Business Administration_COMC100: Computer Fundamentals
About Course
Upon completion of this course, students will be able to efficiently manage their computer desktop, and files located locally, across a network, and in the Cloud and have a basic understanding of the structure of the Internet, directory hierarchies, storage devices, and file security.
Course Content
Module I
-
00:00
-
00:00
-
LO2: Explain different types of Input and Output devices, and analyze their functions and usability
00:00 -
LO3: Explain how data is transformed and manipulated during Information Processing
00:00 -
LO4: Knowledge Check
-
Case Study: Digital Device Components and Configuration
-
00:00
-
00:00
-
LO2: Define and classify the Memory
00:00 -
LO3: Differentiate between Primary and Secondary Memory
00:00 -
LO4: Differentiate between Random Access Memory and Read-Only Memory
00:00 -
LO4: Knowledge Check
-
Case Study: Memory and Storage
-
00:00
-
00:00
-
LO2: Explain Wide Area Network and write its merits and limitations
00:00 -
LO3: Discuss Cloud-based Networks and write their advantages
00:00 -
LO4: Knowledge Check
-
Case Study: Local, Wide, and Cloud-Based Networks
-
Topic 4: Directory Structure, File Hierarchies, and File Naming Conventions
00:00 -
LO1: Describe the Root Directory Structure and its significance
00:00 -
LO2: Differentiate between relative and absolute paths
00:00 -
LO3: Explain the names accessibility and searchability of File Naming Conventions
00:00 -
LO4: Knowledge Check
-
Case Study: Directory Structure, File Hierarchies, and File Naming Conventions
-
Topic 5: Storage Devices and Applications
00:00 -
LO1: Explain the Cloud Storage Management with their benefits
00:00 -
LO2: Describe the Backup and Recovery strategies
00:00 -
LO3: Define the optimization of applications with merits
00:00 -
LO4: Knowledge Check
-
Case Study: Storage Devices and Applications
-
Topic 6: Application Installation, Configuration, and Management
00:00 -
LO1: Describe the requirements for Installation of Applications
00:00 -
LO2: Explain the role of Configuration Files in Application settings
00:00 -
LO3: Define the Accessing and Managing Applications
00:00 -
LO4: Knowledge Check
-
Case Study: Application Installation, Configuration, and Management
-
Topic 7: File Creation, Saving, Copying, Deleting, and Management
00:00 -
LO1: Describe how to create, save, and copy the file
00:00 -
LO2: Define the Data Protection and its benefits
00:00 -
LO3: Explain how to manage the process of Copying and Deleting applications
00:00 -
LO4: Knowledge Check
-
Case Study: File Creation, Saving, Copying, Deleting, and Management
-
Topic 8: File, Network, and Cloud Security Issues
00:00 -
LO1: Identify and explain common Threat Agents in Cloud Environments
00:00 -
LO2: Define Cloud Security Principles of Confidentiality, Integrity, Authenticity, and Availability
00:00 -
LO3: Describe the relationship between Threats, Vulnerabilities, and Risks in Cloud Environments
00:00 -
LO4: Describe how a Security Policy Framework addressing key Cloud Security Principles
00:00 -
LO4: Knowledge Check
-
Case Study: File, Network, and Cloud Security Issues
-
Topic 9: Social Media Purposes and Evolution
00:00 -
LO1: Identify the Primary Purposes of Social Media
00:00 -
LO2: List and explain various Social Media Tools and their applications in Professional Networking
00:00 -
LO3: Explain how to create and manage Business-related Social Media content
00:00 -
LO4: Demonstrate effective use of Social Media tools to enhance Professional Presence
00:00 -
LO4: Knowledge Check
-
Case Study: Social Media Purposes and Evolution
-
Module Based Quiz