0% found this document useful (0 votes)
121 views6 pages

CS-1105 Introduction To ICT Handbook by Mehtab Mushtaq

Uploaded by

mehtab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views6 pages

CS-1105 Introduction To ICT Handbook by Mehtab Mushtaq

Uploaded by

mehtab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

University of Kotli Azad Jammu and Kashmir

Faculty of Computing & Engineering


Department of Artificial Intelligence

COURSE HANDBOOK
1. Course Title Introduction to Information and Communication
Technologies.
2. Course Code CS-1105
3. Credit Hours 3 (2+1)
4. Semester Semester Ist, Fall-2021
5. Resource Person Mehtab Mushtaq
6. Supporting Team Members None
7. Contact Hours (Theory) 3 hours per week
8. Contact Hours (Lab) 3 hours per week
9. Office Hours Wed-Thu 8:30 am to 10:00 am
10. Course Introduction
This course is designed to help students to become competent and confident users who
can use the basic knowledge and skills acquired to assist them in their daily lives. It is
also supposed to prepare students for the world of tomorrow. It aims to help learners to
have an open and flexible mind. This will help them to adjust to the inevitable future
changes. One example is the integration of ICT across the curriculum. At a very young
age, children are introducted to basic programming, modelling and software applications
to create appreciation of technology in everyday life.
11. Learning Objectives
After completing this course the students will be able to
 Observe the rules and guidelines relating to data communication across networks,
including the Internet.
 Demonstrate responsibility for personal information and safety, while using
technology.
 Understand basic functions of computer hardware and software components
including operating system functions.
 Understand computer viruses, biometric devices, encryption technique, digital
signature, email filtering, firewall, and precautions on Web.
 Use different application programs like word processing, spreadsheet,
presentation, and database management systems.
12. Course Contents

Basic Definitions & Concepts, Hardware: Computer Systems & Components. Storage
Devices, Number Systems, Software: Operating Systems, Programming and Application
Software, Introduction to Programming, Databases and Information Systems, Networks,
Data Communication, The Internet, Browsers and Search Engines, The Internet: Email,

Page # 1/5
Collaborative Computing and Social Networking, The Internet: E-Commerce, IT Security
and other issues,
13. Lecture/Lab Schedule
Weeks Topic of Lecture Reading Assignment
Week 1  Introduction To Information And Communication Book+ Lecture Notes
Technology (Ict)
 Evolution Of Communication
 What Is Ict?
 Information
 Communication
 Technology
 Technology Timeline.
 Evolution Of Computers
 Computer Generations
Week 2  Usage Of Ict In Daily Life Book+ Lecture Notes
 Education
 Banking
 Industry
 E-Commerce
 Other Sector
 Computerised And Non-Computerised Systems
Week 3  The Impact Of Ict On Society Book+ Lecture Notes
 Faster Communication Speed
 Lower Communication Cost
 Reliable Mode Of Communication
 Effective Sharing Of Information
 Paperless Environment
 Borderless Communication
 Social Problems
 Health Problems
 Computer Ethics
Week 4  The Differences Between Ethics And Law Book+ Lecture Notes
 Why Do We Need Ethics And Law In
Computing?
 Unethical Vs. Law Breaking Conducts
 Intellectual Property Rights
 Inventions Protected By Intellectual Property
 Laws
 Intellectual Property Protection
Week 5  Privacy In Computer Usage Book+ Lecture Notes
 Ways Computer Technology Th Reaten
Our Privacy
 Why Do We Need Privacy?
 Can Privacy Be Protected?
 Authentications
Page # 2/5
 Methods Of Authentication
 Biometric Devices
 Why Is Authentication Important?
Week 6  Verifications Book+ Lecture Notes
 Methods Of Verification
 Controversial Content
 Issues On Controversial Contents
 Impacts On Malaysian Society
Week 7  The Process Of Internet Filtering Book+ Lecture Notes
 Controlling Access To The Internet
 CYBER LAW
 Needs For Cyber Law
 The Cyber Law Acts In Malaysia
Week 8 COMPUTER CRIMES Book+ Lecture Notes
 Computer Fraud
 Copyright Infringement
 Computer Theft
 Computer Attack
COMPUTER SECURITY
 Types Of Computer Security
Week 9  Introduction Computer Threats Book+ Lecture Notes
 Malicious Code
 Natural And Environmental Threats
 Theft
 Security Measures

Week 10  Relationship Between Security Threats And Book+ Lecture Notes


Security Measures
 Security Threats
 Malicious Code Threats Vs. Antivirus And
Antispyware
 Hacking Vs. Firewall
 Natural Disaster Vs. Data Backup
 Theft Vs. Human Aspects
 Security Procedures
 Data Protection Methods
 Detecting Illegal Access To Systems
 Preventing Illegal Access To Systems
 Preventing Illegal Root Acc Ess
Week 11  Computer Applications In The Society, Book+ Lecture Notes
 Software Applications,
 Software Applications Packages,
 Home And Education
Week 12  Computer Users Book+ Lecture Notes
 How To Conduct A Study
Week 13  Presenting Result Book+ Lecture Notes
 Delegation Of Work
Page # 3/5
 Why Delegate Tasks?
 What To Delegate?
 Examples Of Task Delegation
Week 14  Databases, Book+ Lecture Notes
 Data, and Information,
 The Hierarchy of Data,
 Maintaining Data,
 File Processing Versus Databases,
 Database Management Systems,
 Relational, Object-Oriented, and
Multidimensional Databases,
 Web DatabasesDatabase Administration
Week 15  Spreadsheets , Book+ Lecture Notes
 Using the Application,
 Working with Cells,
 WorkSheets, Formulas and Functions,
 Formatting
Week 16  Operating Systems, Book+ Lecture Notes
 Operating System Functions,
 Types of Operating Systems,
 Stand Alone Operating Systems,
 Server Operating Systems,
 Embeded Operating Systems,
 Utility Programs,
14. Course Assessment
The assessment of this module shall have following breakdown structure:

Quizzes 20%
Assignments 40%
Attendance & Participation 10%
Terminal Examination 30%

Cr. Assignments Quizzes Attendance and Terminal Lab Total


H (4) (2) Participation (2)
2+1 10*4 10*2 10 30 25*2 150

The minimum pass marks for each course shall be 50%. Students obtaining less than 50% marks
in any course shall be deemed to have failed in that course. The correspondence between letter
grades, credit points, and percentage marks at UOKAJK shall be as follows:

Grades Letter Grade Credit Points Percentage Marks

A+ 4.0 90 and above


( Excellent)
A 4.0 80-89
B+ 3.5 72-79
(Good)
B 3.0 65-71
C (Average) 2.0 50-64

Page # 4/5
F (Failing) 0.0 Less than 50
15. Assessment Schedule
Week 3 Quiz-1
Week 1-4 Assignment-1
Week 6 Quiz-2
Week 5-7 Assignment-2
Week 11 Quiz-3
Week 9-12 Assignment-3
Week 15 Quiz-4
Week 13-16 Assignment-4
16. Format of Assignment
Unless otherwise stated, all the assignments should be hand written, with typed front page
according to following format.
Roll # :_____________
Name : _____________
Course Title : _________
Class : __________
Session: __________
Assignment # : _______
Submitted to : _________
Date : ___________
(Font size 12, Times New Roman)
17. Text Book 1. Introduction to Computers 6th International
Edition, Peter, N. McGraw-Hill
18. Reference Books 2. Using Information Technology: A Practical
Introduction to Computer & Communications,
6th Edition. Williams, S. McGraw-Hills.
3. Computers, Communications & information: A
user's introduction, Sarah, E. Hutchinson. Stacey,
C. Swayer.
4. Fundamentals of Information Technology,
Alexis L Mathewsleon Leon Press.
19. Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work, usually in coursework, and
passing it off as if it were one’s own. Many students who submit apparently plagiarised work
probably do so inadvertently without realising it because of poorly developed study skills,
including note taking, referencing and citations; this is poor academic practice rather than
malpractice. Study skills education within programmes of study should minimise the number of
students submitting poorly referenced work. However, some students plagiarise deliberately, with
the intent to deceive. This intentional malpractice is a conscious, pre-mediated form of cheating
and is regarded as a particularly serious breach of the core values of academic integrity.

Plagiarism can include the following:


1. Collusion, where a piece of work prepared by a group is represented as if it were the
student’s own;
2. Commission or use of work by the student which is not his/her own and representing it as
if it were, e.g.:
Page # 5/5
a. Purchase of a paper from a commercial service, including internet sites, whether
pre-written or specially prepared for the student concerned
b. Submission of a paper written by another person, either by a fellow student or a
person who is not a member of the university;
3. Duplication (of one’s own work) of the same or almost identical work for more than one
module;
4. The act of copying or paraphrasing a paper from a source text, whether in manuscript,
printed or electronic form, without appropriate acknowledgement (this includes quoting
directly from another source with a reference but without quotation marks);
5. Submission of another student’s work, whether with or without that student’s knowledge
or consent;
6. Directly quoting from model solutions/answers made available in previous years;
7. Cheating in class tests, e.g.
a. When a candidate communicates, or attempts to communicate, with a fellow candidate
or individual who is neither an invigilator or member of staff
b. Copies, or attempts to copy from a fellow candidate
c. Attempts to introduce or consult during the examination any unauthorised printed or
written material, or electronic calculating, information storage device, mobile phones
or other communication device
d. Personates or allows himself or herself to be impersonated.
8. Fabrication of results occurs when a student claims to have carried out tests, experiments
or observations that have not taken place or presents results not supported by the evidence
with the object of obtaining an unfair advantage.
These definitions apply to work in whatever format it is presented, including written work,
online submissions, groupwork and oral presentations.
20. Attendance Policy
Every student must attend 80% of the lectures/presentation delivered in this course and 80% of
the practical/laboratory work prescribed for the respective courses. The students falling short of
required percentage of attendance of lectures/seminars/practical/laboratory work, etc., shall not
be allowed to appear in the terminal examination of this course and shall be treated as having
failed this course.
21. Field Trips/Case Studies/Seminars/Workshop
N.A.

Page # 6/5

You might also like