Course Overview

Ch 1: What is Information Technology

The first chapter begins by defining three overlapping disciplines: Information Technology (IT), Information Systems (IS), and Computer Science (CS). After an in-depth discussion of the learning objectives for the course, the chapter continues with a survey of ethical issues associated with computer technology. While exploring technology concepts throughout the course, it's important to revisit the ethical principles covered in this first chapter.

Ch 2: Information Technology Basics

Chapter 2 introduces the basic components of a computer system and provides a brief history of computer technology. It then describes how computers translate physical signals into digital information. The chapter concludes with a brief look at common careers in digital media.

Ch 3: Computer Hardware

Chapter 3 describes the purpose of computer hardware, including internal components such as the processor, memory, motherboard, input and output devices, and storage. Using hardware simulators, students practice installing and troubleshooting various system components. The chapter concludes with a brief look at common careers in computer hardware.

Ch 4: Computer Software

Chapter 4 discusses the purpose and features of computer software. Students learn the difference between system and application software, how computer software interacts with hardware, and how to troubleshoot common software problems. Simulated labs give students practice configuring operating systems, viewing BIOS settings, managing files, and using Microsoft Office applications. The chapter concludes with a brief look at common careers in system support.

Ch 5: Internet Technologies

Chapter 5 describes internet technologies such as the world wide web, email, cloud computing, social media, and the internet of things (IoT). It explains the importance of protecting online identities, practicing proper email etiquette, and avoiding plagiarism when conducting online research. Students practice configuring web browsers, copying files to the cloud, responding to email messages, and configuring smart devices. The chapter concludes with a brief look at common careers in designing and configuring internet technologies.

Ch 6: Networking

Chapter 6 introduces concepts and best practices associated with computer networking. It describes devices, standards, and protocols used in both wired and wireless networking. Students practice installing and configuring network devices, setting up secure internet connections, and troubleshooting network connection problems. The chapter concludes with a brief look at common computer networking careers.

Ch 7: Databases

Chapter 7 describes the purposes and functionality of database systems. It introduces database design techniques, data access methods, and the challenges and opportunities associated with Big Data. Students practice configuring database objects, writing SQL commands, and designing tables within a database management system. The chapter concludes with a brief look at common careers associated with database systems.

Ch 8: Programming

Chapter 8 provides a basic overview of computer programming. It introduces programming languages, logic, and development paradigms. Students use JavaScript to define variables, arrays, and functions; execute simple looping and branching logic; and add functionality to a web page. In addition to simple JavaScript programming, students use HTML and CSS to format web page content. The chapter concludes with a brief look at common careers in computer programming.

Ch 9: Information Systems

Chapter 9 describes the role of Information Systems in business. It introduces the importance of data analytics, business intelligence, systems analysis and design, project management, and protecting intellectual property. Students use Microsoft Excel and Access to perform simple data analysis. The chapter concludes with a brief look at common careers in Information Systems.

Ch 10: Cybersecurity

Chapter 10 introduces various strategies and tools for responding to data security threats. It describes how system administrators use authentication, data encryption, device security, and business continuity plans to protect valuable information. Students practice recognizing social engineering exploits, configuring access control, encrypting files, configuring device security, and implementing fault tolerance. The chapter concludes with a brief look at common careers in cybersecurity.

Ch 11: IT Career Preparation

Chapter 11 summarizes various career paths in Information Technology. It discusses future trends in IT and explores how college programs and certifications help students prepare for IT careers. The chapter concludes with helpful tips on finding and preparing for IT jobs.

Ch 1: What is Information Technology?

What is Information Technology?

  • IT, IS, and CS
  • Technology and Ethics

Ch 2: Information Technology Basics

Introduction to Computers

  • History of Computers
  • Supercomputers
  • Human Computer Interaction

Digital Data

  • Number Systems
  • Digital Information
  • Data Representation (ASCII, Unicode, etc.)

Media Formatting

  • Digital Sound and Video
  • File Compression
  • Common Digital Audio and Video Formats
  • Common Digital Image Formats
  • 3D Models and Graphics

Careers in Digital Media

Ch 3: Computer Hardware

Computing Devices (Desktop, Laptop, Mobile, etc.)

Internal Components

  • Internal Computing Components (CPU, RAM, Power Supply, Memory, Video Card, Network Card, etc.)
  • Electrostatic Discharge
  • The Fetch Cycle
  • CPU
  • Motherboard

Input and Output Hardware

  • External Devices (Bluetooth, HDMI, Drivers, etc.)
  • Touch Screens
  • Printers
  • Cameras
  • Monitors
  • USB Devices
  • Setting Up a Computer

Storage

  • Storage Types (Hard Disk, Flash Storage, Solid State Device, etc.)
  • SATA Devices
  • File Systems
  • Drives and Partitions

Hardware Troubleshooting

  • Motherboard, Memory, and CPU Troubleshooting
  • Troubleshooting SATA Devices

Hardware Careers

Ch 4: Computer Software

Operating Systems

  • OS Interfaces
  • Windows 10 OS
  • Windows Settings
  • iOS

More System Software

  • Updating Drivers
  • BIOS Settings
  • CMOS Settings
  • Firmware
  • VT in the BIOS
  • Virtual Machines

File Management

  • Windows File Management
  • File Permissions
  • NTFS File Settings
  • PowerShell Commands
  • Linux Shell Commands

Application Software

  • Productivity, Collaboration and Business Software
  • Desktop Applications
  • Microsoft Word and PowerPoint

Printing

  • Windows Printing Features
  • 3D Printer
  • Local Printer

Software Troubleshooting

  • Task Manager
  • Program Repair

System Support Careers

Ch 5: Internet Technologies

The World Wide Web

  • The Internet
  • Web Applications
  • Blogs and Wikis
  • RSS Feeds and Podcasts

Web Browsers

  • URLs
  • Configuring Web Browsers
  • Browser Settings
  • Proxy Servers

Cloud Computing

  • Software as a Service
  • Business Solutions
  • Storage

Social Media

  • Facebook, Twitter, and Instagram
  • Online Profiles and Identities
  • Crowdsourcing
  • Social Media Marketing

Internet Communications Technologies

  • Synchronous vs Asynchronous Communication
  • Email Etiquette
  • Texting, Messaging, and Online Chat
  • Voice Over IP
  • Online Streaming

The Internet of Things

  • Digital Assistants
  • Smart Devices

Online Research

  • Online Search
  • Academic Research
  • Advanced Search

Internet Technology Careers

Ch 6: Networking

Networking Basics

  • Network Types (LAN, WAN)
  • Network Topologies
  • Device Addresses
  • Networking Devices
  • Network Servers

Wired and Wireless Networking

  • Network Cables
  • Ethernet
  • Wireless Standards
  • Bluetooth
  • Network Printing
  • Home Wireless Network

Internet Connectivity

  • Internet Service Types
  • Cable Modem
  • Wireless Infrastructure
  • Cellular Technology
  • Mobile Devices
  • VPN Connections

Networking Protocols

  • Internet Protocols (IP, TCP, UDP, DNS, HTTP and HTTPS)
  • HTTP Methods
  • DHCP
  • Subnetting
  • TCP/IP Settings

Application Delivery

  • Application Architecture Models
  • Platforms and Licensing
  • Windows Update

Network Troubleshooting

  • Network Adapter Problems
  • Network Connections

Networking Careers

Ch 7: Databases

Introduction to Databases

  • Database Definition
  • Data Modeling
  • Analytical vs Operational Data
  • Database Management Systems
  • Access Database

Relational Databases

  • Spreadsheets vs Databases
  • Database Structure
  • Relationships
  • Normalization
  • Database Design in Microsoft Access
  • Tables and Relationships

Querying Databases

  • Access Methods
  • Microsoft Access Queries
  • Creating Queries
  • SQL

Non-relational Databases

  • Non-relational Database Challenges
  • Big Data

Database Careers

Ch 8: Programming

Programming Overview

  • Programming Terminology
  • Programming Languages
  • History of Programming
  • Pseudocode

Programming Fundamentals

  • Data Types
  • Variables and Arrays
  • Programming Logic
  • Functions

Programming Paradigms and Processes

  • Programming Paradigms
  • Object Oriented Programming
  • Version Control
  • Integrated Development Environments
  • Application Programming Interfaces
  • Basic Python
  • Basic JavaScript

Web Development

  • HTML, CSS and JavaScript
  • HTML Tags
  • Simple HTML
  • Simple CSS

Programming Careers

Ch 9: Information Systems

Introduction to Business Systems

  • Types of Information Systems
  • Artificial Intelligence
  • Customer Relationship Management
  • Cryptocurrency

Data Analysis

  • Data and Information Assets
  • Microsoft Excel Chart Types
  • Use Microsoft Excel Tables, Charts and Reports to Analyze Data

Designing and Implementing Systems

  • Systems Analysis and Design
  • Project Management
  • Agile Methodology

Intellectual Property

  • Copyright and Intellectual Property
  • Patents and Trademarks
  • Digital Millennium Copyright Act

Information System Careers

Ch 10: Cybersecurity

Security Threats

  • Confidentiality Concerns
  • Integrity Concerns
  • Availability Concerns
  • Digital Privacy
  • Malware
  • Password Attacks
  • Identity Theft
  • Social Engineering Exploits

Authentication

  • Authentication
  • Authorization
  • Accounting
  • User Accounts

Data Encryption

  • Encryption
  • Asymmetric Encryption
  • Certificates
  • Secure a Home Wireless Network

Device Security

  • Password Best Practices
  • Enforcing Password Settings
  • Securing Devices
  • Configuring Remote Wipe
  • Ecommerce Safeguards
  • Windows Defender
  • Windows Firewall

Business Continuity Plans

  • Handling Confidential Information
  • Fault Tolerance
  • Installing a UPS
  • RAID Implementations
  • Backup Considerations
  • Backup Software
  • Configuring File History
  • Disaster Recovery

Cybersecurity Careers

Ch 11: IT Career Preparation

Education and Training

  • Choosing an IT Career Path
  • Future Trends
  • College Programs

Finding a Job

  • Character and Professionalism
  • Networking
  • Resumes