Introduction to Information Technology - Syllabus
Embark on a profound academic exploration as you delve into the Introduction to Information Technology course (IIT) within the distinguished Tribhuvan university's BIT department. Aligned with the BIT Curriculum, this course (BIT101) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description: This course covers basic concepts of computers, computer hardware, memory, input/output devices, computer software, data representation, database, computer networks, internet, computer security and applications of IT.
Course Objectives: The main objective of this course is to provide basic knowledge of fundamental concepts of computer system and Information Technology.
Units
Key Topics
-
Introduction to E-commerce
IN-1Overview of E-commerce and its significance in the digital age.
-
E-business vs E-commerce
IN-2Understanding the differences between E-business and E-commerce.
-
Features of E-commerce
IN-3Key characteristics and benefits of E-commerce.
-
Pure vs Partial E-commerce
IN-4Types of E-commerce models and their applications.
-
History of E-commerce
IN-5Evolution and development of E-commerce over time.
-
E-commerce Framework
IN-6Understanding the components of E-commerce framework including People, Public Policy, Marketing and Advertisement, Support Services, and Business Partnerships.
-
Types of E-commerce
IN-7Overview of different types of E-commerce including B2C, B2B, C2B, C2C, M-Commerce, U-commerce, Social-Ecommerce, and Local E-commerce.
-
Challenges in E-commerce
IN-8Common obstacles and difficulties faced in E-commerce.
Key Topics
-
Nature of Internship
CO-1The internship work should be relevant to the field of computer science and information technology, with a minimum duration of 180 hours or ten weeks.
-
Phases of Internship
CO-2The internship evaluation consists of three phases: Proposal Submission, Mid-Term Submission, and Final Submission.
-
Provision of Supervision
CO-3A regular faculty member of the college is assigned as a supervisor to supervise the students throughout the internship period.
-
Provision of Mentorship
CO-4A regular employee of the intern providing organization is assigned as a mentor to guide the students throughout the internship period.
-
Evaluation Scheme
CO-5The evaluation scheme consists of Proposal Defense, Midterm, and Final Defense, with a total of 200 marks.
-
Report Contents
CO-6The internship report should contain prescribed content flow, including introduction, problem statement, objectives, and references.
-
Citation and Referencing
CO-7The citation and referencing standard should be APA referencing standard, with proper citation and referencing in the document.
-
Report Format Standards
CO-8The report format standards include page number, page size and margin, paragraph style, text font, section headings, figures and tables.
-
Final Report Binding and Submission
CO-9The final report should be submitted in three copies, with a golden embracing and black binding, to the Dean Office, Exam Section, Institute of Science and Technology, Tribhuvan University.
-
Programmable Array Logic (PAL)
CO-10A type of digital integrated circuit that can be programmed to perform a specific digital function, similar to PLA but with some differences.
-
Optical Disk
CO-11A type of secondary storage that uses light to read and write data, including CDs, DVDs, and Blu-ray discs.
-
Magneto-Optical Disk
CO-12A type of secondary storage that uses a combination of magnetic and optical technologies to store data.
-
How the Computer uses its Memory
CO-13The process of how a computer uses its memory to execute instructions and perform tasks.
-
Protection and Security
CO-14Protection mechanisms for programs, processes, users, and resources.
-
User Interface
CO-15User interface, including command-line interface (CLI) and graphical user interface (GUI).
-
Examples of Operating Systems
CO-16Examples of operating systems, including MS-DOS, Windows, and Linux.
-
Software Licensing
CO-17Concept of software licensing and its policies.
-
Open-Source Software
CO-18Definition and benefits of using open-source software.
-
Case Study: Unix Vs Windows
CO-19Comparison of Unix and Windows operating systems in various aspects.
Key Topics
-
Nature of Internship
CO-1The internship work should be relevant to the field of computer science and information technology, with a minimum duration of 180 hours or ten weeks.
-
Phases of Internship
CO-2The internship evaluation consists of three phases: Proposal Submission, Mid-Term Submission, and Final Submission.
-
Provision of Supervision
CO-3A regular faculty member of the college is assigned as a supervisor to supervise the students throughout the internship period.
-
Provision of Mentorship
CO-4A regular employee of the intern providing organization is assigned as a mentor to guide the students throughout the internship period.
-
Evaluation Scheme
CO-5The evaluation scheme consists of Proposal Defense, Midterm, and Final Defense, with a total of 200 marks.
-
Report Contents
CO-6The internship report should contain prescribed content flow, including introduction, problem statement, objectives, and references.
-
Citation and Referencing
CO-7The citation and referencing standard should be APA referencing standard, with proper citation and referencing in the document.
-
Report Format Standards
CO-8The report format standards include page number, page size and margin, paragraph style, text font, section headings, figures and tables.
-
Final Report Binding and Submission
CO-9The final report should be submitted in three copies, with a golden embracing and black binding, to the Dean Office, Exam Section, Institute of Science and Technology, Tribhuvan University.
-
Programmable Array Logic (PAL)
CO-10A type of digital integrated circuit that can be programmed to perform a specific digital function, similar to PLA but with some differences.
-
Optical Disk
CO-11A type of secondary storage that uses light to read and write data, including CDs, DVDs, and Blu-ray discs.
-
Magneto-Optical Disk
CO-12A type of secondary storage that uses a combination of magnetic and optical technologies to store data.
-
How the Computer uses its Memory
CO-13The process of how a computer uses its memory to execute instructions and perform tasks.
-
Protection and Security
CO-14Protection mechanisms for programs, processes, users, and resources.
-
User Interface
CO-15User interface, including command-line interface (CLI) and graphical user interface (GUI).
-
Examples of Operating Systems
CO-16Examples of operating systems, including MS-DOS, Windows, and Linux.
-
Software Licensing
CO-17Concept of software licensing and its policies.
-
Open-Source Software
CO-18Definition and benefits of using open-source software.
-
Case Study: Unix Vs Windows
CO-19Comparison of Unix and Windows operating systems in various aspects.
Key Topics
-
Introduction to Databases
DA-1Introduction to databases, including examples and basic concepts.
-
Database Management System
DA-2Introduction to Database Management Systems (DBMS), including advantages and examples.
-
Database Users
DA-3Types of database users, including actors on the scene and workers behind the scene.
-
Benefits of Databases
DA-4Advantages and benefits of using databases.
-
Data Models
DA-5Types of data models, including hierarchical, network, ER, relational, and object models.
-
Three-Schema Architecture
DA-6Three-schema architecture, including internal, conceptual, and external views.
-
Data Independence
DA-7Data independence, including logical and physical independence.
9.1 Introduction
Brief background about data communication and the computer networks and their importance.
9.2 Importance of Networking
Resource sharing, information sharing, as a communication medium, back-up and support
9.3 Data Transmission Media (Twisted pair, coaxial cable, Optical fiber, RF transmission, microwave transmission, satellite transmission)
Twisted pair, coaxial cable, optical fiber, RF transmission, microwave transmission, satellite transmission
9.4 Data Transmission across Media
o Transmission modes—Simplex, halfduplex, full- duplex
o Transmission speed—Bandwidth, throughput, attenuation, distortion
o Fundamentals of transmission—
Electromagnetic waves, signals
▪ Analog and digital signals
▪ Modulation and demodulation—
Amplitude, frequency, phase shift
▪ Multiplexing—FDM, WDM
▪ Asynchronous and synchronous transmission
9.5 Data Transmission and Data Networking
Switching - Circuit switching, message switching, packet switching
9.6.1 Network Types
Switching - Circuit switching, message switching, packet switching
9.5 Network Types
o Network types—LAN, MAN, WAN
9.6.2 Network Topology
o Network topologies—Bus, ring, star
9.6.3 Communication Protocol
o Communication protocol—The seven layers of OSI model
9.6.4 Network Devices
o Network devices—NIC, repeater, bridge, hub, switch, router, gateway
9.7 Wireless Networking
Bluetooth technology, wireless LAN, wireless WAN
B. Internet
10.2 History of Internet
TCP/IP, Internet applications, WWW, browser
10.3 Internetworking Protocol
TCP/IP
10.4 The Internet Architecture
Client, local ISP, regional ISP, backbone
10.5 Managing the Internet
ISOC, IAB, IETF, IESG, IRTF, IANA, InterNIC, W3C
10.7 Internet Connections
Dial-up access, leased line, ISDN, DSL, cable modem
10.8 Internet Address; WWW, Domain Name System
WWW, Domain Name System
10.9 Internet Services;E-mail and its working principle; E-commerce and E-governance,
o WWW—Web browser, URL, Internet search engines, WWW development languages
o Electronic mail—E-mail address, e-mail message format, e-mail services (application
o based e-mail, webmail), how email works (client-server model)
o File transfer protocol—How FTP works (client- server model)
o Terminal network
o News
o Internet relay chat
Web2.0
What is Web? Explain web2.0 Ver
Internet of Things (IoT)
What is Internet of Things (IoT)?
Wearable computing
What is Wearable computing?
Cloud computing
Cloud computing and it’s importance
Smart City
Smart cities vs ICT and it’s importance
Case Study: ISP in Nepal and their services
Case Study: ISP in Nepal and their services
Introduction
What is Database, DBMS and RDBMS?
12.2 Database
o File-oriented approach and database approach
o Characteristics of database approach
o Data models, schemas and instances
o Conceptual data model—Entity, attribute, relationship, and E-R model
o Representation data model—Hierarchical, network, relational data model
o Low level, or physical data model
12.3 Database System
o Components of database system— Users, software, hardware, and data
o Architecture of database system—Internal level, conceptual level, and external level
Database Management System
o Data independence—Logical data independence, physical data independence
o Data dictionary, Database Administrator (DBA)
o Database languages—DDL, and DML
12.5 Database System Architectures
o Centralized DBMS architecture, client-server architecture, and distributed database
Database Applications
Different purposes like (1) personal databases; (2) workgroup databases (3) departmental databases and (4) enterprisedatabases
Introduction to Data Warehousing
Concept of Data Warehouse
Data mining
Concept of Data mining
BigData
Concept of BigData
Key Topics
-
Introduction to Computer Security
CO-14.1Background about why we require Computer security with different types of security attacks, mechanism available and various services provided by a system.
-
Security Threat and Attack
CO-14.2Difference between Security Threat and Security Attack. Types of security attack.
-
Malicious Software
CO-14.3Types of malicious software including Virus, worm, trojan horse, JavaScript, java applet, ActiveX control.
-
Security Services
CO-14.5Confidentiality, integrity, authentication, non-repudiation services provided by a system.
-
Security Mechanisms
CO-14.6Cryptography, Digital Signature, Firewall, Users Authentication, Intrusion Detection Systems and other security measures.
-
Security Awareness
CO-14.12Security awareness to enhance the security of the organization’s resources by improving the awareness of the need to secure the system resources.
-
Security Policy
CO-14.13Formulating a security policy to ensure the security of system resources.
Key Topics
-
Application of IT
AP-01Describe what is IT and explain various areas where IT can be used.
-
Impact of IT on Organization and Individuals
AP-02Explain how technology and information systems are essential to maintaining, supporting, and enriching many aspects of the lives of individuals and operations of organizations, including both positive and negative impacts.
-
Societal Impacts of IT
AP-03Explain how technology and information systems influence many aspects of societies.
-
IT Strategic Planning
AP-04Explain the concept of organization Strategic Planning and IT strategic planning to meet organization strategic objectives and business goals.
-
IT and Business Alignment
AP-05Explain how IT Operational or tactical (getting technology in place) align with the business objectives and to drive business results.
Lab works