SYLLABUS BCIS 1405 Business Computer Applications CATALOG DESCRIPTION: This course discusses computer terminology, hardware, software, operating system and information systems relating to the business environment. The main focus of this course is on business application of software, including word processing, spreadsheets, databases, presentations graphics and business-oriented utilization of the internet. Course Title: Business Computer Applications Course Level: Introductory This course discusses computer terminology, hardware, software, operating system and information systems relating to the business environment. The main focus of this course is on business application of software, including word processing, spreadsheets, databases, presentations graphics and business-oriented utilization of the internet. Course Competencies A. Define computer related terminology. B. Identify individuals responsible for the evolution of the computer, computer generations, and computer speeds. C. Describe various input devices and their functions. D. Central Processing Unit. 1. Define Central Processing Unit (CPU). 2. Describe parts of the CPU and explain their function. E. Describe various output devices and their functions. F. Demonstrate knowledge of the following numbering systems. 1. Binary numbering system. 2. Hexadecimal numbering system 3. ASCII G. Describe the various types of auxiliary storage devices and the way in which data is organized on each. H. Describe the differences in Hierarchy, Network, and Relational, Object-Oriented, and Multidimensional data bases. I. Data Communications. 1. Define data communications. 2. Identify different types of communication channels and line configurations. 3. Define modem. 4. Differentiate between star, ring, and bus networks. J. Describe program development life cycle. K. Identify different programming languages available. L. Demonstrate ability to flowchart a simple problem. M. Demonstrate knowledge of internet use as research tool. N. Identify different operating systems/utility programs. O. Identify computer security risks/ ethical issues. P. Demonstrate knowledge of, and safeguards against, computer viruses, worms, and Trojan horses. Q. Demonstrate knowledge of word processing, data base, spreadsheet, and presentation software.