Introduction to Information Technology - Syllabus

Course Overview and Structure

Embark on a profound academic exploration as you delve into the Introduction to Information Technology course (IIT) within the distinguished Tribhuvan university's BIT department. Aligned with the BIT Curriculum, this course (BIT101) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.

This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.


Course Description: This course covers basic concepts of computers, computer hardware, memory, input/output devices, computer software, data representation, database, computer networks, internet, computer security and applications of IT.

Course Objectives: The main objective of this course is to provide basic knowledge of fundamental concepts of computer system and Information Technology.

Units

Key Topics

  • Introduction to E-commerce
    IN-1

    Overview of E-commerce and its significance in the digital age.

  • E-business vs E-commerce
    IN-2

    Understanding the differences between E-business and E-commerce.

  • Features of E-commerce
    IN-3

    Key characteristics and benefits of E-commerce.

  • Pure vs Partial E-commerce
    IN-4

    Types of E-commerce models and their applications.

  • History of E-commerce
    IN-5

    Evolution and development of E-commerce over time.

  • E-commerce Framework
    IN-6

    Understanding the components of E-commerce framework including People, Public Policy, Marketing and Advertisement, Support Services, and Business Partnerships.

  • Types of E-commerce
    IN-7

    Overview of different types of E-commerce including B2C, B2B, C2B, C2C, M-Commerce, U-commerce, Social-Ecommerce, and Local E-commerce.

  • Challenges in E-commerce
    IN-8

    Common obstacles and difficulties faced in E-commerce.

Key Topics

  • Nature of Internship
    CO-1

    The internship work should be relevant to the field of computer science and information technology, with a minimum duration of 180 hours or ten weeks.

  • Phases of Internship
    CO-2

    The internship evaluation consists of three phases: Proposal Submission, Mid-Term Submission, and Final Submission.

  • Provision of Supervision
    CO-3

    A regular faculty member of the college is assigned as a supervisor to supervise the students throughout the internship period.

  • Provision of Mentorship
    CO-4

    A regular employee of the intern providing organization is assigned as a mentor to guide the students throughout the internship period.

  • Evaluation Scheme
    CO-5

    The evaluation scheme consists of Proposal Defense, Midterm, and Final Defense, with a total of 200 marks.

  • Report Contents
    CO-6

    The internship report should contain prescribed content flow, including introduction, problem statement, objectives, and references.

  • Citation and Referencing
    CO-7

    The citation and referencing standard should be APA referencing standard, with proper citation and referencing in the document.

  • Report Format Standards
    CO-8

    The report format standards include page number, page size and margin, paragraph style, text font, section headings, figures and tables.

  • Final Report Binding and Submission
    CO-9

    The final report should be submitted in three copies, with a golden embracing and black binding, to the Dean Office, Exam Section, Institute of Science and Technology, Tribhuvan University.

  • Programmable Array Logic (PAL)
    CO-10

    A type of digital integrated circuit that can be programmed to perform a specific digital function, similar to PLA but with some differences.

  • Optical Disk
    CO-11

    A type of secondary storage that uses light to read and write data, including CDs, DVDs, and Blu-ray discs.

  • Magneto-Optical Disk
    CO-12

    A type of secondary storage that uses a combination of magnetic and optical technologies to store data.

  • How the Computer uses its Memory
    CO-13

    The process of how a computer uses its memory to execute instructions and perform tasks.

  • Protection and Security
    CO-14

    Protection mechanisms for programs, processes, users, and resources.

  • User Interface
    CO-15

    User interface, including command-line interface (CLI) and graphical user interface (GUI).

  • Examples of Operating Systems
    CO-16

    Examples of operating systems, including MS-DOS, Windows, and Linux.

  • Software Licensing
    CO-17

    Concept of software licensing and its policies.

  • Open-Source Software
    CO-18

    Definition and benefits of using open-source software.

  • Case Study: Unix Vs Windows
    CO-19

    Comparison of Unix and Windows operating systems in various aspects.

Key Topics

  • Nature of Internship
    CO-1

    The internship work should be relevant to the field of computer science and information technology, with a minimum duration of 180 hours or ten weeks.

  • Phases of Internship
    CO-2

    The internship evaluation consists of three phases: Proposal Submission, Mid-Term Submission, and Final Submission.

  • Provision of Supervision
    CO-3

    A regular faculty member of the college is assigned as a supervisor to supervise the students throughout the internship period.

  • Provision of Mentorship
    CO-4

    A regular employee of the intern providing organization is assigned as a mentor to guide the students throughout the internship period.

  • Evaluation Scheme
    CO-5

    The evaluation scheme consists of Proposal Defense, Midterm, and Final Defense, with a total of 200 marks.

  • Report Contents
    CO-6

    The internship report should contain prescribed content flow, including introduction, problem statement, objectives, and references.

  • Citation and Referencing
    CO-7

    The citation and referencing standard should be APA referencing standard, with proper citation and referencing in the document.

  • Report Format Standards
    CO-8

    The report format standards include page number, page size and margin, paragraph style, text font, section headings, figures and tables.

  • Final Report Binding and Submission
    CO-9

    The final report should be submitted in three copies, with a golden embracing and black binding, to the Dean Office, Exam Section, Institute of Science and Technology, Tribhuvan University.

  • Programmable Array Logic (PAL)
    CO-10

    A type of digital integrated circuit that can be programmed to perform a specific digital function, similar to PLA but with some differences.

  • Optical Disk
    CO-11

    A type of secondary storage that uses light to read and write data, including CDs, DVDs, and Blu-ray discs.

  • Magneto-Optical Disk
    CO-12

    A type of secondary storage that uses a combination of magnetic and optical technologies to store data.

  • How the Computer uses its Memory
    CO-13

    The process of how a computer uses its memory to execute instructions and perform tasks.

  • Protection and Security
    CO-14

    Protection mechanisms for programs, processes, users, and resources.

  • User Interface
    CO-15

    User interface, including command-line interface (CLI) and graphical user interface (GUI).

  • Examples of Operating Systems
    CO-16

    Examples of operating systems, including MS-DOS, Windows, and Linux.

  • Software Licensing
    CO-17

    Concept of software licensing and its policies.

  • Open-Source Software
    CO-18

    Definition and benefits of using open-source software.

  • Case Study: Unix Vs Windows
    CO-19

    Comparison of Unix and Windows operating systems in various aspects.

Key Topics

  • Introduction to Databases
    DA-1

    Introduction to databases, including examples and basic concepts.

  • Database Management System
    DA-2

    Introduction to Database Management Systems (DBMS), including advantages and examples.

  • Database Users
    DA-3

    Types of database users, including actors on the scene and workers behind the scene.

  • Benefits of Databases
    DA-4

    Advantages and benefits of using databases.

  • Data Models
    DA-5

    Types of data models, including hierarchical, network, ER, relational, and object models.

  • Three-Schema Architecture
    DA-6

    Three-schema architecture, including internal, conceptual, and external views.

  • Data Independence
    DA-7

    Data independence, including logical and physical independence.

9.1 Introduction

Brief background about data communication and the computer networks and their importance.

9.2 Importance of Networking

Resource sharing, information sharing, as a communication medium, back-up and support

9.3 Data Transmission Media (Twisted pair, coaxial cable, Optical fiber, RF transmission, microwave transmission, satellite transmission)

Twisted pair, coaxial cable, optical fiber, RF transmission, microwave transmission, satellite transmission

9.4 Data Transmission across Media

o Transmission modes—Simplex, halfduplex, full- duplex

o Transmission speed—Bandwidth, throughput, attenuation, distortion

o Fundamentals of transmission—

Electromagnetic waves, signals

▪ Analog and digital signals

▪ Modulation and demodulation—

 Amplitude, frequency, phase shift

▪ Multiplexing—FDM, WDM

▪ Asynchronous and synchronous transmission

9.5 Data Transmission and Data Networking

Switching - Circuit switching, message switching, packet switching

9.6.1 Network Types

Switching - Circuit switching, message switching, packet switching

9.5 Network Types

o Network types—LAN, MAN, WAN

9.6.2 Network Topology

o Network topologies—Bus, ring, star

9.6.3 Communication Protocol

o Communication protocol—The seven layers of OSI model

9.6.4 Network Devices

o Network devices—NIC, repeater, bridge, hub, switch, router, gateway

9.7 Wireless Networking

Bluetooth technology, wireless LAN, wireless WAN

B. Internet

10.2 History of Internet

TCP/IP, Internet applications, WWW, browser

10.3 Internetworking Protocol

TCP/IP

10.4 The Internet Architecture

Client, local ISP, regional ISP, backbone

10.5 Managing the Internet

ISOC, IAB, IETF, IESG, IRTF, IANA, InterNIC, W3C

10.7 Internet Connections

Dial-up access, leased line, ISDN, DSL, cable modem

10.8 Internet Address; WWW, Domain Name System

WWW, Domain Name System

10.9 Internet Services;E-mail and its working principle; E-commerce and E-governance,

o WWW—Web browser, URL, Internet search engines, WWW development languages

o Electronic mail—E-mail address, e-mail message format, e-mail services (application

o based e-mail, webmail), how email works (client-server model)

o File transfer protocol—How FTP works (client- server model)

o Terminal network

o News

o Internet relay chat

Web2.0

What is Web? Explain web2.0 Ver

Internet of Things (IoT)

What is Internet of Things (IoT)?

Wearable computing

What is Wearable computing?

Cloud computing

Cloud computing and it’s importance
Smart City

Smart cities vs ICT and it’s importance

Case Study: ISP in Nepal and their services

Case Study: ISP in Nepal and their services


Introduction

What is Database, DBMS and RDBMS?
12.2 Database

o File-oriented approach and database approach

o Characteristics of database approach

o Data models, schemas and instances

o Conceptual data model—Entity, attribute, relationship, and E-R model

o Representation data model—Hierarchical, network, relational data model

o Low level, or physical data model

12.3 Database System

o Components of database system— Users, software, hardware, and data

o Architecture of database system—Internal level, conceptual level, and external level

Database Management System

o Data independence—Logical data independence, physical data independence

o Data dictionary, Database Administrator (DBA)

o Database languages—DDL, and DML

12.5 Database System Architectures

o Centralized DBMS architecture, client-server architecture, and distributed database

Database Applications

Different purposes like (1) personal databases; (2) workgroup databases (3) departmental databases and (4) enterprisedatabases

Introduction to Data Warehousing

Concept of Data Warehouse

Data mining

Concept of Data mining

BigData

Concept of BigData




Key Topics

  • Introduction to Computer Security
    CO-14.1

    Background about why we require Computer security with different types of security attacks, mechanism available and various services provided by a system.

  • Security Threat and Attack
    CO-14.2

    Difference between Security Threat and Security Attack. Types of security attack.

  • Malicious Software
    CO-14.3

    Types of malicious software including Virus, worm, trojan horse, JavaScript, java applet, ActiveX control.

  • Security Services
    CO-14.5

    Confidentiality, integrity, authentication, non-repudiation services provided by a system.

  • Security Mechanisms
    CO-14.6

    Cryptography, Digital Signature, Firewall, Users Authentication, Intrusion Detection Systems and other security measures.

  • Security Awareness
    CO-14.12

    Security awareness to enhance the security of the organization’s resources by improving the awareness of the need to secure the system resources.

  • Security Policy
    CO-14.13

    Formulating a security policy to ensure the security of system resources.

Key Topics

  • Application of IT
    AP-01

    Describe what is IT and explain various areas where IT can be used.

  • Impact of IT on Organization and Individuals
    AP-02

    Explain how technology and information systems are essential to maintaining, supporting, and enriching many aspects of the lives of individuals and operations of organizations, including both positive and negative impacts.

  • Societal Impacts of IT
    AP-03

    Explain how technology and information systems influence many aspects of societies.

  • IT Strategic Planning
    AP-04

    Explain the concept of organization Strategic Planning and IT strategic planning to meet organization strategic objectives and business goals.

  • IT and Business Alignment
    AP-05

    Explain how IT Operational or tactical (getting technology in place) align with the business objectives and to drive business results.

Lab works