To see movie files in 1.2.2 Applications of Computer Systems, Windows compatible sound card and speakers (or headphones) are needed.
To complete Exercise 3, Visual Basic 6.0 or Visual Basic 6.0 Run-Time Files are required. Refer to Appendix A. Running a Visual Basic File for instructions on running a Visual Basic file.
To complete Optional Exercise 1, Microsoft Access 2000 or higher is required.
To complete Exercise 3, WinZip application is required. Refer to Appendix B. Downloading WinZip Application for instructions to download WinZip application.
Outline:
Weeks
Lectures
Laboratory work
ISST
ISS
Unit 1. Computer Systems
1.1 Overview of Computer Systems
1.1.1Components of a Computer System
1.2 Evolution of Computer Systems
1.2.1 Brief History
1.2.2 Applications of Computer Systems
Lab1:Computer Disassembly
MCQ1
MCQ2
i. 3,8, 13, 14 (RM)
1.3 Data Representation in a Computer System
1.3.1 Bits and Bytes
1.3.2 Number Systems
Unit 2. Hardware Systems
2.1 Processor and Memory
2.1.1 Processor Basics
2.1.2 Type of memory
2.2 Peripherals
2.1.1 Connecting Peripherals
2.2.2 Buses
2.2.3 Input/Output Devices
Lab2: Benchmarking (Optional)
Binary to Decimal and Decimal to Binary Conversion
Exercise 1
MCQ3
MCQ4
MCQ5
i. 1, 2,6,4,5(RM)
2.3 Storage Devices
2.3.1 Disk Controller Interfaces
2.3.2 Mass Storage
2.4 Putting Together the Hardware
Components
2.4.1 How Components Work Together
Lab3: Researching a Computer System
Lab4: Online Configuration
MCQ6
i. 9, 11(RM)
2.5 Improving Computer Performance
2.5.1 Moore's Law
2.5.2 Bottlenecks
2.5.3 Throughput and Latency
Unit 1 and Unit 2 Review Materials
Lab5:Improving Computer Performance
Exercise 2
MCQ7
i. 10 (RM)
Unit 3. Operating system software
3.1 Structure
3.1.1 Layers of Software
3.1.2 The BIOS: Life at the Bottom
3.1.3 Process Control
3.2 Device Management and
Configuration
3.2.1 Interrupt Handling
3.2.2 Hardware Attributes
3.2.3 Configuration
Exam 1 Multiple-Choice
Exam 1 Practical
MCQ8
MCQ9
i. 7,12 (RM)
3.3 Resource Sharing
3.3.1 Virtual Memory
3.3.2 File and Printer Sharing
3.4 File Systems
3.4.1 File Organization
3.4.2 File Allocation Table and NT File System
Lab6: Device Management
Lab7:File Systems Organization
Exercise 3
MCQ10
MCQ11
Unit 4. Application Software
4.1 Software Basicis
4.2 Using Software Systems
Lab8: DOS Commands
Lab9: Macros
Lab10: Embedding Application Objects
4.5 Software Engineering
4.5.1 Issues in Large-Scale Software Development
4.5.2 Open Source Model
4.5.3 Tools for Software Creation and Management
Review Materials
Lab12: Searching the Library of Congress
Optional Exercise 1
Exercise 4
MCQ16
Unit 5. Network Systems
5.1 Internet basics
5.1.1 MIME types
5.2.1 Internet Languages
Exam 2 Multiple-Choice
Exam 2 Practical
MCQ17
5.2 Local and Wide Area Networks
5.3 Communication Strategies
5.3.1 Client-Server Framework
5.3.2 Peer-to-Peer Networking
5.4 Data Transfer Technologies
Lab13:Creation of WWW-pages
Lab14: Data Transfer Technologies
MCQ18
MCQ19
MCQ20
5.5 Internet Architecture
5.5.1 Routers and TCP/IP
5.5.2 Domain Name Service
5.5.3 Connectivity
5.5.4 Internet Service Providers
Lab15:Observing DNS Name Resolution
Exercise 5
MCQ21
Unit 6. Computer Security
6.1 Security Threats
6.1.1 Intruders: Who, Why, and How?
6.1.2 Identity Theft and Privacy Violation
6.1.3 Malicious Software
6.1.4 Denial of Service
Students are not allowed to miss classes and use cell phones during classes. There are no late workshops for students who missed lecture or laboratory class. (NO “OTRABOTKA”) Instructor may change course outline at any time during the course. Late submission of written assignments will be penalized 3% (minus three per cent) for every day late. Students may come to see Tutor only at Office Hours time or by appointment.
Deadline for each task must 1 week.
Plagiarism
Plagiarism is the copying or close paraphrasing of published or unpublished work, including the work of another student; without the use of quotation marks and due acknowledgement.
Plagiarism and collusion are offences, and the University takes cases of such offences very seriously. Students found guilty of committing either offence will be punished.
You should not lend your work to another student, even if that student is a friend and you are trying to be helpful. If your friend’s work appears to be similar to yours, you both run the risk of being penalized and get mark ZERO.
Considered in meeting at Department of Information Technologies, transaction ¹ _____