JCU Logo

JOHN CABOT UNIVERSITY

COURSE CODE: "CS 101-3"
COURSE NAME: "Introduction to Computer Science"
SEMESTER & YEAR: Fall 2015
SYLLABUS

INSTRUCTOR: Khaison Duong
EMAIL: [email protected]
HOURS: MW 10:00 AM 11:15 AM
TOTAL NO. OF CONTACT HOURS: 45
CREDITS: 3
PREREQUISITES:
OFFICE HOURS:

COURSE DESCRIPTION:
This course offers an overview and an  introduction to the capabilities and limitations of computing and digital multimedia; the theoretical foundations of computing that drive future computing and technological advancements; computer software including operating system and application software; fundamentals of computer networks and the Internet; networks types and standard protocols; cloud computing; next generation Internet or "Internet of the things"; additive manufacturing and 3D printers for business; business intelligence, data analysis, digital contact with customers; privacy and personal data protection on the Internet; “Cyber war,” computer risk, and security concerns.
SUMMARY OF COURSE CONTENT:

1.       Computers architecture and technology

2.       Software layers: operating systems and application software

3.       History of computing

4.       Organizing and managing your own data: file systems and file/folder management.

5.       Networks architecture and protocols. Data storage and backup Local Area Network, Intranet, Internet . Access to data at different locations

6.       Cloud computing.  Local application v/s cloud suites

7.       Introduction to Microsoft Office Package and how to use it. MS Word. MS Excel. Power point

8.       Creating multimedia documents with advanced presentation tools (e.g. Prezi, Lucidpress) and copyright issues associated with digital sources

9.       Professional  presentation of information and computer etiquette

10.   Searching with Google or gathering information from the website; being aware of the standard sources of information

11.   Databases v/s Search Engines searches

12.   Use of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end users

13.   Typing skills

14.   Computer and network safety and security: viruses, frauds, fishing, spoofing, scam, secure protocols,  safe user behaviour.
LEARNING OUTCOMES:

1.      Experience first hand use of computers

2.      Used methodology and logic for algorithms and problem solving

3.      Understand data, data presentation and data management

4.      Improve IT skills for academic and professional situations

TEXTBOOK:
NONE
REQUIRED RESERVED READING:
NONE

RECOMMENDED RESERVED READING:
NONE
GRADING POLICY
-ASSESSMENT METHODS:
AssignmentGuidelinesWeight
Class participationActive participation in class, contribution to teaching by sharing experiences, workgroup15
Class tests and activitiesMultiple choices tests or practical exercises will be scheduled and are an integral part of student assessment.30
Midterm 25
Final exam 30

-ASSESSMENT CRITERIA:
AWork of this quality directly addresses the question or problem raised and provides a coherent argument displaying an extensive knowledge of relevant information or content. This type of work demonstrates the ability to critically evaluate concepts and theory and has an element of novelty and originality. There is clear evidence of a significant amount of reading beyond that required for the course.
BThis is highly competent level of performance and directly addresses the question or problem raised.There is a demonstration of some ability to critically evaluatetheory and concepts and relate them to practice. Discussions reflect the student’s own arguments and are not simply a repetition of standard lecture andreference material. The work does not suffer from any major errors or omissions and provides evidence of reading beyond the required assignments.
CThis is an acceptable level of performance and provides answers that are clear but limited, reflecting the information offered in the lectures and reference readings.
DThis level of performances demonstrates that the student lacks a coherent grasp of the material.Important information is omitted and irrelevant points included.In effect, the student has barely done enough to persuade the instructor that s/he should not fail.
FThis work fails to show any knowledge or understanding of the issues raised in the question. Most of the material in the answer is irrelevant.

-ATTENDANCE REQUIREMENTS:

Attendance is mandatory as all lessons will be held in the computer laboratory and will be a combination of theory and practice. Students spending most of the class time using smart-phones or the like will be marked absent.

ACADEMIC HONESTY
As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.
STUDENTS WITH LEARNING OR OTHER DISABILITIES
John Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.

SCHEDULE

Week

Class contents

Assignment

1

Introduction to course

Computer architecture, hardware and software

Typing skills

Assignment 1

2

History of computing

3

Local computers, cloud computing, the internet

Major software and file types

 Assignment 2

4

File management

 

5

Algorithms

Assignment 3

6

Logic

Assignment 4(quiz)

7

Review and Midterm

 

8

Intro to MS Word

 

9

Intro to MS Excel

Assignment 5

10

Intro to MS Powerpoint

11

Presentation skills and alternative software, Prezi

 

12

Databases v/s Search Engines searches

Web sources

 

13

Use of primary data to manipulate into usable and well-documented formats so as to be able to communicate this information to end users

Computer and network security : viruses, frauds, fishing, spoofing, scam, secure protocols,  safe user behaviour.

14

Recap before finals