics which embody professional, entrepreneurial and institutional responsibilities. Able to notify finance related problems and their feasible solutions. Able to convince other through communications effectively and be an active team player. Able to justify the philosophy of lifelong learning and skills for innovative thinking related to socio-economic environment. Able to present the professionalism in finance, business and entrepreneurial activities. Bloom’s Domains & Levels C1 & C2 C3 C2 C1&C2 C4 P C2 A