Вы находитесь на странице: 1из 4

Syllabus for Introduction to IT (CSE1010e)

1. IT and Computers
1.1 Hardware vs Software
1.2 Application software vs system software
1.3 What is an operating system? [CDIMP]
1.4 Name the types of computers supercomputer, mainframes, minicomputer, PCs
1.5 Evolution of computers: 8086, x86 (2-4), Pentium (I IV)
1.6 Evolution of OS: DOS, win 3.1, 95, 98, 98SE, millennium, 2000, XP, Vista, 7.
1.7 Benefits and drawbacks of IT
2. Stepping into the computer
2.1 Draw a block diagram of a computer system (components)
2.2 What is the fetch execution cycle?
2.3 Distinguish between the ALU and the CU
2.4 What is MHz and GHz?
2.5 Number systems: binary, octal, decimal, hexadecimal Conversion of bases.
2.6 What is a bit, byte, KB, MB, GB, TB, PB, EB, ZB, YB ? (kB)?
2.7 Differentiate between hyperthreading, dual core and 64-bit processors.
2.8 What is overclocking?
2.9 Describe the different types of memory (volatile and non-volatile).
2.10
Cache Memory speed and size, cache hit, cache miss, web cache.
2.11
Motherboards slots, ports, IDE, SATA, bus
2.12
BIOS, CMOS
2.13
What is flashing the BIOS?
3. Input and Output devices
3.1 The five types of mouse: mechanical, optical, trackball, cordless, foot
3.2 Touchscreen, lightpen, digitizer, scanner, barcode reader, wired gloves
3.3 Screen resolution, pixels, dot pitch
3.4 LCD vs CRT
3.5 Types of printers: dotmatrix, laser, inkjet mechanism, uses, adv & disadv
3.6 Plotters, speakers, projectors
4. Storage devices
4.1 Floppy, Hard disk, Magnetic tapes, Optical (CD R, RW,ROM; DVD), solid states (USB
pen, flash disks)
5. Programming
5.1 Programs and programming languages
5.2 Programming process specification, design, coding, testing, documentation,
maintenance.[SDCTDM]
5.3 Flowcharts, pseudocodes sequence, selection, loops
5.4 Example programming languages-Pascal, Fortran, C, Java, C++, VB, COBOL, BASIC
5.5 Program Testing syntax errors, logic errors, desk checking, sample data, beta
5.6 CASE, OOP
5.7 Generation of languages: machine, assembly, procedural, problem-oriented, natural
[MAPPN]
5.8 Compiler vs Interpreter
5.9 Semantics: grammatical rules for assigning meaning to a sentence
5.10
Syntax: grammatical rules for specifying correct word order
1

6. Systems Software
6.1 Systems vs Application software
6.2 Systems: OS, BIOS, Drivers, Utilities, Compilers, Translator, DBMS
6.3 Function of OS: process, memory, disk, i/o, communications management [CDIMP]
6.4 Buffering vs Spooling
6.5 Types of OS: single/multi user and/or single/multi tasks
6.6 Examples OS: Windows 2000, XP, Vista, 7; Linux, Mac OS, Red Hat, Ubuntu,
6.7 Booting process
6.8 POST (Power on Self Test)
7. Application Software
7.1 General Purpose: word, excel, databases, graphics
7.2 Special Purpose: tailor/custom made
7.3 What is an application suite? (Eg Microsoft Office Word, Excel, powerpoint, publisher)
7.4 Features of word/excel/powerpoint
7.5 Excel: rows, columns, cell, cell address, address box, active cell, IV/65 536, values,
labels, formulae, functions, what-if analysis, charts
7.6 Powerpoint: slide show, design, layout
7.7 DBMS: fields, records, tables, query
7.8 Example DBMS: Oracle, MySQL, Access, SQL Server, Sybase
7.9 Email: To, CC, BCC, Address book; Examples: Mail, Outlook, Opera, Eudora,
Thunderbird
7.10
Browsers Example: I.E, Mozilla firefox
7.11
Features: cookies, digital certificates, bookmarks, history, caching, pop-up
blocker
8. Systems Development
8.1 DFD-entity, process, file store
8.2 What is an information system: people, data, processes, communication and IT
8.3 Motivations for SAD: Problem, Opportunities, Directives
8.4 SDLC: Analysis, Design, Implementation, Testing, Maintenance (ADITM)
8.5 Preliminary, Detailed (Info gather-Interview, Questionnaires, Observ, Study Docs; Data
analysis)
8.6 Types of maintenance: Perfective, Adaptive, Corrective
9. Networks
9.1 Reasons for networks (Sharing data/hardware, reliability/availability, lower costs, better
information flow, new services email, video conf, e-commerce, chat.
9.2 Node, Server, client, protocol, topology, architecture, NIC, media
9.3 LAN, WAN, MAN (Advantages and Disadvantages)
9.4 Network OS- functions and examples
9.5 Peer to peer vs client-server
9.6 Types of servers print, file, web, mail, proxy, application
9.7 Cabling: twisted pair, coaxial, fibre optic
9.8 Topologies: bus, ring, mesh, star, tree (Advantages and Disadvantages)
9.9 Wireless networking: access point, IEEE802.11 standards (802.11b 2.4 GHz, 11 Mbps;
802.11a 5.8 GHz,54 Mbps; 802.11g 2.4 GHz, 54 Mbps)
9.10
Bluetooth 1 Mbps, 10m and Home RF 16 Mbps, 150 ft
2

9.11
Mobile Computing & Ecommerce (Mobility and Broad Reach) Ubiquity,
Convenience, Instant Connectivity, Personalisation and Localisation of products/services.
10. Internet
10.1
WWW vs Internet
10.2
Web server, web client, web site
10.3
URL, protocol, domain name, path, file
10.4
IP Address
10.5
Internet protocols: http, tcp/ip, https, ftp
10.6
Requirements to access the Internet: PC, modem, telephone line, ISP, Internet
software (Browser, Email client,..)
10.7
Web browsers, search engines: google, lycos, bing, yagoo
10.8
Uses of internet: communication., education, business, entertainment
10.9
Email, spam,chat, newsgroup, mailing lists, forums,newsletters, blogs, wikis
10.10
Plug-ins, cookies
11. Computer Security
11.1
Confidentiality, Integrity, Availability
11.2
Threats: DoS, Spoofing, Viruses, Worms, Trojan, theft, sabotage, fraud
11.3
Hackers, Crackers, Script Kiddies
11.4
Lifecycle of viruses: dormant, propagation, triggering, execution
11.5
Types of viruses: transient, memory resident, boot sector
11.6
Encryption, cryptography, cipher and plain text, Caesars cipher
11.7
Web security: firewalls
11.8
Social engineering - tricking, conning, or manipulating people into providing
information detrimental to a company, organization, or a person. Dumpster diving,
Impersonations.
11.9
Passwords (Strong, Shared, Multiple,...)
11.10
Security and law: data protection, computer misuse and cybercrime act, electronic
transaction act, copyright act.
12. Software Utilities
12.1
Public domain software: not copyrighted, free to use, sharable
12.2
Freeware: control, terms of usage, personal use, not commercial use, cost free
Postcardware: humanize the transaction
Donationware: optional payment
12.3
Shareware: try before decide to purchase, copyrighted, either register or uninstall
Crippleware: limited features until registration
Nagware: continuous popup screen to register
12.4
Malware, Adwares
12.5
Disk defragmenter, disk cleanup, data backup/restoration, compression tools,
download tools, antivirus/antispyware, multimedia tools: win media player, roxio,
quicktime, realone, nero
13. Issues and Trends in IT
13.1
Health issues: RSI
13.2
Eye strain, headache, Carpel Tunnel Syndrome, back and neck pain
13.3
Ergonomics
13.4
The 4 IT laws
13.5
Ethics: ACM, BCS, IEEE, CEI
13.6
Ten commandments of computer ethics
13.7
Wearable technology: micro sensors: clothes, watches, jewellery
3

13.8
MIThril, Charm badge, Musical jacket, grid computing, smartcards, biometrics,
telemedicine, virtual reality, IP TV, Digital libraries.

Вам также может понравиться