0% found this document useful (0 votes)
577 views12 pages

OCP 100 Updated Course Outline

This document provides information about an introductory course on microcomputer studies and information technology offered at the Open University of Tanzania. The course aims to introduce students to basic ICT concepts, applications, and skills for using computers and operating in a networked environment. Over 24 weeks students will learn topics like hardware, software, operating systems, applications like Word, Excel, PowerPoint, databases, internet technologies, cybersecurity, and computer maintenance. Assessment includes a midterm test, final exam, assignments, and independent study. The goal is for students to gain foundational digital literacy and ability to use ICT in their studies and future professions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
577 views12 pages

OCP 100 Updated Course Outline

This document provides information about an introductory course on microcomputer studies and information technology offered at the Open University of Tanzania. The course aims to introduce students to basic ICT concepts, applications, and skills for using computers and operating in a networked environment. Over 24 weeks students will learn topics like hardware, software, operating systems, applications like Word, Excel, PowerPoint, databases, internet technologies, cybersecurity, and computer maintenance. Assessment includes a midterm test, final exam, assignments, and independent study. The goal is for students to gain foundational digital literacy and ability to use ICT in their studies and future professions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

THE OPEN UNIVERSITY OF TANZANIA

FACULTY OF SCIENCE, TECHNOLOGY AND ENVIRONMENTAL


STUDIES
DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY

OCP 100: INTRODUCTION TO MICROCOMPUTER STUDIES


AND INFORMATION TECHNOLOGY
By Dr. Said Ally
[email protected] / [email protected]

ICT Department, FSTES

COURSE INFORMATION

1. Course Description
Information and Communication Technology (ICT) is a must-have skill for everyone. Use of computers
has revolutionized the way we work, learn, play, and manage our daily lives. Computer increases
productivity and give us access to information. In fact, workplaces and schools now expect individuals to
be computer literate and use these systems to accomplish required tasks. As a student, ICT course will

1
help open the doors to deep understanding of other subjects of your profession. The demand for ICT skills
is growing and combining it together with your profession provides an impact to employers. As an
emerging field, there is no easy way to perform your jobs without using ICT. So, learning ICT is vital.
Digital literacy is one of the highly demanded core skills in the globe due to rapid spread and wide use of
ICTs. Effective use of digital devices is required for full participation in a knowledge society. This course
aims at exposing and welcoming students into ICT world with the bolts and nuts of computer concepts
and applications.

ICT covers knowledge of computer hardware and software, network systems and communications,
database application and management information systems, graphics and multimedia, artificial
intelligence and IT security.

With ICT, you can use computer to perform many things in a simple and sophisticated way. ICT
knowledge is very dynamic and useful in solving current problems related to any filed of work.

This course is designed to enable students to become comfortable in using computer applications and be
aware of IT security threats and solutions. The course is a 1-unit core course and is targeted for all
undergraduate students. The course is designed to be taken by first year students registered at the Open
University of Tanzania. The material covered in this course is at introduction level allowing students to
use computer for processing information using application software. The course covers major ICT
concepts including hardware and software technologies, operating systems, various ICT applications,
word processing, electronic spreadsheet programs, presentation packages and database management
systems. The course also covers computer network basics, internet technologies and applications, IT
security fundamentals, computer ethics, computer maintenance and troubleshooting.

2. Course Aim
The main objective of this course is to introduce students to the basic ICT concepts and applications
aiming at equipping students with basic knowledge and skills in using computer and its applications in a
networked and secured environment.

2
3. Course Syllabus/Indicative Content

The following areas are covered:


i. Introduction to Computer (what is IT/ICT, computer literacy, computer generations, computer
types and categories, choosing computer, computer parts and peripheral devices, various use of
computers, capabilities and limitations of computers, choosing and buying computer).
ii. Hardware Technologies (hardware concept, input devices, output devices, I/O devices, common
I/O ports).
iii. CPU and Computer Memory (CPU components, CPU speed, memory concepts, memory types,
system buses, computer performance).
iv. Software technologies (software concepts, categories of software, system software, application
software, software licenses, Operating System (operating system concepts, GUI and CLI operating
systems, open source and proprietary OS, functions of operating system).
v. MS Windows operating system (installing Windows, versions, common features of MS Windows,
default folders, working with Windows, windows explorer, control panel, working with files and
folders, Windows accessories).
vi. Word Processing and Electronic Spreadsheets (basics of word processor, types of word
processors, standard and advanced features of word processors, common terminologies in word
processors, MS Word basics, keyboard shortcuts, margins, format painter, footnotes and endnotes,
spreadsheet basic, spreadsheet terminologies, Excel screen, simple functions, moving around in
Excel, absolute cell references, charts and graphs).
vii. Presentation and Databases (use of MS PowerPoint, home tab, insert tab, design tab, animation
tab, slide show tab, review tab, view tab, criteria for good presentation, introduction to MS
Access, database management system, database capabilities, features of MS Access program, steps
in designing a database, starting and quitting MS Access program, object and database utilities,
data types, table design, relationship in a database, introduction to queries, creating a data entry
form, simple report, backing up a database).
viii. Internet Technologies and Applications (networking basics, types of computer networks, basics of
Internet, how Internet works, Internet data flow, web browsers, Internet Services, teleworking,
Internet communication services, search engines and information retrieval, file transfer services,

3
Emails, Instant Messaging and Voice over IP, RSS, Blogs and Virtual Communities, Search
Engines, File Transfer Services, Teleworking, Cloud Services, ISPs, Web Browsers).
ix. ICT and Everyday Life (E-Commerce, m-commerce, benefits of e-commerce, challenges of e-
commerce, how to start e-commerce, e-commerce applications, government regulations for e-
commerce, e-Government, e-Banking, focal domains of e-government, e-government services in
Tanzania, e-voting, advantages and disadvantages of e-voting system, ICT in Health, Education
and Environment, ICT and health, impacts of ICT in human health, environmental impact of ICT,
IT asset disposal, e-learning, m-learning, benefits of e-learning, learning management system, e-
library)
x. Computer Security, Ethics and Maintenance (computer and IT security, consequences of security
violations, Internet-hazardous place, passwords, types of cybersecurity threats, cybercrime, data
security, data backup, computer ethics, unethical use of computers, professional practices,
computer maintenance and troubleshooting, preventive maintenance, purpose of preventive
maintenance, hardware preventive maintenance, software preventive maintenance, benefits of
preventive maintenance, steps of the troubleshooting process, data protection).

4. Expected Learning Outcomes


Upon completion of this course, a student will be able to:
(i) Describe functionalities of various computers parts and peripheral devices.
(ii) Identify the most appropriate computer for your needs.
(iii) Use computer to perform several tasks.
(iv) Install, apply and use any MS Window operating systems.
(v) Install and use application programs such as MS Word, MS Excel, MS PowerPoint and MS
Access.
(vi) Use Internet and e-services such as e-commerce, e-banking, e-government, e-learning and e-
library.
(vii) Discuss the impacts of ICT on the health sector and environmental management.
(viii) Describe the impact of computer use on human health.
(ix) Describe IT asset disposal process.
(x) Explain cybersecurity threats, associated security measures and computer ethics.
(xi) Undertake minor computer maintenance and troubleshooting process.

4
5. Mode of Assessment

The assessment procedures and criteria for this course follow the standard OUT examination regulations
for undergraduate courses. The following regulations based on two assessment marking criteria shall
apply for the assessment of this course i.e. Formative assessment (MTT 30%) and Summative assessment (AE
70%) as follows:
 Main Timed Test (MTT) 30%
 Annual Examination (AE) 70%

The MTT shall be assessed from parts 1 to parts 3 and AE shall cover the whole study material from parts
1 through 6.

The pass mark of this course is 40%. A student who fails in this course shall be required to sit for a
supplementary examination. The maximum score for supplementary examination shall be C grade.
A student who fails a supplementary examination shall be allowed to repeat the course. In such an event,
the grades obtained shall be C grade, regardless of the actual grade obtained.

6. Normal Learning Matrix and Course Matrix


There will be a total of 27 weeks of study in academic year distributed as follows:
 24 weeks set for study. Each knowledge area will be completed in four weeks.
 3 weeks set for examinations.

Teaching and learning activities will involve e-learning management system using MOODLE platform:
 online lecture hours (15%)
 online discussion hours (25%)
 online assignment hours (20%)
 online portfolio assessment,
 independent study hours (30%)
 face to face session (10%)
 Total hours (100%)
 Total Credits (10)

5
7. Mode of Delivery
The course is delivered through Open and Distance Learning (ODL) mode in a blended mode with online
Learning Management System (LMS) called MOODLE. Some face to face sessions and practical
demonstrations in the University computer laboratories will also be planned.

8. Course Content

SECTION 1: MICROCOMPUTER TECHNOLOGY///COMPUTER PARTS

Lecture 1: Introduction to Computer


1.1 Introduction
1.2 Lecture Objectives
1.3 What is Computer?
1.4 IT Professionalism and Expertise
1.5 Computer Literacy
1.6 Historical Development of Computer and Generations
1.7 Computer Types, Categories and Classes
1.8 Capabilities and Limitations of Computers
1.9 Various Uses of Computers
1.10 Choosing and Buying Computer
1.11 Summary
1.12 Exercise
1.13 References

Lecture 2: Hardware and Peripheral Devices


2.1 Introduction
2.2 Lecture Objectives
2.3 Introduction to Hardware
2.4 Input Devices
2.5 Output Devices
2.6 Common I/O Ports
2.7 Summary
2.8 Exercise
2.9 References

Lecture 3: CPU, Memory and Computer Performance


3.1 Introduction

6
3.2 Lecture Objectives
3.3 Computer Parts
3.4 CPU and its Components
3.5 Computer Memory
3.6 System Buses
3.7 Computer Performance
3.8 Summary
3.9 Exercise
3.10 References

SECTION 2: COMPUTER SOFTWARE

Lecture 4: Software Concepts


4.1 Introduction
4.2 Lecture Objectives
4.3 Software Technologies and Licenses
4.4 System and Application Software
4.5 What is Operating System?
4.6 GUI and CLI based OS
4.7 Types and Functions of OS
4.8 Summary
4.9 Exercise
4.10 References

Lecture 5: MS Windows OS
8.1 Introduction
8.2 Lecture Objectives
8.3 MS Windows Versions and Installations
8.4 Common Features of MS Windows
8.5 Default Folders, Windows Desktop and Icons
8.6 Working with Windows
8.7 Windows Explorer
8.8 Control Panel
8.9 Working with Files and Folders
8.10 Windows Accessories
8.11 Summary
8.12 Exercise
8.13 References

7
SECTION 3: OFFICE APPLICATIONS

Lecture 6: Word Processing and Electronic Spreadsheets


6.1 Introduction
6.2 Lecture Objectives
6.3 Basics of Word Processing and Word Processors
6.4 Common Terminologies in Word Processors
6.5 Introduction to MS Word
6.6 Keyboard Shortcuts
6.7 Margins
6.8 Format Painter
6.9 Footnotes and Endnotes
6.10 Introduction to MS Excel
6.11 Common Terminologies in Spreadsheets
6.12 MS Excel Screen
6.13 Simple Functions
6.14 Moving Around in Excel
6.15 Absolute Cell References
6.16 Charts
6.17 Summary
6.18 Exercise
6.19 References

Lecture 7: Presentation and Databases


7.1 Introduction
7.2 Lecture Objectives
7.3 Importance of MS PowerPoint
7.4 Insert, Design, Animation and Slide Show Tabs
7.5 Criteria for a Good Presentation
7.6 Database Management Systems (DBMS)
7.7 Database Capabilities
7.8 Features of MS Access
7.9 Data Types, Objects and Database Utilities
7.10 Steps in Creating Database
7.11 Tables Design and Relationships
7.12 Queries, Data Entry Forms and Reports
7.13 Database Backup
7.14 Summary

8
7.15 Exercise
7.16 References

SECTION 4: INTERNET APPLICATIONS

Lecture 8: Internet Technologies and Applications


8.1 Introduction
8.2 Lecture Objectives
8.3 Computer Network
8.4 How the Internet Works
8.5 Internet Services
8.5.1 Emails, Instant Messaging and Voice over IP
8.5.2 RSS, Blogs and Virtual Communities
8.5.3 Search Engines
8.5.4 File Transfer Services
8.5.5 Teleworking
8.5.6 Cloud Services
8.6 ISPs
8.7 Web Browsers
8.8 Summary
8.9 Exercise
8.10 References

SECTION 5: ICT AND EVERYDAY LIFE

Lecture 9: ICT and Everyday Life


9.1 Introduction
9.2 Lecture Objectives
9.3 e-Commerce
9.4 e-Government
9.5 e-Banking
9.6 e-Voting
9.7 e-Learning
9.8 e-Library
9.9 ICT and Health Sector
9.10 Impacts of ICT in Human Health
9.11 Environmental Impact of ICT
9.12 IT Asset Disposal

9
9.13 Summary
9.14 Exercise
9.15 References

SECTION 6: COMPUTER SECURITY, ETHICS AND MAINTENANCE

Lecture 10: Computer Security, Ethics and Maintenance


10.1 Introduction
10.2 Lecture Objective
10.3 Importance of Computer Security
10.4 Cyber Security Threats
10.5 Password and Other Authentication Options
10.6 Cybercrimes
10.7 Data Security and Backup
10.8 Computer Ethics and Unethical Use of Computers
10.9 Computer Maintenance and Troubleshooting
10.10 Preventive Maintenance
10.11 Summary
10.12 Exercise
10.13 References

Reading List
1. Shelly G. B., Freund S. M., Vermaat M. E. (2011). Introduction to Computers, 8th edition, ISBN:
13:978-1-4390-8131-0, Shelly Cashman Series, Boston, USA.
2. Shelly G. B., Freund S. M., Vermaat M. E. (2007). Essential Introduction to Computers: And How
to Purchase a Personal Computer, 7th edition, ISBN: 1423912357, 9781423912354, Shelly
Cashman Series, Course, Boston, USA.
3. Wempen F., Hattersley R., Millet R., Shoup K., (2015). Computer fundamentals: Introduction to
computers, ISBN: 978-1-119-03971-6, John Wiley & Sons, Indiana, USA.
4. Nickerson, R. C (2001) Business and Information Systems. Prentice Hall, Hardcover.
5. Donald H. Sanders, Computer Concepts and Applications, 3rd edition ISBN: 0-07-054744-0,
Publisher: McGraw Hill.
6. Gorana C., Dario I. R., “Basic Concepts of Information and Communication Technology”,
Handbook, ITdesk.info, ISBN: 978-953-56758-7-7, Zagreb, 2011
7. Ally S., & Mahenge G., (2008). Introduction to Microcomputer Studies and IT Applications. OCP
100 Study Material for Undergraduate students, The Open University of Tanzania.

10
8. Ralph Stair, George Reynolds, (2005), Fundamentals of Information Systems, Third Edition
ISBN: 0619064919, Publisher: Course Technology; 3 editions.
9. Marie Claire Williams, Using Information Technology NVQ level 2 Student handbooks
Heinemann.
10. Lincoln Andrews, Annette Thomason, The Art of Using Computers, The DPMA Textbook series
11. John D. Carpinelli, Computer Systems Organization and Architecture, Publisher: Addison-
Wesley, Hardcover, Published, (2000), ISBN 0201612534
12. ECDL/ICDL Made Simple (Business Communications Development Ltd), page 1 – 40
13. Laudon K. C, & Traver C. G., (2018). E-Commerce 2018, 14th edition, ISBN: 013483951X,
Pearson
14. Laudon K. C, & Traver C. G., (2017). E-Commerce 2017: Business, Technology and Society,
13th edition, ISBN: 0134602145, 9780134602141, Pearson Education
15. Reynolds J., (2004). The Complete E-Commerce Book: Design, Build & Maintain a Successful
Web-based Business, revised edition, ISBN: 1578203120, 9781578203123, Taylor & Francis,
New York City, USA.
16. Andrea K. & Enrico F. (2016). Electronic Government and the Information Systems Perspective:
5th International Conference, September 5-8, 2016, Proceedings, ISBN: 3319441590,
9783319441597, Springer, 2016, EGOVIS 2016, Porto, Portugal
17. Chen H., Brandt L., et al., (2007). Digital Government: E-Government Research, Case Studies,
and Implementation, Volume 17 of Integrated Series in Information Systems. Illustrated edition,
ISBN: 9780387716114, Springer Science & Business
18. Hilty, L. M., & Aebischer, B. (Eds.). (2015). ICT innovations for sustainability (Vol. 310).
Springer.
19. Shah M. & Clarke S., (2009). E-Banking Management: Issues, Solutions, and Strategies: Issues,
Solutions, and Strategies. Illustrated edition, ISBN: 1605662534, 9781605662534, IGI Global,
2009
20. SCN Education B. V. (2013). Electronic Banking: The Ultimate Guide to Business and
Technology of Online Banking, Illustrated edition, ISBN: 3322866270, 9783322866271, Springer
Science & Business Media,
21. Feng H. & Peter Y. A. R. (2016). Real-World Electronic Voting: Design, Analysis and
Deployment, Illustrated edition, ISBN: 131535411X, 9781315354118, CRC Press
22. Gritzalis D. A., (2012). Secure Electronic Voting, Illustrated edition, ISBN: 146150239X,
9781461502395, Springer Science & Business Media, 2012
23. Fee, K. (2009). Delivering E-Learning: A complete strategy for design application and assessment.
Kogan Page Publishers.
24. Hastings, H., & Sande, S. (2009). White Paper: Considerations for developing an IT disposal
policy. CA IT Asset Management.

11
25. Rahman, M. (2011). Impacts of ICT to Health and Environment: A review of bad effect of ICT in
recent time. LAP Lambert Academic Publishing.
26. Sirohi, S., & Gupta, A. (2010). Koha 3 Library Management System. Packt Publishing Ltd.
27. Suder, A., & Durucu, M. (2015). ICT in Healthcare Management, Developments, and
Applications in Turkish Health Sector. In Healthcare Administration: Concepts, Methodologies,
Tools, and Applications (pp. 74-95). IGI Global.
28. Veletsianos, G. (Ed.). (2010). Emerging technologies in distance education. Athabasca University
Press.
29. Friedman, A., & Singer, P. W. (2014). Cybersecurity and Cyberwar: what everyone needs to know
30. Lehtinen, R., & Gangemi Sr, G. T. (2006). Computer Security Basics: Computer Security,
“O'Reilly Media, Inc”.
31. Rhodes-Ousley, M. (2013). Information security: the complete reference. McGraw Hill Education.
32. Sikorski, M., & Honig, A. (2012). Practical malware analysis: the hands-on guide to dissecting
malicious software. no starch press.
33. Johnson, D. G., & Nissenbaum, H. (1995). Computers, ethics & social values. Prentice-Hall, Inc.
34. Johnson, D. G. (1998). Computer ethics. DIANE Publishing Company.
35. Moor, J. H. (1985). What is computer ethics? Metaphilosophy, 16(4), 266-275.
36. Northcutt, S., Madden, C., & Welti, C. (2004). IT Ethics Handbook: Right and Wrong for IT
Professionals. Elsevier.
37. Bigelow, S. J. (2001). Troubleshooting, maintaining and repairing PCs. McGraw-Hill
Professional.
38. Mueller, S. (2003). Upgrading and repairing PCs. Que Publishing.
39. Rood, S. C. (1996). Computer Hardware Maintenance: An IS/IT Manager's Guide. Butterworth-
Heinemann.

12

You might also like