CS-1105 Introduction To ICT Handbook by Mehtab Mushtaq
CS-1105 Introduction To ICT Handbook by Mehtab Mushtaq
COURSE HANDBOOK
1. Course Title Introduction to Information and Communication
Technologies.
2. Course Code CS-1105
3. Credit Hours 3 (2+1)
4. Semester Semester Ist, Fall-2021
5. Resource Person Mehtab Mushtaq
6. Supporting Team Members None
7. Contact Hours (Theory) 3 hours per week
8. Contact Hours (Lab) 3 hours per week
9. Office Hours Wed-Thu 8:30 am to 10:00 am
10. Course Introduction
This course is designed to help students to become competent and confident users who
can use the basic knowledge and skills acquired to assist them in their daily lives. It is
also supposed to prepare students for the world of tomorrow. It aims to help learners to
have an open and flexible mind. This will help them to adjust to the inevitable future
changes. One example is the integration of ICT across the curriculum. At a very young
age, children are introducted to basic programming, modelling and software applications
to create appreciation of technology in everyday life.
11. Learning Objectives
After completing this course the students will be able to
Observe the rules and guidelines relating to data communication across networks,
including the Internet.
Demonstrate responsibility for personal information and safety, while using
technology.
Understand basic functions of computer hardware and software components
including operating system functions.
Understand computer viruses, biometric devices, encryption technique, digital
signature, email filtering, firewall, and precautions on Web.
Use different application programs like word processing, spreadsheet,
presentation, and database management systems.
12. Course Contents
Basic Definitions & Concepts, Hardware: Computer Systems & Components. Storage
Devices, Number Systems, Software: Operating Systems, Programming and Application
Software, Introduction to Programming, Databases and Information Systems, Networks,
Data Communication, The Internet, Browsers and Search Engines, The Internet: Email,
Page # 1/5
Collaborative Computing and Social Networking, The Internet: E-Commerce, IT Security
and other issues,
13. Lecture/Lab Schedule
Weeks Topic of Lecture Reading Assignment
Week 1 Introduction To Information And Communication Book+ Lecture Notes
Technology (Ict)
Evolution Of Communication
What Is Ict?
Information
Communication
Technology
Technology Timeline.
Evolution Of Computers
Computer Generations
Week 2 Usage Of Ict In Daily Life Book+ Lecture Notes
Education
Banking
Industry
E-Commerce
Other Sector
Computerised And Non-Computerised Systems
Week 3 The Impact Of Ict On Society Book+ Lecture Notes
Faster Communication Speed
Lower Communication Cost
Reliable Mode Of Communication
Effective Sharing Of Information
Paperless Environment
Borderless Communication
Social Problems
Health Problems
Computer Ethics
Week 4 The Differences Between Ethics And Law Book+ Lecture Notes
Why Do We Need Ethics And Law In
Computing?
Unethical Vs. Law Breaking Conducts
Intellectual Property Rights
Inventions Protected By Intellectual Property
Laws
Intellectual Property Protection
Week 5 Privacy In Computer Usage Book+ Lecture Notes
Ways Computer Technology Th Reaten
Our Privacy
Why Do We Need Privacy?
Can Privacy Be Protected?
Authentications
Page # 2/5
Methods Of Authentication
Biometric Devices
Why Is Authentication Important?
Week 6 Verifications Book+ Lecture Notes
Methods Of Verification
Controversial Content
Issues On Controversial Contents
Impacts On Malaysian Society
Week 7 The Process Of Internet Filtering Book+ Lecture Notes
Controlling Access To The Internet
CYBER LAW
Needs For Cyber Law
The Cyber Law Acts In Malaysia
Week 8 COMPUTER CRIMES Book+ Lecture Notes
Computer Fraud
Copyright Infringement
Computer Theft
Computer Attack
COMPUTER SECURITY
Types Of Computer Security
Week 9 Introduction Computer Threats Book+ Lecture Notes
Malicious Code
Natural And Environmental Threats
Theft
Security Measures
Quizzes 20%
Assignments 40%
Attendance & Participation 10%
Terminal Examination 30%
The minimum pass marks for each course shall be 50%. Students obtaining less than 50% marks
in any course shall be deemed to have failed in that course. The correspondence between letter
grades, credit points, and percentage marks at UOKAJK shall be as follows:
Page # 4/5
F (Failing) 0.0 Less than 50
15. Assessment Schedule
Week 3 Quiz-1
Week 1-4 Assignment-1
Week 6 Quiz-2
Week 5-7 Assignment-2
Week 11 Quiz-3
Week 9-12 Assignment-3
Week 15 Quiz-4
Week 13-16 Assignment-4
16. Format of Assignment
Unless otherwise stated, all the assignments should be hand written, with typed front page
according to following format.
Roll # :_____________
Name : _____________
Course Title : _________
Class : __________
Session: __________
Assignment # : _______
Submitted to : _________
Date : ___________
(Font size 12, Times New Roman)
17. Text Book 1. Introduction to Computers 6th International
Edition, Peter, N. McGraw-Hill
18. Reference Books 2. Using Information Technology: A Practical
Introduction to Computer & Communications,
6th Edition. Williams, S. McGraw-Hills.
3. Computers, Communications & information: A
user's introduction, Sarah, E. Hutchinson. Stacey,
C. Swayer.
4. Fundamentals of Information Technology,
Alexis L Mathewsleon Leon Press.
19. Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work, usually in coursework, and
passing it off as if it were one’s own. Many students who submit apparently plagiarised work
probably do so inadvertently without realising it because of poorly developed study skills,
including note taking, referencing and citations; this is poor academic practice rather than
malpractice. Study skills education within programmes of study should minimise the number of
students submitting poorly referenced work. However, some students plagiarise deliberately, with
the intent to deceive. This intentional malpractice is a conscious, pre-mediated form of cheating
and is regarded as a particularly serious breach of the core values of academic integrity.
Page # 6/5