Have a question?
Message sent Close

CIS 101 Introduction to Computers

Final Exam and Transcript Provided by Davar Academy

CIS – 101 Introduction to Computers is a self-study course whose grade is based solely on the final examination. This course of study that is necessary to be prepared for the final examination consists of thirteen lessons based on the readings from the textbook. Students should read the entire text of all the reading assignments. There are no formal homework assignments, but students are encouraged to answer all the review questions at the end of each Lesson to ensure that they have understood the relevant course material are well prepared for the final exam.

Course Description:
This computer literacy course provides a comprehensive introduction to the principles of computers and information processing. Upon successful completion of this course, the student will gain an understanding of hardware and software concepts and how they are used in information systems. The scope of this course includes a historical background that traces the development of the modern computer and the place of the computer in society. There is great emphasis on the operation and terminology of computer systems.

Learning Outcomes:
Upon successful completion of the course, students will be able to:

  • Describe the purpose and function of computer hardware components.
  • Analyze the appropriateness of a system for a specific task.
  • Illustrate the purpose and function of important application software.
  • Choose the best software for a specific task.
  • Define the purpose and function of system software.
  • Construe and evaluate major operating systems.
  • Depict the major telecommunications alternatives, and evaluate their suitability for a given task.
  • Compare and contrast Local Area Networks and Wide Area Networks
  • Propose and evaluate solutions to data communication problems.
  • Detail and assess the development of an information system.
  • Characterize application software development.
  • Chronicle and evaluate structured methods.
  • Delineate and distinguish among the important programming languages.
  • Choose the correct computer language for the specific job.
  • Learn about computer security, ethics, and privacy.
  • Evaluate risks and system security.

Evans, Alan, Martin, Kendall, Poatsy,
Mary Anne Technology in Action, 13th Edition (Pearson, 2016).
ISBN-10: 0-13-428910-2
ISBN-13: 978-0-13-428910-6

Students can obtain this text book from the following source:

http://www.mypearsonstore.com/bookstore/technology-in-action-complete-9780134289106

All reading and (optional) homework assignments referenced in this syllabus refer to this text

1) In addition, it is recommended to have access to MyITLab®, by Pearson. This can be accessed here:

http://www.mypearsonstore.com/bookstore/myitlab-with-pearson-etext-instant-access-for-technology-0134444949

2) The following study guide will be made available upon enrollment:
Evans, Alan, Martin, Kendall, Poatsy, Mary Anne PowerPoint Presentation to accompany Technology in Action, 13th Edition (Pearson, 2016).

Lesson Overview

Lesson 1: Using Technology to Change the World
Read Chapter 1

In this lesson the students learn about what it means to be “computer literate” and how being computer literate make you a savvy computer user and consumer. The students look at how becoming computer literate help you in a career and help you understand and take advantage of newly emerging careers. The students examine how becoming computer literate help you deal with the challenges associated with technology.

Lesson 2: Looking at Computers: Understanding the Parts
Read Chapter 2

In this lesson the students define what exactly a computer is, and what its four main functions are. The students look at the difference between data and information. The students define bits and bytes, and how are they measured. The students look at what devices to use get data into the computer and to get information out of the computer. The students examine the motherboard and look at where are information and programs stored. The students look at how devices connected to the computer and how to set up the computer to avoid strain and injury.

Lesson 3: Using the Internet: Making the Most of the Web’s Resources
Read Chapter 3
In this lesson the students look at the origin of the Internet and how to communicate through the Internet using Web 2.0 technologies. The students look at the various kinds of multimedia files found on the Web, and the software needed to use them. The students learn about e-commerce, and e-commerce. The students learn about the web browser, and examine the URL and its parts. The students learn about how to use hyperlinks and other tools to get around the Web. The students look at how to search the Internet effectively, and how to evaluate Web sites. The students look at how data travels on the Internet and different options for connecting to the Internet.

Lesson 4 – Application Software: Programs That Let You Work and Play
Read Chapter 4
In this lesson the students explore the difference between application software and the system software. The students look at the kinds of applications that are included in productivity software and different types of multimedia software. The students look at different types of entertainment software and drawing software. The students look at the kind of software small and large businesses use. The students learn where to go for help when there is a problem with the software. The students learn about where to purchase software or get it for free. The students learn how to install, uninstall, and start software.

Lesson 5 – System Software: The Operating System, Utility Programs, and File Management
Read Chapter 5
In this lesson the students learn about what software is included in system software and what the different kinds of operating systems are. The students learn about how the operating system provides a means for users to interact with the computer. The students look at how the operating system help manage resources such as the processor, memory, storage, hardware, and peripheral devices. The students learn about how the operating system interacts with application software and how the operating system helps the computer start up and how the operating system helps keep the computer organized. The students look at which utility programs are included in system software, and what they do.

Lesson 6 – Understanding and Assessing Hardware: Evaluating Your System
Read Chapter 6
In this lesson the students learn how to determine whether to upgrade an existing computer or to buy a new one. The students look at what the CPU does and how to evaluate its performance. The students look at how memory works in the computer and how to evaluate how much is needed. The students learn about the computer’s main storage devices and how to evaluate them. The students look at which components affect the output of video on the computer and how to evaluate them. The students learn about the components that affect the computer’s sound quality, and how to evaluate them. The students look at different ways to I improve the reliability of my system.

Lesson 7: Networking: Connecting Computing Devices
Read Chapter 7
In this lesson the students learn about the advantages/disadvantages of setting a network. The students differentiate between a client/server network and a peer-to-peer network and look at the main components of a network. The students look at the types of networks most commonly found in the home and the equipment and software that are needed to build a network in the home. The students learn about other devices besides computers that can be connected to a home network. The students look at why wireless networks are more vulnerable than wired networks and what special precautions are required to secure a wireless network. The students look at how to configure the software on the computer and set up other devices to get a network up and running. The students look at what problems might come up when setting up a wireless network.

Lesson 8: Digital Devices and Media: Managing a Digital Lifestyle
Read Chapter 8

In this lesson the students learn about the factors that have brought us a digital lifestyle and how the move to digital information has affected the communication tools important to both the business world and life outside of work. The students look at how cell phone and Smartphone components resemble a traditional computer, and how they work. The students learn about VoIP, and what does it has to offer that is unique and how digital media different from analog. The students look at what can be carried in a portable media player and how it can be used to store data. the students look at different ways to create and to watch digital video.

Lesson 9: Securing Your System: Protecting Your Digital Data and Devices
Read Chapter 9
In this lesson the students learn about the types of viruses that require protection computer and how to protect the computer from viruses. The students learn about how hackers can attack computing devices and what harm can they cause. The students look at firewalls and learn about how it keeps computers safe from hackers. The students look at how to create secure passwords and manage them. The students look at how to surf the Internet anonymously and use biometric authentication devices to protect data. The students look at how to manage online annoyances such as spyware and spam and what data should be backed up, and the best methods for doing so. The students look at social engineering and how to avoid falling prey to phishing and hoaxes. The students look at how to protect physical computing assets from environmental hazards, power surges, and theft.

Lesson 10: Behind the Scenes: Software Programming
Read Chapter 10
In this lesson the students look at the system development life cycle and the phases in the cycle. The students learn about the role a problem statement plays in programming and how programmers create algorithms. The students look at how programmers move from algorithm to code and the categories of language used for code. The students look at how a programmer moves from code in a programming language to the 1s and 0s that the CPU can understand and how a program tested. The students learn about the steps that are involved in completing a program. The students look at how programmers select the right programming language for each specific task and the most popular programming languages for Windows and Web applications.

Lesson 11: Behind the Scenes: Databases and Information Systems
Read Chapter 11
In this lesson the students look at databases and why is it beneficial to use databases. The students look at the different components make up a database and the different types of databases that exist. The students look at database management systems and how relational databases organize and manipulate data. The students learn about data warehouses and data marts, and look at how they are used. The students look at information systems and what types of information systems are used in business. The students learn about data mining and how works.

Lesson 12: Behind the Scenes: Networking and Security in the Business World
Read Chapter 12
In this lesson the students learn about the advantages of a business network and how a client/server network differs from a peer-to-peer network. The students look at the different classifications of client/server networks and what components are needed to construct a client/server network. The students look at the various types of servers and various network topologies (layouts. The students look at why network topology is important in planning a network. The students look at the types of transmission media that are used in client/server networks. The students look at the software needed to run on computers attached to a client/server network and how this software controls network communications. The students examine how network adapters enable computers to participate in a client/server network and the devices that assist in moving data around a client/server network. The students look at the measures employed to keep large networks secure.

Lesson 13: Behind the Scenes: How the Internet Works
Read Chapter 13

In this lesson the students learn about who owns, manages, and pays for the Internet and how the Internet’s networking components interact. The students learn about the data transmissions and protocols do the Internet use and why IP addresses and domain names important for Internet communications. The students learn about the FTP and Telnet, and how to use them, as well as what HTML/XHTML and XML are used for. The students look at e-mail, instant messaging, and Voice over Internet Protocol work and how the information used in these technologies are kept secure. The students learn about how businesses use the Internet to reduce computing costs.

The student’s final grade will be based on a final examination. Examination questions will cover all topics covered in the readings. Students will have two hours to complete the final examination.  Students will be assigned a number grade from 0-100. A letter grade will also be issued in accordance with the following scale:

90-100 – A
80-89 – B
70-79 – C
0-69 – non passing

All quizzes are optional to prepare you for final exam. Only the score on your exam will appear on your transcript.

All relevant study material needed to pass the final exam can be found in study guide and prep quizzes.

Starting Course