OCP 100 Updated Course Outline
OCP 100 Updated Course Outline
COURSE INFORMATION
1. Course Description
Information and Communication Technology (ICT) is a must-have skill for everyone. Use of computers
has revolutionized the way we work, learn, play, and manage our daily lives. Computer increases
productivity and give us access to information. In fact, workplaces and schools now expect individuals to
be computer literate and use these systems to accomplish required tasks. As a student, ICT course will
1
help open the doors to deep understanding of other subjects of your profession. The demand for ICT skills
is growing and combining it together with your profession provides an impact to employers. As an
emerging field, there is no easy way to perform your jobs without using ICT. So, learning ICT is vital.
Digital literacy is one of the highly demanded core skills in the globe due to rapid spread and wide use of
ICTs. Effective use of digital devices is required for full participation in a knowledge society. This course
aims at exposing and welcoming students into ICT world with the bolts and nuts of computer concepts
and applications.
ICT covers knowledge of computer hardware and software, network systems and communications,
database application and management information systems, graphics and multimedia, artificial
intelligence and IT security.
With ICT, you can use computer to perform many things in a simple and sophisticated way. ICT
knowledge is very dynamic and useful in solving current problems related to any filed of work.
This course is designed to enable students to become comfortable in using computer applications and be
aware of IT security threats and solutions. The course is a 1-unit core course and is targeted for all
undergraduate students. The course is designed to be taken by first year students registered at the Open
University of Tanzania. The material covered in this course is at introduction level allowing students to
use computer for processing information using application software. The course covers major ICT
concepts including hardware and software technologies, operating systems, various ICT applications,
word processing, electronic spreadsheet programs, presentation packages and database management
systems. The course also covers computer network basics, internet technologies and applications, IT
security fundamentals, computer ethics, computer maintenance and troubleshooting.
2. Course Aim
The main objective of this course is to introduce students to the basic ICT concepts and applications
aiming at equipping students with basic knowledge and skills in using computer and its applications in a
networked and secured environment.
2
3. Course Syllabus/Indicative Content
3
Emails, Instant Messaging and Voice over IP, RSS, Blogs and Virtual Communities, Search
Engines, File Transfer Services, Teleworking, Cloud Services, ISPs, Web Browsers).
ix. ICT and Everyday Life (E-Commerce, m-commerce, benefits of e-commerce, challenges of e-
commerce, how to start e-commerce, e-commerce applications, government regulations for e-
commerce, e-Government, e-Banking, focal domains of e-government, e-government services in
Tanzania, e-voting, advantages and disadvantages of e-voting system, ICT in Health, Education
and Environment, ICT and health, impacts of ICT in human health, environmental impact of ICT,
IT asset disposal, e-learning, m-learning, benefits of e-learning, learning management system, e-
library)
x. Computer Security, Ethics and Maintenance (computer and IT security, consequences of security
violations, Internet-hazardous place, passwords, types of cybersecurity threats, cybercrime, data
security, data backup, computer ethics, unethical use of computers, professional practices,
computer maintenance and troubleshooting, preventive maintenance, purpose of preventive
maintenance, hardware preventive maintenance, software preventive maintenance, benefits of
preventive maintenance, steps of the troubleshooting process, data protection).
4
5. Mode of Assessment
The assessment procedures and criteria for this course follow the standard OUT examination regulations
for undergraduate courses. The following regulations based on two assessment marking criteria shall
apply for the assessment of this course i.e. Formative assessment (MTT 30%) and Summative assessment (AE
70%) as follows:
Main Timed Test (MTT) 30%
Annual Examination (AE) 70%
The MTT shall be assessed from parts 1 to parts 3 and AE shall cover the whole study material from parts
1 through 6.
The pass mark of this course is 40%. A student who fails in this course shall be required to sit for a
supplementary examination. The maximum score for supplementary examination shall be C grade.
A student who fails a supplementary examination shall be allowed to repeat the course. In such an event,
the grades obtained shall be C grade, regardless of the actual grade obtained.
Teaching and learning activities will involve e-learning management system using MOODLE platform:
online lecture hours (15%)
online discussion hours (25%)
online assignment hours (20%)
online portfolio assessment,
independent study hours (30%)
face to face session (10%)
Total hours (100%)
Total Credits (10)
5
7. Mode of Delivery
The course is delivered through Open and Distance Learning (ODL) mode in a blended mode with online
Learning Management System (LMS) called MOODLE. Some face to face sessions and practical
demonstrations in the University computer laboratories will also be planned.
8. Course Content
6
3.2 Lecture Objectives
3.3 Computer Parts
3.4 CPU and its Components
3.5 Computer Memory
3.6 System Buses
3.7 Computer Performance
3.8 Summary
3.9 Exercise
3.10 References
Lecture 5: MS Windows OS
8.1 Introduction
8.2 Lecture Objectives
8.3 MS Windows Versions and Installations
8.4 Common Features of MS Windows
8.5 Default Folders, Windows Desktop and Icons
8.6 Working with Windows
8.7 Windows Explorer
8.8 Control Panel
8.9 Working with Files and Folders
8.10 Windows Accessories
8.11 Summary
8.12 Exercise
8.13 References
7
SECTION 3: OFFICE APPLICATIONS
8
7.15 Exercise
7.16 References
9
9.13 Summary
9.14 Exercise
9.15 References
Reading List
1. Shelly G. B., Freund S. M., Vermaat M. E. (2011). Introduction to Computers, 8th edition, ISBN:
13:978-1-4390-8131-0, Shelly Cashman Series, Boston, USA.
2. Shelly G. B., Freund S. M., Vermaat M. E. (2007). Essential Introduction to Computers: And How
to Purchase a Personal Computer, 7th edition, ISBN: 1423912357, 9781423912354, Shelly
Cashman Series, Course, Boston, USA.
3. Wempen F., Hattersley R., Millet R., Shoup K., (2015). Computer fundamentals: Introduction to
computers, ISBN: 978-1-119-03971-6, John Wiley & Sons, Indiana, USA.
4. Nickerson, R. C (2001) Business and Information Systems. Prentice Hall, Hardcover.
5. Donald H. Sanders, Computer Concepts and Applications, 3rd edition ISBN: 0-07-054744-0,
Publisher: McGraw Hill.
6. Gorana C., Dario I. R., “Basic Concepts of Information and Communication Technology”,
Handbook, ITdesk.info, ISBN: 978-953-56758-7-7, Zagreb, 2011
7. Ally S., & Mahenge G., (2008). Introduction to Microcomputer Studies and IT Applications. OCP
100 Study Material for Undergraduate students, The Open University of Tanzania.
10
8. Ralph Stair, George Reynolds, (2005), Fundamentals of Information Systems, Third Edition
ISBN: 0619064919, Publisher: Course Technology; 3 editions.
9. Marie Claire Williams, Using Information Technology NVQ level 2 Student handbooks
Heinemann.
10. Lincoln Andrews, Annette Thomason, The Art of Using Computers, The DPMA Textbook series
11. John D. Carpinelli, Computer Systems Organization and Architecture, Publisher: Addison-
Wesley, Hardcover, Published, (2000), ISBN 0201612534
12. ECDL/ICDL Made Simple (Business Communications Development Ltd), page 1 – 40
13. Laudon K. C, & Traver C. G., (2018). E-Commerce 2018, 14th edition, ISBN: 013483951X,
Pearson
14. Laudon K. C, & Traver C. G., (2017). E-Commerce 2017: Business, Technology and Society,
13th edition, ISBN: 0134602145, 9780134602141, Pearson Education
15. Reynolds J., (2004). The Complete E-Commerce Book: Design, Build & Maintain a Successful
Web-based Business, revised edition, ISBN: 1578203120, 9781578203123, Taylor & Francis,
New York City, USA.
16. Andrea K. & Enrico F. (2016). Electronic Government and the Information Systems Perspective:
5th International Conference, September 5-8, 2016, Proceedings, ISBN: 3319441590,
9783319441597, Springer, 2016, EGOVIS 2016, Porto, Portugal
17. Chen H., Brandt L., et al., (2007). Digital Government: E-Government Research, Case Studies,
and Implementation, Volume 17 of Integrated Series in Information Systems. Illustrated edition,
ISBN: 9780387716114, Springer Science & Business
18. Hilty, L. M., & Aebischer, B. (Eds.). (2015). ICT innovations for sustainability (Vol. 310).
Springer.
19. Shah M. & Clarke S., (2009). E-Banking Management: Issues, Solutions, and Strategies: Issues,
Solutions, and Strategies. Illustrated edition, ISBN: 1605662534, 9781605662534, IGI Global,
2009
20. SCN Education B. V. (2013). Electronic Banking: The Ultimate Guide to Business and
Technology of Online Banking, Illustrated edition, ISBN: 3322866270, 9783322866271, Springer
Science & Business Media,
21. Feng H. & Peter Y. A. R. (2016). Real-World Electronic Voting: Design, Analysis and
Deployment, Illustrated edition, ISBN: 131535411X, 9781315354118, CRC Press
22. Gritzalis D. A., (2012). Secure Electronic Voting, Illustrated edition, ISBN: 146150239X,
9781461502395, Springer Science & Business Media, 2012
23. Fee, K. (2009). Delivering E-Learning: A complete strategy for design application and assessment.
Kogan Page Publishers.
24. Hastings, H., & Sande, S. (2009). White Paper: Considerations for developing an IT disposal
policy. CA IT Asset Management.
11
25. Rahman, M. (2011). Impacts of ICT to Health and Environment: A review of bad effect of ICT in
recent time. LAP Lambert Academic Publishing.
26. Sirohi, S., & Gupta, A. (2010). Koha 3 Library Management System. Packt Publishing Ltd.
27. Suder, A., & Durucu, M. (2015). ICT in Healthcare Management, Developments, and
Applications in Turkish Health Sector. In Healthcare Administration: Concepts, Methodologies,
Tools, and Applications (pp. 74-95). IGI Global.
28. Veletsianos, G. (Ed.). (2010). Emerging technologies in distance education. Athabasca University
Press.
29. Friedman, A., & Singer, P. W. (2014). Cybersecurity and Cyberwar: what everyone needs to know
30. Lehtinen, R., & Gangemi Sr, G. T. (2006). Computer Security Basics: Computer Security,
“O'Reilly Media, Inc”.
31. Rhodes-Ousley, M. (2013). Information security: the complete reference. McGraw Hill Education.
32. Sikorski, M., & Honig, A. (2012). Practical malware analysis: the hands-on guide to dissecting
malicious software. no starch press.
33. Johnson, D. G., & Nissenbaum, H. (1995). Computers, ethics & social values. Prentice-Hall, Inc.
34. Johnson, D. G. (1998). Computer ethics. DIANE Publishing Company.
35. Moor, J. H. (1985). What is computer ethics? Metaphilosophy, 16(4), 266-275.
36. Northcutt, S., Madden, C., & Welti, C. (2004). IT Ethics Handbook: Right and Wrong for IT
Professionals. Elsevier.
37. Bigelow, S. J. (2001). Troubleshooting, maintaining and repairing PCs. McGraw-Hill
Professional.
38. Mueller, S. (2003). Upgrading and repairing PCs. Que Publishing.
39. Rood, S. C. (1996). Computer Hardware Maintenance: An IS/IT Manager's Guide. Butterworth-
Heinemann.
12