LESSON 1 INTRODUCTION TO COMPUTERS TRANSPARENCY NO SA-1.1 SA-1.2 SA-1.3 SA-1.4 SA-1.5 SA-1.6 SA-1.7 SA-1.8 SA-1.9 SA-1.10 SA-1.11 SA-1.12 SA-1.13 SA-1.14 SA-1.15 SA-1.16 SA-1.17 SA-1.18 SA-1.19 SA-1.20 SA-1.21 SA-1.22 SA-1.23 SA-1.24 SA-1.25 SA-1.26 TITLE LESSON 1 LESSON OVERVIEW DEFINITION OF COMPUTER UNITS OF MEASUREMENT IN COMPUTING THE FUNDAMENTAL UNIT OF STORAE CLASSIFICATION OF COMPUTERS CLASSIFICATION OF COMPUTERS BY PURPOSES CLASSIFICATION OF COMPUTERS ACCORDING TO MEMORY SIZE AND COST CLASSIFICATION OF COMPUTERS CLASSIFICATION OF COMPUTERS ACCORDING TO THE TYPE OF DATA PROCESSED CLASSIFICATION OF COMPUTERS ACCORDING TO GENERATIONS PARTS OF AN INFORMATION SYSTEM DEVELOPMENTS OF COMPUTERS SOME APPLICATIONS IN BUSINESS AND MANUFACTURING MAGNETIC STRIPE TECHNOLOGY ESSENTIAL FACTORS AFFECTING THE MAGNETIC RECORDING AND REPLAY PROCESS COERCIVITY ADVANTAGES OF USING MAGNETIC STRIPE TECHNOLOGIES DISADVANTAGES OF USING MAGNETIC STRIPE TECHNOLOGY STANDARDS OF MAGNETIC STRIPE SMART CARD (TECHNOLOGY) SMART CARD (TECHNOLOGY) SMART CARD (TECHNOLOGY) SMART CARD (TECHNOLOGY) THE MOST COMMON SMART CARD APPLICATION IMAGE TECHNOLOGY Copyright @ Genetic Computer School 2008 1 Computer System Fundamental LECTURER TO NOTE THE LECTURER MUST EXPLAIN THE VARIOUS UNITS OF MEASUREMENT WITH RESPECT TO STORAGE, TRANSMISSION SPEED, TIME AND FREQUENCY. THE LECTURER SHOULD DESCRIBE AND DISCUSS THE CLASSIFICATION OF COMPUTERS IN TERMS OF PURPOSE, SIZE, COST AND PERFORMANCE ISSUES. THE LECTURER SHOULD EXPLAIN ABOUT THE PARTS OF AN INFORMATION SYSTEM BY GIVING REAL-LIFE EXAMPLES. THE LECTURER SHOULD TRY TO EXPLAIN THE APPLICATIONS OF COMPUTERS BY USING SOME RELAVENT EXAMPLES OF IT APPLICATIONS. THE LECTURER SHOULD POINT OUT ON THE MAGNETIC STRIPE AND SMART CARD TECHNOLOGIES AND SHOULD DISCUSS ON ADVANTAGES, DISADVANTAGES AND THE DIFFERENCES. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS AS HOMEWORK. Copyright @ Genetic Computer School 2008 2 Computer System Fundamental LESSON 2 THE PROCESSING UNIT TRANSPARENCY NO SA-2.1 SA-2.2 SA-2.3 SA-2.4 SA-2.5 SA-2.6 SA-2.7 SA-2.8 SA-2.9 SA-2.10 SA-2.11 SA-2.12 SA-2.13 SA-2.14 SA-2.15 SA-2.16 TITLE LESSON 2 LESSON OVERVIEW CENTRAL PROCESSING UNIT CENTRAL PROCESSING UNIT MAIN COMPONENETS OF THE CPU CONTROL UNIT MEMORY UNIT RAM, RANDOM ACCESS MEMORY ROM, READ ONLY MEMORY ARITHMETIC LOGIC UNIT ARITHMETIC AND LOGIC UNIT COMPARISON OPERATIONS LOGIC FUNCTIONS STEPS, CPU PERFORMS WHEN EXECUTING AN INSTRUCTION HOW CPU WORKS? DEFINITION : MICROPROCESSOR LECTURER TO NOTE THE LECTURER MUST DISCUSS THE MAIN COMPONENTS OF THE CPU BY DESCRIBING THE FUNCTION OF EACH COMPONENT. THE LECTURER SHOULD EXPLAIN ABOUT THE OPEARTION OF THE CPU, HOW CPU PERFORMS WHEN EXECUTING AN INSTRUCTION, HOW IT WORKS BY GIVING AN EXAMPLE. THE LECTURER SHOULD DISCUSS ABOUT MICROPROCESSOR, HOW IT IS PERFORMED, AND HOW IT OPERATES. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK. Copyright @ Genetic Computer School 2008 3 Computer System Fundamental LESSON 3 INPUT AND OUTPUT DEVICES TRANSPARENCY NO SA-3.1 SA-3.2 SA-3.3 SA-3.4 SA-3.5 SA-3.6 SA-3.7 SA-3.8 SA-3.9 SA-3.10 SA-3.11 SA-3.12 SA-3.13 SA-3.14 SA-3.15 SA-3.16 SA-3.17 SA-3.18 SA-3.19 SA-3.20 SA-3.21 SA-3.22 SA-3.23 SA-3.24 SA-3.25 TITLE LESSON 3 LESSON OVERVIEW INPUT DEVICES KEYBOARD ENTRY TERMINALS DIRECT ENTRY SOME SPECIAL PURPOSE MOUSE SOME SCANNERS AND ASSOCIATED DEVICES VOICE RECOGNITION SYSTEM OTHER HARDWARE COMPONENTS OUTPUT DEVICES MONITORS RESOLUTION OF THE MONITOR MONITORS: THREE MOST COMMON STANDARDS DISPLAY TECHNOLOGY PRINTERS PRINTERS SPECIAL PURPOSE PRINTERS PLOTTER COMPUTER OUTPUT MICROFILM, COM THE BENEFITS OF COM DISADVANTAGES OF COM SPEECH OUTPUT HAPTIC DEVICES TWO MAIN TYPES OF HAPTIC DEVICES LECTURER TO NOTE THE LECTURER SHOULD EXPLAIN ABOUT THE TERMINALS. THE LECTURER SHOULD EXPLAIN ON THE TYPES OF DIRECT ENTRY DEVICES AND OTHER HARDWARE COMPONENTS GIVING SOME ILLUSTRATIONS AND HOW THEY WORK IN SOME SPECIAL PURPOSES. THE LECTURER SHOULD DISCUSS ON THE DISPLAY COMPONENTS AND TECHNOLOGIES. THE LECTURER SHOULD EXPLAIN THE TYPES OF PRINTERS WITH RESPECT TO QUALITY, MATERIALS AND TRANSFER PROCESS. AND ALSO MAKE A DISCUSSION ON THE ADVANATGES AND DISADVANTAGES OF THE COMPUTER MICROFILM OUTPUT AND SPEECH OUTPUT. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK. Copyright @ Genetic Computer School 2008 4 Computer System Fundamental LESSON 4 STORAGE TRANSPARENCY NO SA-4.1 SA-4.2 SA-4.3 SA-4.4 SA-4.5 SA-4.6 SA-4.7 SA-4.8 SA-4.9 SA-4.10 SA-4.11 SA-4.12 SA-4.13 SA-4.14 SA-4.15 SA-4.16 SA-4.17 SA-4.18 SA-4.19 SA-4.20 TITLE LESSON 4 LESSON OVERVIEW MEMORY MAIN MEMORY TYPE OF MAIN MEMORY STATIC RAM (SRAM) AND DYNAMIC RAM (DRAM) ROM AND TYPES OF ROM READ ONLY MEMORY (ROM) USE OF ROM FIRMWARE PROGRAMMABLE ROM (PROM) ERASABLE PROM (EPROM) ELECTRICALLY ERASABLE PROM (EEPROM) NON-VOLATILE RAM (NVRAM) DIFFERENCE BETWEEN PROMARY AND SECONDARY STROAGE PERMANENT STORAGE DEVICES DISK STORAGE DISK STORAGE TAPE STORAGE DIFFERENT TYPES OF TAPE LECTURER TO NOTE THE LECTURER SHOULD MAKE A DISCUSSION ON THE MAIN MEMORY AND TYPES OF MAIN MEMORY. THE LECTURER SHOULD DESCRIBE ABOUT RAM, SRAM, DRAM, ROM, PROM, EPROM, EEPROM, NVRAM AND THEIR USAGE. MAKE A DISCUSSION ON PRIMARY STORAGE AND SECONARY STORAGE THE LECTURER CAN EXPLAIN THE PERMANENT STORAGE DEVICES BY DISCUSSING THE CALCULATION OF DISK STORAGE REQUIREMENTS. THE TYPES OF HARD DISK AND WAYS OF ENHANCING THE PERFORMANCE OF HARD DISK, THE TYPES OF CD AND DVD SHOULD BE DISCUSSED AND ALSO ABOUT THE TYPES OF TAPE STORAGE. THE STORAGE HIERRACHY OF A COMPUTER SYSTEM CAN BE ILLUSTRATED VIA A DIAGRAM BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK. Copyright @ Genetic Computer School 2008 5 Computer System Fundamental LESSON 5 SOFTWARE TRANSPARENCY NO SA-5.1 SA-5.2 SA-5.3 SA-5.4 SA-5.5 SA-5.6 SA-5.7 SA-5.8 SA-5.9 SA-5.10 SA-5.11 SA-5.12 SA-5.13 SA-5.14 SA-5.15 SA-5.16 SA-5.17 SA-5.18 TITLE LESSON 5 LESSON OVERVIEW DEFINITION OF SOFTWARE THREE TYPES OF PROGRAMS SYSTEM SOFTWARE OPERATING SYSTEM FUNCTIONS OF OPERATING SYSTEM UTILITY PROGRAMS LANGUAGES LANGUAGES COMPILER APPLICATION SOFTWARES INTEGRATED SOFTWARE SUITES SOME POPULAR SUITES OF OFFICE SOFTWARE EXAMPLE OF GRAPHICS SUITE EXAMPLE OF PUBLISHING SUITE BASIC TYPES OF SOFTWARE Copyright @ Genetic Computer School 2008 6 Computer System Fundamental LECTURER TO NOTE THE LECTURE SHOULD EXPLAIN ABOUT THE DEFINITION OF SOFTWARE AND TYPES OF PROGRAM THE LECTURER SHOULD DESCRIBE THE FUNCTIONS OF OPERATING SYSTEMS. ALLOCATING SYSTEM RESOURCES MONITORING SYSTEM ACTIVITIES FILE AND DISK MANAGEMENTS. THE LECTURER SHOULD DISCUSS ON THE COMMON OPERATING SYSTEMS BY COMPARING THEM THE LECTURER SHOULD DESCRIBE THE INSTANCES OF UTILITY PROGRAMS WITH THE AID OF EXAMPLES. THE LECTURER SHOULD INTRODUCE AND DESCRIBE ABOUT THE COMPILER AND LANGUAGES THE LECTURER SHOULD EXPLAIN THE APPLICATION SOFTWARE BY GIVING VARIOUS EXAMPLES OF EACH TYPE OF SOFTWARE. THE LECTUREER SHOULD DESCRIBE THE BASIC TYPES OF SOFTWARES BY DISCUSSING BENEFITS OF EACH OF THEM. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK. Copyright @ Genetic Computer School 2008 7 Computer System Fundamental LESSON 6 BATCH / ONLINE AND REAL-TIME PROCESSING SYSTEM TRANSPARENCY NO SA-6.1 SA-6.2 SA-6.3 SA-6.4 SA-6.5 SA-6.6 SA-6.7 SA-6.8 SA-6.9 SA-6.10 SA-6.11 SA-6.12 SA-6.13 SA-6.14 TITLE LESSON 6 LESSON OVERVIEW DATA PROCESSING SOME FILE PROCESSING MODES FILE AND DATABASE PROCESSING BATCH PROCESSING ADVANTAGES AND DISADVANTAGES OF BATCH PROCESSING BATCH CONTROLS ON-LINE PROCESSING ADVANTAGES AND DISADVANTAGES OF ON-LINE PROCESSING REAL-TIME PROCESSING SYSTEM SIMPLE DEFINITION OF REAL-TIME PROCESSING SYSTEM ADVANTAGES AND DISADVANTAGES OF REAL-TIME PROCESSING SYSTEM OFF-LINE PROCESSING SYSTEM LECTURER TO NOTE THE LECTURER SHOULD DESCRIBE FILE PROCESSING MODES AND DISCUSS ABOUT EACH MODE AFTER DISCUSSING THE VARIOUS PROCESSING SYSTEMS, THE LECTURER CAN ASK THE STUDENTS TO COMPARE THE DIFFERRENT TYPES OF PROCESSING SYSTEMS THUS OUTLINING THEIR ADVANTAGES AND DRAWBACKS AS AN EXCERISE. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 8 Computer System Fundamental LESSON 7 FILES AND DATABASE MANAGEMENT SYSTEMS TRANSPARENCY NO SA-7.1 SA-7.2 SA-7.3 SA-7.4 SA-7.5 SA-7.6 SA-7.7 SA-7.8 SA-7.9 SA-7.10 SA-7.11 SA-7.12 SA-7.13 SA-7.14 SA-7.15 SA-7.16 SA-7.17 SA-7.18 SA-7.19 SA-7.20 SA-7.21 SA-7.22 SA-7.23 SA-7.24 SA-7.25 SA-7.26 SA-7.27 SA-7.28 SA-7.29 SA-7.30 SA-7.31 SA-7.32 SA-7.33 SA-7.34 SA-7.35 SA-7.36 SA-7.37 SA-7.38 SA-7.39 SA-7.40 SA-7.41 SA-7.42 SA-7.43 SA-7.44 SA-7.45 SA-7.46 TITLE LESSON 7 LESSON OVERVIEW INTRODUCTION INTRODUCTION INTRODUCTION INTRODUCTION DATA STORAGE SOME GENERAL CONCEPTS DATA FILES RECORDS FIELDS DATA TYPES KEYS, THE PRIMARY KEY THREE FILE USAGE CATEGORIES TRANSACTION FILES, SOURCE DATA PURPOSE OF TRANSACTION FILES USE OF TRANSACTION FILE TRANSITION FILES TRANSITION FILES: EXAMPLE AND USE SPOOLING (OUTPUT) FILES MASTER FILES THREE MAIN PROCESSES THAT ARE APPLICABLE TO MASTER FILES ACTIVITY RATIOS SEMI-STATIC AND VOLATILE FILES FILE PROCESSES TYPE OF FILE ORGANISATION SEARCHING BALANCED GINARY TREE SEARCHING OVERFLOW METHODOLOGY DATA STRUCTURES ISSUES ARISING FROM FILE BASED SYSTEMS DISADVANTAGES OF FILE-BASED SYSTEM DATABASES DATABASES DATABASE MANAGEMENT SYSTEMS DRAWBACKS OF USING FILE SYSTEMS TO STORE DATA DRAWBACKS OF USING FILE SYSTEMS TO STORE DATA DRAWBACKS OF USING FILE SYSTEMS TO STORE DATA THE NEED FOR DATABASES DATABASE SECURITY THE MAIN SECURITY FEATURES DATABASE INTEGRITY DATABASE INTEGRITY DATABASE INTEGRITY DATABASE INTEGRITY DATABASE RECOVERY Copyright @ Genetic Computer School 2008 9 Computer System Fundamental SA-7.47 SA-7.48 SA-7.49 SA-7.50 SA-7.51 SA-7.52 SA-7.53 DATABASE RECOVERY DATABASE RECOVERY DATABASE MODELS HIERARCHICAL DATABASE MODEL NETWORK DATABASE MODEL RELATIONAL DATABASE MODEL FILES VS. DATABASE APPROACH LECTURER TO NOTE THE LECTURER SHOULD EXPLAIN PRINCIPAL APPROACH TO THE STORAGE OF DATA IN A COMPUTER-BASED INFORMATION SYSTEM THE LECTURER SHOULD DISCUSS ABOUT THE FILE BASE SYSTEM AND SOME GENERAL CONCEPTS AND DEFINITIONS RELATING TO THE STORAGE OF DATA IN FILES. THE LECTURER SHOULD DISCUSS ABOUT THE FILE USAGE CATEGORIES: TRANSACTION, TRANSITION AND MASTER FILES. THE LECTURER SHOULD DESCRIBE THE PRINCIPAL PROCESSES CARRIED OUTWITH FILES THOSE APPLY TO BOTH MASTER FILES AND TRANSACTION FILES. THE LECTURER CAN EXPLAIN THE OVERFLOW METHODOLOGY, ITS CAUSES AND HOW TO HANDLE OVERFLOW. THE TYPES OF DATABASE MODELS CAN BE BEST DISCUSSED WITH THE AID OF EXAMPLES. THE LECTURER CAN STRESS UPON THE RELATIVE ADVANTAGES AND DISADVANTAGES OF EACH DATABASE MODEL. THE STUDENTS CAN BE ASKED TO DO FURTHER RESEARCH ON OTHER DATA STRUCTURES AS AN EXERCISE. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 10 Computer System Fundamental LESSON 8 INTRODUCTION TO NETWORKING TRANSPARENCY NO SA-8.1 SA-8.2 SA-8.3 SA-8.4 SA-8.5 SA-8.6 SA-8.7 SA-8.8 SA-8.9 SA-8.10 SA-8.11 SA-8.12 SA-8.13 SA-8.14 SA-8.15 SA-8.16 SA-8.17 SA-8.18 SA-8.19 SA-8.20 SA-8.21 SA-8.22 SA-8.23 SA-8.24 SA-8.25 SA-8.26 SA-8.27 SA-8.28 TITLE LESSON 8 LESSON OVERVIEW COMMUNICATION CHANNELS BETWEEN COMPUTERS TRANSMISSION METHODS TYPES OF CABLE COAXIAL CABLE TWISTED PAIR FIBER OPTIC CABLE ADVANTAGES AND DISADVANTAGES OF CAGLES MICROWAVE SATELLITE (INFRAFED LIGHT, RADIO) WIRELESS DEFINITION OF COMPUTER NETWORKS COMPUTER NETWORKS: ADVANTAGES COMPUTER NETWORKS: ADVANTAGES COMPUTER NETWORKS: ADVANTAGES COMPUTER NETWORKS: DISADVANTAGES COMPUTER NETWORKS: DISADVANTAGES COMPUTER NETWORKS: DISADVANTAGES THINGS NEEDED FOR A NETWORK A SIMPLE NETWORK TYPES OF NETWORKS LOCAL AREA NETWORKS, LANS METROPOLITAN AREA NETWORK, MAN WIDE AREA NETWORK, WAN NETWORK CONFIGURATION TYPES NETWORK CONFIGURATION TYPES: ADVANTAGES NETWORK CONFIGURATION TYPES: DISADVANTAGES Copyright @ Genetic Computer School 2008 11 Computer System Fundamental LECTURER TO NOTE THE LECTURER SHOULD DISCUSS BY MAKING COMPARE AND CONTRAST THE RELATIVE ADVANTAGES AND DISADVANATGES OF EACH TYPE OF COMMUNICATION CHANNEL. AND SHOULD ALSO DISCUSS ON THE METHODS OF TRANSMITTIONS, TYPES OF CABLES AND THEIRE ADVANTAGES AND DISDAVANTAGES. THE LECTURER CAN STRESS UPON THE COMPONENTS OF THE NETWORK AND ALSO THE OPERATION OF A NETWORK BY GIVING PRACTICAL EXAMPLES. SHOULD DISCUSS ADVANTAGES AND DISADVANTAGES OF THE COMPUTER NETWORKS SHOULD DESCRIBE THE TYPE OF NETWORKS AND POINT OUT WHERE AND HOW THESE NETWORK ARE USED THE LECTURE SHOULD MAKE DISCUSSION ON THE NETWORKING TOPOLOGIES AND THEIR ADVANTAGES AND DISADVANTAGES. THE STUDENTS CAN BE ASKED TO DO FURTHER RESEARCH ON OTHER HARDWARE USED TO CONNECT NETWORKS AS AN EXERCISE. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 12 Computer System Fundamental LESSON 9 COMPUTER AND INTERNET SECURITY TRANSPARENCY NO SA-9.1 SA-9.2 SA-9.3 SA-9.4 SA-9.5 SA-9.6 SA-9.7 SA-9.8 SA-9.9 SA-9.10 SA-9.11 SA-9.12 SA-9.13 SA-9.14 SA-9.15 SA-9.16 SA-9.17 TITLE LESSON 9 LESSON OVERVIEW COMPUTERS & SECURITY COMPUTERS & SECURITY COMPUTERS & SECURITY WHAT IS A VIRUS? WHAT IS A VIRUS? WHAT IS A VIRUS? SOME TYPES OF VIRUS SECURITY TYPES DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY DEVELOPING AN EFFECTIVE ANTIVIRUS STRATEGY SECURITY TERMS ENCRYPTION FIREWALL TECHNIQUES LECTURER TO NOTE THE LECTURER CAN GIVE AN OVERVIEW OF THE SECURITY SITUATION PRIOR TO AND AFTER THE ADVENT OF INTERNET. THE LECTURER SHOULD DESCRIBE ABOUT SOME TYPES OF VIRUS THE STUDENTS CAN BE ASKED TO DO FURTHER RESEARCH ON OTHER ANTIVIRUS STRATEGIES, SECURITY TYPES AND OTHER SECURITY TERMS AS AN EXERCISE.. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 13 Computer System Fundamental LESSON 10 THE INTERNET AND ELECTRONIC COMMERCE TRANSPARENCY NO SA-10.1 SA-10.2 SA-10.3 SA-10.4 SA-10.5 SA-10.6 SA-10.7 SA-10.8 SA-10.9 SA-10.10 SA-10.11 SA-10.12 SA-10.13 SA-10.14 TITLE LESSON 10 LESSON OVERVIEW CONCEPT OF INTERNET REQUIREMENTS FOR CONNECTING TO INTERNET BASIC CONCEPTS DEFINITION OF E-COMMERCE SOME OF E-COMMERCE BUSINESS OPERATIONS E-COMMERCE IMPLEMENTATION CONIGURATION OF AN E-COMMERCE OPERATION GUIDELINE FOR DESIGNING AN E-COMMERCE OPERATION BENEFITS OF E-COMMERCE IN SMALL BUSINESS BENEFITS OF E-COMMERCE IN SMALL BUSINESS BENEFITS OF E-COMMERCE IN SMALL BUSINESS BARRIES TO BUSINESS AND CONSUMER TARGET MARKETS LECTURER TO NOTE THE CONCEPT OF INTERNET MUST BE INRTODUCED AND THE REQUIREMENTS FOR CONNECTING TO INTERNET MUST BE DESCRIBED. THE CONCEPT OF E-COMMERCE MUST ALSO BE INTRODUCED THE LECTURER SHOULD DESCRIBE SOME OF THE COMMON OPERATIONS IN ECOMMERCE AND MAKE A DISCUSSION WITH THE STUDENTS. THE LECTURER SHOULD DESCRIBE THAT THERE ARE DIFFERENCE IN ECOMMERCE IMPLIMENTATION AND ALSO DESCRIBE OPERATIONS THOSE MOST OF THE SMALL AND MEDIUM FOCUS THE LECTURER SHOULD POINT OUT AND DISCUSS THE BENEFITS OF ECOMMERCE THE LECTURER SHOULD DESCRIBE THE BARRIERS TO BUSINESS AND CONSUMER TARGET MARKETS BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 14 Computer System Fundamental LESSON 11 INTRODUCTION TO ARTIFICIAL INTELLIGENCE TRANSPARENCY NO SA-11.1 SA-11.2 SA-11.3 SA-11.4 SA-11.5 SA-11.6 SA-11.7 SA-11.8 SA-11.9 SA-11.10 SA-11.11 SA-11.12 SA-11.13 TITLE LESSON 11 LESSON OVERVIEW DEFINITION: ARTIFICIAL INTELLIGENCE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AI BRANCHES KNOWLEDGE BASES AND DATABASES KNOWLEDGE BASES AND DATABASES KNOWLEDGE BASES AND DATABASES SEMANTIC NETWORKS SEMANTIC NETWORKS SEMANTIC NETWORKS KNOWLEDGE REPRESENTATION METHODS RULE LECTURER TO NOTE THE LECTURER CAN STRESS ON THE IMPORTANCE OF AI IN OUR LIVES. THE LECTURER SHOULD DESCRIBE SOME APPLICATIONS OF AI THE LECTURER SHOULD ALSO DESCRIBE THE BRANCHES OF AI USING SOME EXAMPLES THE STUDENTS CAN BE ASKED TO DO FURTHER RESEARCH ON OTHER DATA STRUCTURES AS AN EXERCISE. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 15 Computer System Fundamental LESSON 12 EXPERT SYSTEMS TRANSPARENCY NO SA-12.1 SA-12.2 SA-12.3 SA-12.4 SA-12.5 SA-12.6 SA-12.7 SA-12.8 SA-12.9 SA-12.10 SA-12.11 SA-12.12 SA-12.13 TITLE LESSON 12 LESSON OVERVIEW WHAT IS AN EXPERT SYSTEM? WHAT IS AN EXPERT SYSTEM? WHAT IS AN EXPERT SYSTEM? SOME OF THE COMMON CHARACTERISTIC OF EXPERT SYSTEMS MAJOR TYPES OF EXPERT SYSTEM TREE-BASED LOGIC TECHNIQUES USED BY EXPERT SYSTEMS RULE-BASED EXPERT SYSTEM RULE-BASED AND FRAME-BASED EXPERT SYSTEM AN EXPERT SYSTEM LIFE CYCLE PROBLEMS WITH EXPERT SYSTEMS LECTURER TO NOTE THE LECTURER SHOULD DESCRIBE SOME OF THE COMMOM CHARACTERISTICS OF AN EXPERT SYSTEMS THE LECTURER CAN DESCRIBE THE IMPORTANCE OF AND THE FEATURES OF EXPERT SYSTEMS AND HOW IT WORKS THE LECTURER CAN ALSO POINT OUT THE LIMITED ROLE OF EXPERT SYSTEMS THE LECTURER SHOULD DESCRIBE THE MAJOR TYPES OF INTERNET AND ALSO THEIR ADVANTAGES AND DISADVANTAGES THE LECTURER SHOULD POINT OUT AND DISSCUSS ON THE PROBLEMS THAT CONCERN WITH EXPERT SYSTEMS THE STUDENTS CAN BE ASKED TO DO FURTHER RESEARCH ON OTHER DATA STRUCTURES AS AN EXERCISE. BEFORE ENDING THE SESSION, THE LECTURER CAN DISCUSS SOME OF THE QUESTIONS FROM THE WORKBOOK AND ASSIGN OTHER QUESTIONS RELATED TO THE TOPIC AS HOMEWORK Copyright @ Genetic Computer School 2008 16 Computer System Fundamental