-
Topic 1: Digital device components and configuration
00:00
-
03:45
-
04:04
-
04:04
-
LO4: Knowledge Check
-
Case Study: Digital device components and configuration
-
Topic 2: Memory and Storage
00:00
-
LO1: Define and classify the Memory
04:08
-
LO2: Differentiate between primary and secondary Memory
04:25
-
LO3: Differentiate between RAM and ROM
04:09
-
LO4: Knowledge Check
-
Case Study: Memory and Storage
-
Topic 3: Local, wide, and Cloud-based networks
00:00
-
LO1: Describe LAN and write its advantages and limitations
00:00
-
LO2: Explain WAN and write its merits and limitations
04:38
-
LO3: Discuss Cloud-based networks and write their advantages
05:09
-
LO4: Knowledge Check
-
Case Study: Local, wide, and Cloud-based networks
-
Topic 4: Directory structure, file hierarchies, file naming conventions
00:00
-
LO1: Describe the root directory structure and its significance
02:31
-
LO2: Differentiate between relative and absolute paths
00:00
-
LO3: Explain the names accessibility and searchability of file naming conventions
00:00
-
LO4: Knowledge Check
-
Topic 5: Storage devices and applications
00:00
-
LO1: Explain the Cloud storage management with their benefits
00:00
-
LO2: Describe the backup and recovery strategies
00:00
-
LO4: Knowledge Check
-
LO3: Define the optimization of applications with merits
00:00
-
Case Study: Directory structure, file hierarchies, file naming conventions
-
Case Study: Storage devices and applications
-
Topic 6: Effective Application Installation, Configuration, and Management
00:00
-
LO1: Describe the requirements of Installation of Applications
00:00
-
LO2: Explain the role of Configuration files in Application settings
00:00
-
LO3: Define the Accessing and Managing Applications
00:00
-
LO4: Knowledge Check
-
Case Study: Effective Application Installation, Configuration, and Management
-
Topic 7: File Creation, Saving, Copying, Deleting, and Management
00:00
-
LO1: Describe the creating and formatting of applications
00:00
-
LO2: Define the data protection and its benefits
00:00
-
LO3: Explain the managing process of Copy and Delete with applications
00:00
-
LO4: Knowledge Check
-
Case Study: File Creation, Saving, Copying, Deleting, and Management
-
Topic 8: File, network, and Cloud security issues and effective information practices
00:00
-
LO1: Describe the common threats to file security
00:00
-
LO2: Recognize the unique security challenges associated with cloud computing
00:00
-
LO3: Define the components of an effective information security policy
00:00
-
LO4: Knowledge Check
-
Case Study: File, Network, and Cloud Security issues and effective information practices
-
Topic 9: Social media purposes, evolution, and best practices Introduction
00:00
-
LO1: Identify the Primary Purposes of Social Media
00:00
-
LO2: Discuss the origins and development of social media
04:37
-
LO3: Explain the Effective Social Media Strategies
00:00
-
LO4: Knowledge Check
-
Case Study: Social media purposes, evolution and best practices Introduction
-
Module Based Quiz