John Cabot University



JOHN CABOT UNIVERSITY?COURSE CODE:?"CS 101"?COURSE NAME:?"Introduction to Computer Science"?SEMESTER & YEAR:?Spring 2014INSTRUCTOR:?Stefano Gazziano?EMAIL:?sgazziano@johncabot.eduHOURS:?MW 4:30 PM 5:45 PM?TOTAL NO. OF CONTACT HOURS:?45?CREDITS:?3?PREREQUISITES:?OFFICE HOURS:COURSE AIMS:?The course introduces students to the modern, state-of-the-art Information Technology, and provides them the adequate skills in basic computer science to professionally use IT in the context of a traditional liberal arts education of critical thinking and problem-solving, and in a standard business environment.?Prospective students may question or comment on our FB page:? OF COURSE CONTENT:?Computers architecture and technologySoftware layers: operating systems and application softwareHow to trouble shoot basic issues on computers (plugging in laptops to overheads etc.) and? how to use a computer and do basic troubleshooting; how to move to another computerOrganizing and managing your own data: file systems and file/folder works architecture and protocols. Data storage and backup Local Area Network, Intranet, Internet?. Access to data at different locationsCloud computing: the new paradigm. ?Local application v/s cloud suitesIntroduction to Microsoft Office Package and how to use it. Ms Word. MS Excel. Power point Creating multimedia documents with advanced presentation tools (e.g. Prezi, Lucidpress) and copyright issues associated with digital sourcesProfessional? presentation of information and computer etiquetteSearching with Google or gathering information from the website; being aware of the standard sources of informationDatabases v/s Search Engines searchesUse of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end usersPrivacy and personal data protection on the Internet. Mobile computing, location based puter and network security : viruses, frauds, fishing, spoofing, scam, secure protocols, ?safe user behaviour.LEARNING OUTCOMES:?Students will understand how a computer works and will be able to trouble shoot basic issues. Students will learn?how data, documents ?and files are stored and retrieved at different locations: personal laptops, office PC, internet "cloud".?At the end of the course the student will possess the basic required skills to make a professional use of Information Technology in a standard modern business and college environment: writing clear, well formatted papers and presentations; use basic data manipulation; use the internet as a source of information and be able to assess its reliability; care of personal security issues.?TEXTBOOK:?NONEREQUIRED RESERVED READING:?NONERECOMMENDED RESERVED READING:?NONEGRADING POLICY?-ASSESSMENT METHODS:?AssignmentGuidelinesWeightMidterm?30Final exam?30Class testsMultiple choices tests or practical exercises will be scheduled and are an integral part of student assessment.30Class participationActive participation in class, contribution to teaching by sharing experiences, workgroup10-ASSESSMENT CRITERIA:?AWork of this quality directly addresses the question or problem raised and provides a coherent argument displaying an extensive knowledge of relevant information or content. This type of work demonstrates the ability to critically evaluate concepts and theory and has an element of novelty and originality. There is clear evidence of a significant amount of reading beyond that required for the courBThis is highly competent level of performance and directly addresses the question or problem raised.There is a demonstration of some ability to critically evaluatetheory and concepts and relate them to practice. Discussions reflect the student’s own arguments and are not simply a repetition of standard lecture andreference material. The work does not suffer from any major errors or omissions and provides evidence of reading beyond the required assignments.CThis is an acceptable level of performance and provides answers that are clear but limited, reflecting the information offered in the lectures and reference readings.DThis level of performances demonstrates that the student lacks a coherent grasp of the material.Important information is omitted and irrelevant points included.In effect, the student has barely done enough to persuade the instructor that s/he should not fail.FThis work fails to show any knowledge or understanding of the issues raised in the question. Most of the material in the answer is irrelevant.-ATTENDANCE REQUIREMENTS:?Attendance is mandatory. There is no textbook, and assigned readings must be read before classes.?Please refer to the university catalog?for the attendance and absence policy.ACADEMIC HONESTY?As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.STUDENTS WITH LEARNING OR OTHER DISABILITIESJohn Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.SCHEDULEdateClass contentsslidesHomeworkSyllabus section 13-genIntro Prof presentation Course goal: minimum qualifying standard of IT skills in studentsCourse requirements: none, this is for beginners, can be skipped by placement testProgram of classes, general rules in classComputers architecture and technology , history Moore's law Google spreadsheet user info practice Computers architecture and technology15-genHow to trouble shoot basic issues on computers (plugging in laptops to overheads etc.) and? how to use a computer and do basic troubleshooting; how to move to another computer, compressing file tools. Troubleshooting basicsPic of comp, pic pf back, explanations of ports and plugs in actual jcu pcTroubkeshootign: first things first, start or not start, screen or not, network ok nok.Not start / beepNot screen Not netOthers: common / ask the internetCommon: keyboard usage, language, output to overhead, volume, drivers what àre and how to install or detect issue. laptops correctly connectedHow to trouble shoot basic issues on computers (plugging in laptops to overheads etc.) and? how to use a computer and do basic troubleshooting; how to move to another computer 20-genSoftware Layers: operating systems and application software. Local applications.Software layers: operating systems and application software 22-genSoftware Layers, File systems, file and folder management. Network storage of data. Data storage, local, intranet, anizing and managing your own data: file systems and file/folder management. Networks architecture and protocols. Data storage and backup Local Area Network, Intranet, Internet?. Access to data at different locations27-genPersonal productivity software, cloud/local Cloud computing: the new paradigm. ?Local application v/s cloud suites29 gen Google drive, Dropbox, Icloud 03-febMS Office intro. Word 1Introduction to Microsoft Office Package and how to use it. Ms Word 05-febMS Word 2 – Class exercise10-febExcel 1Formulas – functionsMS Excel.12-febExcel 2 - Class exercise17-febOther personal productivity software: image, FTP, ZIP19-febPowerpointPowerpoint presentation on Bhutan tourism Publishing and editing Power point presentations. 24-febPowerpoint presentation rules, pp basics26 feb Powerpoint - presentation and speech rules - presentation Prezi Professional? presentation of information and computer etiquette3 marRecap and midterm rehearsal5 marMidterm10 marIntro servers and client – First web pageFirst personal web page How the Web works: servers and browsers. Introduction to Web design: how to create a web site to express ideas graphically, writing for the web.12 mar24-marIntro to DB Databases and Multimedia26-mar31-mar of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end users2 apr04-aprCreating multimedia documents and copyright issues associated with digital sources07-aprPrivacy and personal data protection on the Internet. Mobile computing, location based services.09-aprComputer and network security : viruses, frauds, fishing, spoofing, scam, secure protocols, ?safe user behaviour014-aprSearching with Google or gathering information from the website; being aware of the standard sources of information16 aprTest23-aprRecap classRecap classSCHEDULE FOR SYLLABUS WeekClass contentsHomework1Intro - Prof presentation Course goal and requirements: Program of classes, general rules in classFile systems, file and folder management. Network storage of data. Data storage, local, intranet, extranetGoogle drive, Dropbox, IcloudGoogle spreadsheet common user info practice 2Computers architecture and technology , history Moore's law.How to trouble shoot basic issues on computers (plugging in laptops to overheads etc.) and? how to use a computer and do basic troubleshooting; how to move to another computer, compressing file tools. Personal laptops correctly connected3Software Layers: operating systems and application software. Local applications Personal productivity software, cloud/local, Open Office, alternative suitesOther personal productivity software: image, ZIP.4MS Office intro. Word 15MS Word 2 Class test word6Recap and Midterm week7MS Excel 1 - basics8MS Excel 2 – formulas and functions9MS Excel 3 - chartsClass test Excel 10Presentation tools: PowerpointPowerpoint test11Presentation tools: Prezi, Lucidpress, multimedia documents and copyright issuesMultimedia doc test12Searching with Google or gathering information from the web; awareness of the standard sources of informationDatabases v/s Search Engines searches13Use of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end usersPrivacy and personal data protection on the Internet. Mobile computing, location based puter and network security : viruses, frauds, fishing, spoofing, scam, secure protocols, ?safe user behaviour.Data presentation test14Recap before finals ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download