Computer
Computer
Fundamentals
Course Syllabus
Course Description
Examines the fundamentals of personal computers with an emphasis on current application software. Provides an overview
of personal computers, operating systems, and internet technologies. Includes extensive and valuable hands-on experience
using several applications in the Microsoft Office Suite.
SimNet
This course will utilize a tool called SimNet, which will provide you with readings and other activities needed to complete the
course. Please refer to the SimNet link in the Course Content menu in Blackboard to access this information.
The first time you click a link, registration is required. SIMnet Student Registration for BB Ultra with LTIA Deep Integration:
Video & PDF Instructions.
Reference
O’Leary, T. J., O’Leary, D. A., & O’Leary, L. I. (2023). Computing essentials 2023: Making IT work for you (29th ed.).
McGraw-Hill.
Course Textbook(s)
No physical textbook is required; resources are integrated within the course.
Prerequisite(s)
No prerequisite courses are required for enrollment in this course.
LibGuides
Think of a LibGuide (a Library Guide) as a mini-website to help you with your assignments. It has relevant information such
as databases, e-books, and websites specific to your courses. If you have any questions, please reach out to your friendly
library staff.
Click here for the LibGuide for this course.
Information Literacy
Information Literacy is (a) the ability to recognize an information need that prompts the identification, organization,
evaluation, and synthesis of data for the purpose of decision making and problem solving in academic, professional, and
personal settings and (b) the understanding of ethical considerations and legal issues related to the use of information.
Unit Assignments
Unit III Assignment
This assignment will give you an opportunity to learn more about the system unit, input devices, and output devices. You will
also demonstrate your ability to use some advanced Microsoft Word features. This assignment will measure your mastery
of ULOs 1.1, 1.3, 1.4, 3.1, and 3.2.
Your assignment will have four parts. Before working on this assignment, you will need to complete the Unit III Activity: Word
Advanced Features.
Part 1: Introduction
Begin your assignment with an introduction that identifies what a computer, storage, and networking are. Introduce internal,
input, and output devices of a computer. Your introduction should provide an overview of these three types of devices.
Part 2: The System Unit
1. Research one internal device inside your desktop or laptop computer (i.e., power supply, RAM, CPU, hard drive,
cooling fans, motherboard, etc.).
2. Then, insert a picture or something relative to the internal device you chose using the ‘Insert’ then ‘Online Pictures’
Unit IV Assignment
This journal measures your mastery of ULOs 1.5, 1.6, 1.7, 2.1, 2.2, and 3.3.
This journal will give you an opportunity to learn more about secondary storage technologies, communications, and
networks. Before working on this assignment, you will need to complete the Unit IV Activity: Excel.
For this journal, reflect on what you have learned about secondary storage, communications, and network security in this
unit. Address the following three areas in a two-page written response:
Secondary Storage Technologies
Scenario: Your boss wants you to back up your presentation files. You will need to do some research to find the best
storage method. Research secondary storage technologies, such as SSDs, HDDs, flash drives, optical discs, magnetic
tapes, and cloud storage.
Part 1: In your journal, differentiate between primary and secondary storage for your boss. Discuss cloud storage and
cloud storage services, comparing storage features such as speed, reliability, capacity.
Part 2: Using MS Excel, create a table with your findings. Create columns and rows as needed. Paste an image of the
Excel table into Microsoft Office Word underneath your response for Part 1.
Communications
Scenario: As the industry prepares for the transition from fifth-generation (5G) to sixth-generation (6G) networks, your boss
as asked you to identify potential benefits and drawbacks of 6G mobile telecommunications. Research 6G technology.
Part 3: Discuss two potential benefits and two potential drawbacks to the widespread adoption of 6G technology.
Network Security
Scenario: Your company allows its workers to telework from home. As a remote worker, you will need to use a virtual private
network (VPN). Research the concept of VPNs, their role in establishing secure and encrypted connections over public
networks, and their relevance in remote work environments.
Part 4: Compare different types of networks.
Part 5: Explain the primary benefits that VPNs offer to remote workers, and how they contribute to ensuring secure and
private communication over the internet.
Part 6: Explain the potential risks and threats that remote workers may encounter when accessing company resources
Unit VI Assignment
Database Detective
This assignment measures your mastery of ULOs 3.4, 4.1, and 4.2. Before working on this assignment, you will need to
complete the Unit VI Activity: Excel.
Download and complete the Unit VI Assignment Poole's Nursery Template.
Complete the template. Include at least two sources, which must come from the CSU Online Library, to support your
assignment. Adhere to APA Style when constructing this assignment, including in-text citations and references for all
sources that are used.
This PowerPoint Presentation measures your mastery of ULOs 2.3, 2.4, 2.5, and 4.3.
In this assignment you will demonstrate what you have learned in Units V and VII. This assignment will have three parts.
Using Microsoft PowerPoint, create a presentation that addresses the prompts in each part of the assignment. Label each
slide section as Part 1, Part 2, and Part 3 to help delineate your presentation topics.
Part 1: Cybercrime and Computer Ethics
Research and present a recent security breach involving software, such as Microsoft Windows, Microsoft Azure,
WordPress, and others. Introduce the security breach from your research. Introduce the privacy, security, and ethical
issues of the security breach.
Using speaker notes, discuss in detail information about the breach, such as the cause of the breach and the
consequences of the security breach. Also discuss in detail the privacy, security, and ethical issues of the security
breach. If you have experienced this in real-life, feel free to share your experience.
Part 2: Social Engineering
Discuss at least four types of social engineering attacks.
Using speaker notes, discuss in detail information about each of the social engineering attacks and provide examples for
each including real-life experiences.
Part 3: Problem-Solving Using SDLC
Using the drawing tools in MS PowerPoint to draw the phases of the software development lifecycle (SDLC) model.
Explain how the software development lifecycle can be used to design, develop, test, and deploy software, specifically for
developing a game in C++.
Using speaker notes, briefly discuss each phase of the lifecycle. Also, expand upon how the software development
lifecycle can be used to design, develop, test, and deploy software.
All three parts of your presentation should be submitted in one PowerPoint document. You should use at least two visuals to
add visual appeal, such as clip art, graphics, charts, and such. The total length for this assignment should be at least ten,
not counting the title or references slides. Use headings and labels to identify the different parts and sections of the
assignment.
You are required to use speaker notes to add information to further explain the material on your slides. Your presentation
must use at least two outside resources. Adhere to APA Style when constructing in-text citations and references for all
sources that are used.
If you are unfamiliar with PowerPoint, view the PowerPoint Basics tutorial for additional assistance.
APA Guidelines
The application of the APA writing style shall be practical, functional, and appropriate to each academic level, with the
primary purpose being the documentation (citation) of sources. CSU requires that students use APA style for certain papers
and projects. Students should always carefully read and follow assignment directions and review the associated grading
rubric when available. The CSU Citation Guide includes examples and sample papers and provides information on how to
contact the CSU Writing Center.
Grading Rubrics
This course utilizes analytic grading rubrics as tools for your professor in assigning grades for all learning activities. Each
rubric serves as a guide that communicates the expectations of the learning activity and describes the criteria for each level
of achievement. In addition, a rubric is a reference tool that lists evaluation criteria and can help you organize your efforts to
meet the requirements of that learning activity. It is imperative for you to familiarize yourself with these rubrics because
these are the primary tools your professor uses for assessing learning activities.
Rubric categories include (1) Discussion Board, (2) Assessment (Written Response), and (3) Assignment. However, it is
possible that not all of the listed rubric types will be used in a single course (e.g., some courses may not have
Assessments).
The Assessment (Written Response) rubric can be found embedded in a link within the directions for each Unit
Assessment. However, these rubrics will only be used when written-response questions appear within the Assessment.
Each Assignment type (e.g., article critique, case study, research paper) will have its own rubric. The Assignment rubrics
are built into Blackboard, allowing students to review them prior to beginning the Assignment and again once the
Assignment has been scored. This rubric can be accessed via the Assignment link located within the unit where it is to be
submitted. Students may also access the rubric through the course menu by selecting “Tools” and then “My Grades.”
Schedule/Grading
The following pages contain a printable Course Schedule to assist you through this course. By following this schedule, you
will be assured that you will complete the course within the time allotted.
Unit I Information Technology, the Internet, the Web, and Electronic Commerce [ Weight: 5% ]
Unit III The System Unit, Input, and Output [ Weight: 15% ]