Business Administration_COMC100: Computer Fundamentals (Professional)
About Course
Upon completion of this course, students will be able to efficiently manage their computer desktop, and files located locally, across a network, and in the Cloud and have a basic understanding of the structure of the Internet, directory hierarchies, storage devices, and file security.
Course Content
Module I
-
03:41
-
23:10
-
LO2: Explain different types of Input and Output devices, and analyze their functions and usability
15:53 -
LO3: Explain how data is transformed and manipulated during Information Processing
06:32 -
LO4: Knowledge Check
-
04:01
-
15:16
-
LO2: Define and classify the Memory
17:37 -
LO3: Differentiate between Primary and Secondary Memory
15:01 -
LO4: Differentiate between Random Access Memory and Read-Only Memory
12:44 -
LO4: Knowledge Check
-
03:40
-
19:58
-
LO2: Explain Wide Area Network and write its merits and limitations
20:15 -
LO3: Discuss Cloud-based Networks and write their advantages
13:33 -
LO4: Knowledge Check
-
Topic 4: Directory Structure, File Hierarchies, and File Naming Conventions
03:37 -
LO1: Describe the Root Directory Structure and its significance
18:52 -
LO2: Differentiate between relative and absolute paths
13:14 -
LO3: Explain the names accessibility and searchability of File Naming Conventions
12:50 -
LO4: Knowledge Check
-
Topic 5: Storage Devices and Applications
03:26 -
LO1: Explain the Cloud Storage Management with their benefits
12:46 -
LO2: Describe the Backup and Recovery strategies
15:13 -
LO3: Define the optimization of applications with merits
12:41 -
LO4: Knowledge Check
-
Topic 6: Application Installation, Configuration, and Management
03:16 -
LO1: Describe the requirements for Installation of Applications
14:24 -
LO2: Explain the role of Configuration Files in Application settings
12:46 -
LO3: Define the Accessing and Managing Applications
13:21 -
LO4: Knowledge Check
-
Topic 7: File Creation, Saving, Copying, Deleting, and Management
03:16 -
LO1: Describe how to create, save, and copy the file
21:55 -
LO2: Define the Data Protection and its benefits
19:31 -
LO3: Explain how to manage the process of Copying and Deleting applications
19:57 -
LO4: Knowledge Check
-
Topic 8: File, Network, and Cloud Security Issues
04:03 -
LO1: Identify and explain common Threat Agents in Cloud Environments
12:57 -
LO2: Define Cloud Security Principles of Confidentiality, Integrity, Authenticity, and Availability
11:34 -
LO3: Describe the relationship between Threats, Vulnerabilities, and Risks in Cloud Environments
14:03 -
LO4: Describe how a Security Policy Framework addressing key Cloud Security Principles
11:42 -
LO4: Knowledge Check
-
Topic 9: Social Media Purposes and Evolution
03:48 -
LO1: Identify the Primary Purposes of Social Media
18:57 -
LO2: List and explain various Social Media Tools and their applications in Professional Networking
14:56 -
LO3: Explain how to create and manage Business-related Social Media content
08:14 -
LO4: Demonstrate effective use of Social Media tools to enhance Professional Presence
12:30 -
LO4: Knowledge Check
-
Module Based Quiz