JCU Logo

JOHN CABOT UNIVERSITY

COURSE CODE: "CS 101"
COURSE NAME: "Introduction to Computer Science"
SEMESTER & YEAR: Spring 2018
SYLLABUS

INSTRUCTOR: Khaison Duong
EMAIL: [email protected]
HOURS: MW 10:00-11:15 AM
TOTAL NO. OF CONTACT HOURS: 45
CREDITS: 3
PREREQUISITES:
OFFICE HOURS:

COURSE DESCRIPTION:
This course offers an overview and an  introduction to the capabilities and limitations of computing and digital multimedia; the theoretical foundations of computing that drive future computing and technological advancements; computer software including operating system and application software; fundamentals of computer networks and the Internet; networks types and standard protocols; cloud computing; next generation Internet or "Internet of the things"; additive manufacturing and 3D printers for business; business intelligence, data analysis, digital contact with customers; privacy and personal data protection on the Internet; “Cyber war,” computer risk, and security concerns.
SUMMARY OF COURSE CONTENT:

1.       Computers architecture and technology

2.       Software layers: operating systems and application software

3.       History of computing

4.       Organizing and managing your own data: file systems and file/folder management.

5.       Networks architecture and protocols. Data storage and backup Local Area Network, Intranet, Internet . Access to data at different locations

6.       Cloud computing.  Local application v/s cloud suites

7.       Introduction to Microsoft Office Package and how to use it. MS Word. MS Excel. Power point

8.       Creating multimedia documents with advanced presentation tools (e.g. Prezi, Lucidpress) and copyright issues associated with digital sources

9.       Professional  presentation of information and computer etiquette

10.   Searching with Google or gathering information from the website; being aware of the standard sources of information

11.   Databases v/s Search Engines searches

12.   Use of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end users

13.   Typing skills

14.   Computer and network safety and security: viruses, frauds, fishing, spoofing, scam, secure protocols,  safe user behaviour.
LEARNING OUTCOMES:

1.      Experience first hand use of computers

2.      Used methodology and logic for algorithms and problem solving

3.      Understand data, data presentation and data management

4.      Improve IT skills for academic and professional situations

TEXTBOOK:
NONE
REQUIRED RESERVED READING:
NONE

RECOMMENDED RESERVED READING:
NONE
GRADING POLICY
-ASSESSMENT METHODS:
AssignmentGuidelinesWeight
Class participationActive participation in class, contribution to teaching by sharing experiences, workgroup15
Class tests and activitiesMultiple choices tests or practical exercises will be scheduled and are an integral part of student assessment.30
Midterm 25
Final exam 30

-ASSESSMENT CRITERIA:
AWork of this quality directly addresses the task or problem raised and provides a coherent application of concepts displaying mastery of the skills learned. This type of work demonstrates the ability to critically evaluate concepts and theory and apply them with an element of novelty and originality. There is clear evidence of a significant amount of work beyond that required for the course.
BThis is highly competent level of performance and directly addresses the task or problem raised. There is a demonstration of some ability to critically evaluate theory and concepts and relate them to practice. Work produced reflects students’ own adaptation and not simply a repetition of standard lecture. The work does not suffer from any major errors or omissions and provides evidence of work beyond the required assignments.
CThis is an acceptable level of performance and provides work that is clear but limited, reflecting the information offered in the lectures and resources.
DThis level of performances demonstrates that the student lacks a coherent grasp of the material or skills. Important concepts are not applied adequately. In effect, the student has barely done enough to persuade the instructor that s/he should not fail.
FThis work fails to show any knowledge or understanding of the task or problem. Most of the work produced is unacceptable or irrelevant.

-ATTENDANCE REQUIREMENTS:

Attendance is mandatory as all lessons will be held in the computer laboratory and will be a combination of theory and practice. Students spending most of the class time using smart-phones or the like will be marked absent. Students will lose 1% for every unexcused absence. Consistently being late will also be penalized.

ACADEMIC HONESTY
As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.
STUDENTS WITH LEARNING OR OTHER DISABILITIES
John Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.

SCHEDULE

Week

Class contents

Assignment

1

Introduction to course

Computer architecture, hardware and software

Typing skills

Assignment 1

2

History of computing

3

Local computers, cloud computing, the internet

Major software and file types

 Assignment 2

4

File management

 

5

Algorithms

Assignment 3

6

Logic

Assignment 4(quiz)

7

Review and Midterm

 

8

Intro to MS Word

 

9

Intro to MS Excel

Assignment 5

10

Intro to MS Powerpoint

11

Presentation skills and alternative software, Prezi

 

12

Databases v/s Search Engines searches

Web sources

 

13

Use of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end users

Computer and network security : viruses, frauds, fishing, spoofing, scam, secure protocols,  safe user behaviour.

14

Recap before finals