Executive Diploma in Business Management MODULE LEARNING GUIDE EDIT101 INFORMATION TECHNOLOGY SUPPORT FOR BUSINESS Version 1: May 2013 Olympia College ED 1. INTRODUCTION Computers are everywhere: at work, school, and at home. Many daily activities involve the use of or depend on information from a computer. People use all types and sizes of computers for numerous reasons and in various places. As technology continues to advance, computers are becoming more part of everyday life. Thus, many people believe that computer literacy is vital to success in today’s world. Computer literacy involves having knowledge and their uses. 2. AIMS The focus of this subject is to understand why computers are essential components in business and society and to present the most up to date technology in an ever changing discipline. This course provides students with the exercises and assignments that allow students to interact with computer and learn by actually using computer and World Wide Web. This subject also assists students in planning a career and getting certified in computer field. 3. OVERVIEW OF THE SYLLABUS: The module is organised into four major learning sections as outlined below: 3.1. SECTION 1: Introduction to computers, types of computers and components of computers. This section starts with introduction to basic computer concept, such as what is computer, how it works, and what makes it a powerful tool. You will learn types of computers and components of computers. 3.2. SECTION 2: Software: Operating System, Utility Program and Application Software. This section enables students to learn about a variety of stand-alone operating systems, network operating systems. Students will be introduced to a variety of business software, graphics and multimedia software, home/personal/education software and communication software. 3.3. SECTION 3: Databases and management In this section, students will learn the advantages of organizing data in database and describe various types of data. 3.4. SECTION 4: Communication and networks, Internet and World Wide Web. This section will enable student to learn about communications technology and applications, Internet, World Wide Web, browsers, email, FTP and instant messaging. 3.5. SECTION 5: Computers and society In this section, students will learn about computer and Internet risk, ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, information privacy, and computer related issues. 4. LEARNING OUTCOMES On completion of this module, students will be able to: Understand what is computer and how it is used. Understand components of computer, types of computers with the latest technology. Mod Learning Guide: IT Support For Business 2 Olympia College ED Understand the software of computers including system software and application software. Understand the Internet, how to use it, and World Wide Web. Understand how to use computers in society. 5. AUDIENCE AND PRE-REQUISITES This module is for students who are in the basic stages of the Diploma program. No prerequisite required to undertake this module. 6. LEARNING MATERIALS: Indicative Readings: a. Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. b. Brian K. Williams, Stacy C. Sawyer, Using Information Technology, A practical Introduction to Computers & Communications, Complete Version, Six Editions, McGraw Hill. 7. ASSESSMENT INSTRUMENTS: The following is an outline of the various assessment instruments for this module: 7.1. ASSIGNMENT (45%) An individual assignment will be given to the student on the first week and will have to be returned on a date to be announced. PRESENTATION (15%) The students need to present their assignment in the form of a PowerPoint presentation or any other presentation tools. Marks will be awarded based on the quality of the presentation, language etc 7.2. FINAL EXAMINATION (40%) Final Examination is included in this module. It seeks to determine participants’ individual effectiveness in responding to specific questions under time-constrained invigilated conditions. The examination is a closed book examination, requesting participants to demonstrate their knowledge and critical analysis skills in responding to questions covering the module syllabus. 7.3. ASSESSMENT TIMELINES The coursework assignment is to be distributed to students by the end of Week 1 and its submission deadline is no later than week 5 ASSESSMENT CRITERIA Mod Learning Guide: IT Support For Business 3 Olympia College ED Refer to assignment and final examination marking guide. 7.4. ASSESSMENT DESCRIPTOR The following general principles should be used when marking and awarding grade: Grade Characteristics Above 70% 60-69% 50-59% 40-49% < 40% Excellent work which demonstrates that the student: Possesses an authoritative grasp of the concepts, methodology and content appropriate to the subject and to the assessment Selects and organises material with consistent success at an exceptionally high stage Is able to display originality and personal insight and is capable of expressing their argument clearly, concisely and accurately. The student demonstrates: An above average stage of understanding, organising, interpretation and a clear grasp of methodology suitable focused on the topic An ability to synthesise material and to construct responses which reveal insight and may offer originality A grasp of material that enables a coherent response to the assessment task to emerge An ability to generate work that is accurate and appropriately organised. The student is able to cover basic subject matter but in a relatively unimaginative and pedestrian manner. Organisation and presentation of material is acceptable but may display some weakness. Limitations in understanding and interpretation and difficulty in linking to relevant material may be evident. The student’s performance is only just acceptable in most respects revealing some inadequacies in the grasp of material, weak organising ability and limited communication skills. The student’s performance is deficient revealing inadequate grasp of material, poor organising ability and poorly developed communication skills. 8. INSTRUCTIONAL PLAN AND RESOURCES The base source of material to be used in the design of the teaching-learning schedule will be the print based module material provided to both staff and students. Other resources will be included to supplement and fill in gaps especially latest development or recent changes, which are obviously not found in the module material. Mod Learning Guide: IT Support For Business 4 Olympia College ED CLASS LEARNING SCHEDULE WEEK LECTURE 1 TUTORIALS / ACTIVITIES Introduction to Computers 2 Operating System Utility programs. and 3 Application software Discussion on the following topics: What is computer? Why is computer literacy important? What are the components of computer? Categories of computer, element of information system. Exercises on chapter 1 (page 43-45) Access internet to learn online, visit scsite.com/dc2007/ch1/learn Discussion on the following topics: Introduction System software Discussion on operating systems and functions of operating systems, such as managing program, managing memory and others. Types of operating systems. Operating system utility programs. Introduction to network operating systems. Exercises on chapter 8 (page 435-437) Access internet to learn online, visit scsite.com/dc2007/ch8/learn Discussion on the following topics: Introduction to application software and role of application software. Business software such as word processing, spreadsheet software, database software, presentation software. Graphics and multimedia software. Educational and reference software. Exercises on chapter 3 (page 173-175) Access internet to learn online, visit scsite.com/dc2007/ch3/learn Mod Learning Guide: IT Support For Business 5 Olympia College ED 4 Database management 5 Communication networks and 6 The Internet and World Wide Web. Mod Learning Guide: IT Support For Business Discussion on the following topics: Introduction to database, data and information Discussion on hierarchy of data Maintaining of data. Discuss difference between file processing and databases. Database management system. Discussion on relational database, object oriented database, and multidimensional database. Exercises on chapter 10 (page 545-547) Access internet to learn online, visit scsite.com/dc2007/ch10/learn Discussion on the following topics: Introduction to communications and uses of computer communications. Introduction what is networks and example such as LAN, MAN and WAN. Discuss on network topology and network architecture. Network communications standards. Communications over telephone network. Communication devices. Physical transmissions media. Exercises on chapter 9 (page 503-505) Access internet to learn online, visit scsite.com/dc2007/ch9/learn Discussion on the following topics: Introduction to Internet and history of the Internet. How the Internet works. Discuss on the World Wide Web. Discussion on email, FTP, chat rooms and instant messaging, Internet telephony, ecommerce. Exercises on chapter 2 (page 107-109) Access internet to learn online, visit scsite.com/dc2007/ch2/learn 6 Olympia College 7 ED Computers and society Mod Learning Guide: IT Support For Business Discussion on the following topics: Computers security risks Internet and network attacks. Unauthorized access and use. Hardware theft and vandalism Information theft and system failure. Ethics and society Information privacy. Health concern of computer use. Exercises on chapter 11 (page 597-599) Access internet to learn online, visit scsite.com/dc2007/ch11/learn 7 Olympia College ED TEACHING SUGGESTIONS AND GUIDELINES WEEK 1 Over the week of lecture and tutorial, the focus will be to undertake the following: What is computer? Why is computer literacy important? What are the components of computer? Categories of computer, element of information system. Learning outcomes to attain: Define the term, computer Recognize the importance of computer literacy. Identify the components of computers. Describe the categories of computers. Identify the elements of information systems. Discuss the various computer applications in society. Readings and preparation to be undertaken by the lecturer: a. Page 4 - 37 from the Main reference text. b. Main reference text namely: Shelly Cashman Vermaat, Discovering Computers 2007 A Gateway to Information, Thomson Course Technology. c. Visit the following websites for better understanding and study aids scsite.com/dc2012/ch1/learn WEEK 2 Over the week of lecture and tutorial, the focus will be to undertake the following: Introduction System software Discussion on operating systems and functions of operating systems, such as managing program, managing memory and others. Types of operating systems. Operating system utility programs. Introduction to network operating systems. Learning outcomes to attain: Identify the types of system software. Describe the functions of operating systems. Explain the purpose of the utilities included with most operating systems. Mod Learning Guide: IT Support For Business 8 Olympia College ED Summarize the features of several stand-alone operating systems. Identify various network operating systems. Readings and preparation to be undertaken by the lecturer: a. Page 398 - 429 from the Main reference text. b. Main reference text namely: Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. WEEK 3 Over the week of lecture and tutorial, the focus will be to undertake the following: Introduction to application software and role of application software. Business software such as word processing, spreadsheet software, database software, presentation software. Graphics and multimedia software. Education and reference software. Learning outcomes to attain: Identify the categories of applications software. Explain ways software is distributed. Identify the key features of widely used business software. Identify the key features of widely use graphics and multimedia programs. Identify the key features of widely used home, personal and educational programs. Readings and preparation to be undertaken by the lecturer: a. Page 134 - 167 from the Main reference text. b. Main reference text namely: Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. WEEK 4 Over the week of lecture and tutorial, the focus will be to undertake the following: Mod Learning Guide: IT Support For Business 9 Olympia College ED Introduction to database, data and information Discussion on hierarchy of data Maintaining of data. Discuss difference between file processing and databases. Database management system. Discussion on relational database, object oriented database, and multidimensional database. Learning outcomes to attain: Define the term, database Identify the qualities of valuable information Discuss the term characters, field, record and file. Identify the maintenance techniques. Differentiate between a file processing system vs. database approach. Describe the characteristic of relational, object oriented and multidimensional database. Readings and preparation to be undertaken by the lecturer: a. Page 514 - 539 from the Main reference text. b. Main reference text namely: Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. Visit the following websites for better understanding and study aids scsite.com/dc2012/ch11/learn WEEK 5 1. Over the week of lecture and tutorial, the focus will be to undertake the following: Discussion on the following topics: Introduction to communications and uses of computer communications. Introduction to what is networks and example such as LAN, MAN and WAN. Discuss on network topology and network architecture. Network communications standards. Communications over telephone network. Communication devices. Physical transmissions media 2. Learning outcomes to attain: Discuss the components required for successful communications Mod Learning Guide: IT Support For Business 10 Olympia College 3. ED Identify the various sending and receiving device Describe uses of computer communications List advantages of using network Differentiate among client/server, peer to peer, and P2P networks. Describe the various network communication standards. Describe commonly used communication devices. Identify various physical and wireless transmission media. Readings and preparation to be undertaken by the lecturer: a. Page 460 - 497 from the Main reference text. b. Main reference text namely: Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. c. Conduct all activities as found in the module materials. Conduct the chapter test on the completion of the classes. d. Assign further readings and activities to students based on the main reference text or activities from the module materials. WEEK 6 Over the week of lecture and tutorial, the focus will be to undertake the following: Introduction to Internet and history of the Internet. How the Internet works. Discuss on the World Wide Web. Discussion on email, FTP, chat rooms and instant messaging, Internet telephony, ecommerce. Learning outcomes to attain: Discuss the history of Internet Explain how to connect and access Internet. Analyse an IP address Describe types of website Recognize how web pages use graphics, animation, audio, video, virtual reality and plug-in. Explain how email, FTP, newsgroup and message board, mailing list, instant messaging, and Internet telephony work. Readings and preparation to be undertaken by the lecturer: a. Page 68 - 101 from the Main reference text. b. Main reference text namely: Mod Learning Guide: IT Support For Business 11 Olympia College ED Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. Visit the following websites for better understanding and study aids scsite.com/dc2012/ch11/learn WEEK 7 Over the week of lecture and tutorial, the focus will be to undertake the following: Computers security risks Internet and network attacks. Unauthorized access and use. Hardware theft and vandalism Information theft and system failure. Ethics and society Information privacy. Health concern of computer use Learning outcomes to attain: Describe the types of computer security risk Identify ways to safeguard against computer viruses, Trojan horses, denial of services attack, back doors, spoofing Discuss the techniques to prevent an authorized computer access and use. Identify safeguard against hardware theft and vandalism. Define encryption and explain why it necessary. Discuss issues surrounding information privacy. Discuss ways to prevent health related disorders and injuries due to computer use. Readings and preparation to be undertaken by the lecturer: a. Page 556 - 591 from the Main reference text. b. Main reference text namely: Shelly Cashman Vermaat, Discovering Computers 2012 A Gateway to Information, Thomson Course Technology. Visit the following websites for better understanding and study aids scsite.com/dc2012/ch11/learn Mod Learning Guide: IT Support For Business 12