Académique Documents
Professionnel Documents
Culture Documents
At the end of the course, the students are expected to achieve the following:
1) Acquire comprehension on the most up-to-date technology in an ever-changing discipline, the
information technology;
2) Attain higher level of competency in the use of IT resources with various applications;
3) Obtain understanding and appreciation on the importance of computers and their applications in
most, if not all, areas in the society.
4) Be equipped with appropriate knowledge in C++ computer programming to organize their thoughts
and structure the programs well.
10 hrs
1. Discuss the history of the internet II. The Internet and the World Wide Web
2. Explain how to access and connect to the a) The Internet
internet b) The History of the Internet
3. Design an IP address c) How the Internet Works
4. Identify the components of a Web address d) The World Wide Web
5. Explain the Purpose of Web browser e) E-Commerce
6. Demonstrate how to search for information on f) Other Internet Services
the Web g) Netiquette
7. Describe the type of Web sites
8. Recognize how web pages use graphics,
animation, audio, video, virtual reality, and plug- LABORATORY : Keyboarding; Internet
ins Applications & Services
9. Identify the steps required for Web publishing a) Getting acquainted with proper use of
10. Describe the types of e-commerce keyboard
11. Explain how e-mail, FTP, newsgroups and b) Creating e-mail accounts (ex. yahoo, gmail,
message boards, mailing lists, chat rooms, hotmail, etc).
instant messaging, and Internet telephony work c) Social Networking & Creating Accounts
12. Identify the rules of netiquette d) Attaching files to e-mails
e) Web browsers & Search Engines
f) Searching & Filtering
4hrs 1. Differentiate among various styles of system IV. The Components of the System Unit
units a) The System Unit
2. Identify chips, adapter, cards, and other b) Processor
components of a motherboard c) Data Representation
3. Describe the components of a processor and d) Memory
how they complete a machine cycle e) Expansion and Adapter Cards
4. Identify characteristics of various personal f) Ports and Connectors
computer processors on the market today g) Buses
5. Define a bit and describe how a series of nits h) Bays
represents data i) Power Supply
6. Explain how programs transfer in and out of j) Mobile Computers and Devices
memory
7. Differentiate among the various types of memory
8. Describe the types of expansion slots and
adapter cards
9. Explain the differences among a serial port, a
parallel port, and other ports
10. Describe how buses contribute to a computer’s
processing speed
11. Identify components in mobile computers and
mobile devices
12. Understand how to clean a system unit
2 hrs 1. Differentiate between storage devices and V. Storage
storage media a) Storage
2. Describe the characteristics of magnetic disks b) Magnetic Disks
3. Describe the characteristics of a hard disk c) Optical Disks
4. Discuss various types of miniature, external, and d) Tape
removable hard disks e) PC Cards and Express Cards
5. Describe the characteristics of optical discs f) Miniature and Mobile Storage Media
6. Differentiate among CD-ROMs, recordable CDs, g) Microfilm and Microfiche
Page 3 of 6
rewritable CDs, DVD-ROMs, recordable DVDs, h) Enterprise Storage
and rewritable DVDs
7. Identify the uses of tape
8. Discuss PC Cards, ExpressCard modules, and
the various types of miniature mobile storage
media
9. Identify uses of microfiche
6 hrs 1. Discuss the various applications of MS Word LABORATORY : Electronic Word Processing
2. Identify the steps in creating and modifying using MS Word Application
documents a) Working with Documents
3. Explain how to customize and format a document b) Formatting a Document
4. Summarize the various techniques in creating c) Customizing a Document
tables and inserting graphics in your document d) Using Tables
e) Working with Graphics data in documents
4 hrs 1. Describe the types of computer security risks VI. Computer Security, ethics, and Privacy
2. Identify ways to safeguard against computer a) Computer Security Risks
viruses, worms, Trojan horses, botnets, denial of b) Internet and Network Attacks
services attacks, back doors, and spoofing c) Unauthorized Access and Use
3. Discuss techniques to prevent unauthorized d) Hardware Theft and Vandalism
computer access and use e) Software Theft
4. Identify safeguards against hardware theft and f) Information Theft
vandalism g) System Failure
5. Explain the ways software manufacturers protect h) Backing Up – The Ultimate Safeguard
against software piracy i) Wireless Security
6. Define encryption and explain why it is necessary j) Ethics and Society
7. Discuss the types of devices available that k) Health Concerns of Computer Use
protect computers from system failure
8. Explain the options available for backing up
computer resources
9. Identify risks and safeguards associated with
wireless communication
10. Recognize issues related to information
accuracy, rights, and conduct
11. Discuss issues surrounding information privacy
12. Discuss ways to prevent health-related
disorders and injuries due to computer use
Page 5 of 6
X. Course Requirements:
FINAL RATING:
(Prelim+Midterm+Final)/3
XIII. References:
Shelly, G. B., & Vermaat, M.E. (2011). Discovering Computers Fundamentals. Pasig City: Cengage Learning
Asia Pte Ltd (Phillippines Branch).
Williams, B.K. & Sawyer, S. (2010). Using Information Technology: A practical Introduction to Computers and
Communications (8th ed.). New York: The McGraw – Hill Companies, Inc.
Page 6 of 6