CIT 115 - Information Technology Fundamentals
3 Lecture Hours
Prerequisites: Basic skills using a personal computer and operating system.
This course explores technical issues involved with computers and information technology. Students will be able to set up a basic workstation, conduct basic software installation, establish basic network connectivity, identify compatibility issues, identify/prevent basic security risks and demonstrate knowledge in the areas of safety and preventative maintenance of computers. This course prepares students considering a career in Information Technology (IT) or desiring a more detailed knowledge of IT fundamentals.
Upon successful completion of the course, the student will:
- Explain the function and features found in common operating systems and applications.
- Demonstrate best practices in information technology.
- Explain the purpose of internal computer components and basic peripherals.
- Compare and contrast different methods of sharing, storage and backup of data.
- Perform appropriate steps to set up a basic workstation and router.
- Implement basic support concepts.
- Identify basic security threats and web-browsing best practices.
- Describe the importance and impact of various environmental and safety concepts.
- Identify alternative technologies and their purpose.
- Types of operating systems, their basic functions and software/hardware compatibility
- Types of applications (productivity, collaboration, utility, specialized)
- Application platforms (mobile, desktop, Web-based) and common file types
- Software best management practices (install/uninstall, patching/updates, version identification, licensing)
- Alternative technologies (virtualization, cloud computing, Web apps, VoIP, gesture-based interaction)
- Wireless device software features (unlocking, Bluetooth pairing, wireless setup, email configuration, synchronization, app stores)
- Input and output devices and their common computer connector types
- Internal computer components (CPU, power supply, RAM, storage, expansion cards, motherboard, cooling)
- Security threats (malware, phishing, social engineering, spam, password cracking, physical security)
- Security best practices (password management, device hardening, secure WiFi, multifactor authentication, suspicious emails, admin versus user versus guest accounts)
- Web browsing best practices (secure protocols, certificate warnings, suspicious links and banner ads, adware, suspicious plugins, autofill forms, cookies, browser history, public workstations)
- Configuring a wired or wireless router
- Cellular, wireless and wired data connections
- Local versus network storage and printing
- Workstation set-up
- Basic support concepts
Textbooks/materials, current and appropriate software, multimedia for lecture and demonstration as required by instructor; access to the Internet.
Students who successfully complete this course acquire general knowledge, skills and abilities that align with CCAC's definition of an educated person. Specifically, this course fulfills these General Education Goals:
Approved By: Bullock, Quintin Date Approved: 03/15/2019
- Critical Thinking and Problem Solving
- Information Literacy
Course and Section Search
Add to Portfolio (opens a new window)