Ch 1: What is Information Technology
The first chapter begins by defining three overlapping disciplines: Information Technology (IT), Information Systems (IS), and Computer Science (CS). After an in-depth discussion of the learning objectives for the course, the chapter continues with a survey of ethical issues associated with computer technology. While exploring technology concepts throughout the course, it's important to revisit the ethical principles covered in this first chapter.
Ch 2: Information Technology Basics
Chapter 2 introduces the basic components of a computer system and provides a brief history of computer technology. It then describes how computers translate physical signals into digital information. The chapter concludes with a brief look at common careers in digital media.
Ch 3: Computer Hardware
Chapter 3 describes the purpose of computer hardware, including internal components such as the processor, memory, motherboard, input and output devices, and storage. Using hardware simulators, students practice installing and troubleshooting various system components. The chapter concludes with a brief look at common careers in computer hardware.
Ch 4: Computer Software
Chapter 4 discusses the purpose and features of computer software. Students learn the difference between system and application software, how computer software interacts with hardware, and how to troubleshoot common software problems. Simulated labs give students practice configuring operating systems, viewing BIOS settings, managing files, and using Microsoft Office applications. The chapter concludes with a brief look at common careers in system support.
Ch 5: Internet Technologies
Chapter 5 describes internet technologies such as the world wide web, email, cloud computing, social media, and the internet of things (IoT). It explains the importance of protecting online identities, practicing proper email etiquette, and avoiding plagiarism when conducting online research. Students practice configuring web browsers, copying files to the cloud, responding to email messages, and configuring smart devices. The chapter concludes with a brief look at common careers in designing and configuring internet technologies.
Ch 6: Networking
Chapter 6 introduces concepts and best practices associated with computer networking. It describes devices, standards, and protocols used in both wired and wireless networking. Students practice installing and configuring network devices, setting up secure internet connections, and troubleshooting network connection problems. The chapter concludes with a brief look at common computer networking careers.
Ch 7: Databases
Chapter 7 describes the purposes and functionality of database systems. It introduces database design techniques, data access methods, and the challenges and opportunities associated with Big Data. Students practice configuring database objects, writing SQL commands, and designing tables within a database management system. The chapter concludes with a brief look at common careers associated with database systems.
Ch 8: Programming
Chapter 8 provides a basic overview of computer programming. It introduces programming languages, logic, and development paradigms. Students use JavaScript to define variables, arrays, and functions; execute simple looping and branching logic; and add functionality to a web page. In addition to simple JavaScript programming, students use HTML and CSS to format web page content. The chapter concludes with a brief look at common careers in computer programming.
Ch 9: Information Systems
Chapter 9 describes the role of Information Systems in business. It introduces the importance of data analytics, business intelligence, systems analysis and design, project management, and protecting intellectual property. Students use Microsoft Excel and Access to perform simple data analysis. The chapter concludes with a brief look at common careers in Information Systems.
Ch 10: Cybersecurity
Chapter 10 introduces various strategies and tools for responding to data security threats. It describes how system administrators use authentication, data encryption, device security, and business continuity plans to protect valuable information. Students practice recognizing social engineering exploits, configuring access control, encrypting files, configuring device security, and implementing fault tolerance. The chapter concludes with a brief look at common careers in cybersecurity.
Ch 11: IT Career Preparation
Chapter 11 summarizes various career paths in Information Technology. It discusses future trends in IT and explores how college programs and certifications help students prepare for IT careers. The chapter concludes with helpful tips on finding and preparing for IT jobs.
Ch 1: What is Information Technology?
What is Information Technology?
- IT, IS, and CS
- Technology and Ethics
Ch 2: Information Technology Basics
Introduction to Computers
- History of Computers
- Supercomputers
- Human Computer Interaction
Digital Data
- Number Systems
- Digital Information
- Data Representation (ASCII, Unicode, etc.)
Media Formatting
- Digital Sound and Video
- File Compression
- Common Digital Audio and Video Formats
- Common Digital Image Formats
- 3D Models and Graphics
Careers in Digital Media
Ch 3: Computer Hardware
Computing Devices (Desktop, Laptop, Mobile, etc.)
Internal Components
- Internal Computing Components (CPU, RAM, Power Supply, Memory, Video Card, Network Card, etc.)
- Electrostatic Discharge
- The Fetch Cycle
- CPU
- Motherboard
Input and Output Hardware
- External Devices (Bluetooth, HDMI, Drivers, etc.)
- Touch Screens
- Printers
- Cameras
- Monitors
- USB Devices
- Setting Up a Computer
Storage
- Storage Types (Hard Disk, Flash Storage, Solid State Device, etc.)
- SATA Devices
- File Systems
- Drives and Partitions
Hardware Troubleshooting
- Motherboard, Memory, and CPU Troubleshooting
- Troubleshooting SATA Devices
Hardware Careers
Ch 4: Computer Software
Operating Systems
- OS Interfaces
- Windows 10 OS
- Windows Settings
- iOS
More System Software
- Updating Drivers
- BIOS Settings
- CMOS Settings
- Firmware
- VT in the BIOS
- Virtual Machines
File Management
- Windows File Management
- File Permissions
- NTFS File Settings
- PowerShell Commands
- Linux Shell Commands
Application Software
- Productivity, Collaboration and Business Software
- Desktop Applications
- Microsoft Word and PowerPoint
Printing
- Windows Printing Features
- 3D Printer
- Local Printer
Software Troubleshooting
- Task Manager
- Program Repair
System Support Careers
Ch 5: Internet Technologies
The World Wide Web
- The Internet
- Web Applications
- Blogs and Wikis
- RSS Feeds and Podcasts
Web Browsers
- URLs
- Configuring Web Browsers
- Browser Settings
- Proxy Servers
Cloud Computing
- Software as a Service
- Business Solutions
- Storage
Social Media
- Facebook, Twitter, and Instagram
- Online Profiles and Identities
- Crowdsourcing
- Social Media Marketing
Internet Communications Technologies
- Synchronous vs Asynchronous Communication
- Email Etiquette
- Texting, Messaging, and Online Chat
- Voice Over IP
- Online Streaming
The Internet of Things
- Digital Assistants
- Smart Devices
Online Research
- Online Search
- Academic Research
- Advanced Search
Internet Technology Careers
Ch 6: Networking
Networking Basics
- Network Types (LAN, WAN)
- Network Topologies
- Device Addresses
- Networking Devices
- Network Servers
Wired and Wireless Networking
- Network Cables
- Ethernet
- Wireless Standards
- Bluetooth
- Network Printing
- Home Wireless Network
Internet Connectivity
- Internet Service Types
- Cable Modem
- Wireless Infrastructure
- Cellular Technology
- Mobile Devices
- VPN Connections
Networking Protocols
- Internet Protocols (IP, TCP, UDP, DNS, HTTP and HTTPS)
- HTTP Methods
- DHCP
- Subnetting
- TCP/IP Settings
Application Delivery
- Application Architecture Models
- Platforms and Licensing
- Windows Update
Network Troubleshooting
- Network Adapter Problems
- Network Connections
Networking Careers
Ch 7: Databases
Introduction to Databases
- Database Definition
- Data Modeling
- Analytical vs Operational Data
- Database Management Systems
- Access Database
Relational Databases
- Spreadsheets vs Databases
- Database Structure
- Relationships
- Normalization
- Database Design in Microsoft Access
- Tables and Relationships
Querying Databases
- Access Methods
- Microsoft Access Queries
- Creating Queries
- SQL
Non-relational Databases
- Non-relational Database Challenges
- Big Data
Database Careers
Ch 8: Programming
Programming Overview
- Programming Terminology
- Programming Languages
- History of Programming
- Pseudocode
Programming Fundamentals
- Data Types
- Variables and Arrays
- Programming Logic
- Functions
Programming Paradigms and Processes
- Programming Paradigms
- Object Oriented Programming
- Version Control
- Integrated Development Environments
- Application Programming Interfaces
- Basic Python
- Basic JavaScript
Web Development
- HTML, CSS and JavaScript
- HTML Tags
- Simple HTML
- Simple CSS
Programming Careers
Ch 9: Information Systems
Introduction to Business Systems
- Types of Information Systems
- Artificial Intelligence
- Customer Relationship Management
- Cryptocurrency
Data Analysis
- Data and Information Assets
- Microsoft Excel Chart Types
- Use Microsoft Excel Tables, Charts and Reports to Analyze Data
Designing and Implementing Systems
- Systems Analysis and Design
- Project Management
- Agile Methodology
Intellectual Property
- Copyright and Intellectual Property
- Patents and Trademarks
- Digital Millennium Copyright Act
Information System Careers
Ch 10: Cybersecurity
Security Threats
- Confidentiality Concerns
- Integrity Concerns
- Availability Concerns
- Digital Privacy
- Malware
- Password Attacks
- Identity Theft
- Social Engineering Exploits
Authentication
- Authentication
- Authorization
- Accounting
- User Accounts
Data Encryption
- Encryption
- Asymmetric Encryption
- Certificates
- Secure a Home Wireless Network
Device Security
- Password Best Practices
- Enforcing Password Settings
- Securing Devices
- Configuring Remote Wipe
- Ecommerce Safeguards
- Windows Defender
- Windows Firewall
Business Continuity Plans
- Handling Confidential Information
- Fault Tolerance
- Installing a UPS
- RAID Implementations
- Backup Considerations
- Backup Software
- Configuring File History
- Disaster Recovery
Cybersecurity Careers
Ch 11: IT Career Preparation
Education and Training
- Choosing an IT Career Path
- Future Trends
- College Programs
Finding a Job
- Character and Professionalism
- Networking
- Resumes