Sunteți pe pagina 1din 4

Description of Module

Module Number
8
Code:
SMO 06204
1. Name:
INFORMATION AND COMMUNICATION
TECHNOLOGY
2. Number of Credits
12
3. Sub enabling Outcomes:
1.3.1 Identify security threats in an organization
1.3.2 Explain protection mechanisms to secure information
1.3.3 Explain information security, ethics and privacy in computing
1.3.4 Discuss e-commerce applications for business transactions
1.3.5 Apply search engines in solving business problems
Describe the impact of computers in organizations
1.3.6 Use word processing software in business activities
1.3.7 Apply spreadsheets in solving business problems
1.3.8 Create power point slides presenting business issues
1. Pre requisite Module:
Computer Application in Business (SMT
05104)
2. Learning Context:
Lecture, group discussions, individual
assignments and tutorials
3. Learning Materials: Text books, manuals, handouts, power and
point slides.
4. Integrated Methods of Assessment:
Continuous Assessment 40%
Semester Examination 60%
5. REFERENCES;
1. Pearson, J.J and Oja, D (2003); New perspective on Computer
concepts-comprehensive, 9th edition, course
technology
Company.
2. Rae,E (2009); Information Technology and Computer
Applications in Business, Financial Times Prentice Hall
3. Soffer P and Proper E (2011) Information Systems Evolution: Case
forum 2010, Springer publisher.UK
4. Waterhouse S. (2004) Office automation and word Processing
Fundamentals, Herpercollins
5. Webster T,
(2005) office automation and word processing
Buyers Guide, McGraw-Hill higher Education

1.3.1 Analyze security


threats in an
organization

4.3.2 Explain protection


mechanisms to
secure
information

1.

Describe types of computer


security
2.
Identify ways to safeguard
against computer viruses, worms,
Trojan horses, botnets, denial of service
attacks, back doors, and spoofing
3.
Discuss techniques prevent
unauthorized computer
access and
use
4.
Identify safeguards against hardware
theft and vandalism
1. Explain ways software manufacturers
protect against software piracy
2. Define encryption and explain why it
is necessary
3.Discuss types of devices available
that
protect computers from system failure
computer

4.3.3 Explain information


security ,ethics and
privacy in computing

1. Explain the options available


2. for backing up computer resources
3. Identify risks and safeguards
associated with wireless
communications
4. Recognize issues related to information
accuracy, rights, and conduct
5. Discuss issues surrounding information
privacy
6. Discuss ways to prevent health-related
disorders and injuries due to computer
use
7. Discuss Types of Information Security
Controls

4.4.1 Discuss eCommerce


applications for
business transactions

1. Introduce the concept of e-commerce


2. compare traditional commerce and ecommerce
3. Explain:

Models of E-commerce
Advantages/ Disadvantages of ecommerce
4. analyze Transaction Process In ecommerce identify requirements for
Creation of online storefront
5. identify requirements for Creation of
online storefront
6. explain electronic payment systems
7. explain e-banking, e-tailing and ATM
8. analyze the Importance of e-commerce
to SMEs in developing Countries like
Tanzania

4.4.2 Apply search


engines in solving
business problems

4.4.3 Describe the


impact of computers
in organization
4.5.1 Apply word
processing in
business activities

4.5.2 Apply spreadsheets in


solving business

1. explain search engine


2. mention examples of search engine
3. search materials on the internet

1. Identify the impact of IT on


organization.
2. Identify the impact of IT on
individuals.
3. Identify the societal impact of IT.
1. Type, Edit, Proof and Review typed
document
2. Format Text & Paragraphs
3. Apply Automatic Formatting and Styles
4. Work with Tables
5. Apply Graphics and Frames
6. Apply Mail Merge
7. Automate Your Work & print
Documents
1. Work & Edit In Workbooks
2. Create Formats & Links

problems

4.5.3 Create power point


slides for making
business
presentations

3. Format a Worksheet & create graphic


objects
4. Create Charts (Graphs), format and
analyze data
5. Organize Data in a List (Data
Management)
6. Share & Import Data
Apply Printing
1.
2.
3.
4.

Get started with PowerPoint


Create & edit power point slides
Preview a slide show
Add :
picture & graph
sound & video
auto shape
5. Animate objects

S-ar putea să vă placă și