Business Administration Program_COMC100: Computer Fundamentals (Professional)
About Course
Upon completion of this course students will be able to efficiently manage their computer desktop, files located locally, across a network and in the Cloud and have a basic understanding of the structure of the Internet, directory hierarchies, storage devices, and file security.
Course Content
Module 1
-
Topic 1: Digital device components and configuration
00:00 -
03:45
-
04:04
-
04:04
-
LO4: Knowledge Check
-
Topic 2: Memory and Storage
00:00 -
LO1: Define and classify the Memory
04:08 -
LO2: Differentiate between primary and secondary Memory
04:25 -
LO3: Differentiate between RAM and ROM
04:09 -
LO4: Knowledge Check
-
Topic 3: Local, wide, and Cloud-based networks
00:00 -
LO1: Describe LAN and write its advantages and limitations
00:00 -
LO2: Explain WAN and write its merits and limitations
04:38 -
LO3: Discuss Cloud-based networks and write their advantages
05:09 -
LO4: Knowledge Check
-
Topic 4: Directory structure, file hierarchies, file naming conventions
00:00 -
LO1: Describe the root directory structure and its significance
02:31 -
LO2: Differentiate between relative and absolute paths
00:00 -
LO3: Explain the names accessibility and searchability of file naming conventions
00:00 -
LO4: Knowledge Check
-
Topic 5: Storage devices and applications
00:00 -
LO1: Explain the Cloud storage management with their benefits
00:00 -
LO2: Describe the backup and recovery strategies
00:00 -
LO3: Define the optimization of applications with merits
00:00 -
LO4: Knowledge Check
-
Topic 6: Effective Application Installation, Configuration, and Management
00:00 -
LO1: Describe the requirements of Installation of Applications
00:00 -
LO2: Explain the role of Configuration files in Application settings
00:00 -
LO3: Define the Accessing and Managing Applications
00:00 -
LO4: Knowledge Check
-
Topic 7: File Creation, Saving, Copying, Deleting, and Management
00:00 -
LO1: Describe the creating and formatting of applications
00:00 -
LO2: Define the data protection and its benefits
00:00 -
LO3: Explain the managing process of Copy and Delete with applications
00:00 -
LO4: Knowledge Check
-
Topic 8: File, network, and Cloud security issues and effective information practices
00:00 -
LO1: Describe the common threats to file security
00:00 -
LO2: Recognize the unique security challenges associated with cloud computing
00:00 -
LO3: Define the components of an effective information security policy
00:00 -
LO4: Knowledge Check
-
Topic 9: Social media purposes, evolution, and best practices Introduction
00:00 -
LO1: Identify the Primary Purposes of Social Media
00:00 -
LO2: Discuss the origins and development of social media
04:37 -
LO3: Explain the Effective Social Media Strategies
00:00 -
LO4: Knowledge Check
-
Module Based Quiz