0% found this document useful (0 votes)
12 views4 pages

INF101 Course Outline (2025)

INF 101 is an introductory computing course at the University of Cape Coast that covers fundamental concepts of hardware, software, networking, and computer security, along with social and ethical issues. Students will learn to evaluate computer components and software, understand the impact of cybercrime, and develop skills for online information validation. The course includes quizzes, exams, and a strict attendance policy, with grading based on the university's system.

Uploaded by

s4zwjtgvzx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

INF101 Course Outline (2025)

INF 101 is an introductory computing course at the University of Cape Coast that covers fundamental concepts of hardware, software, networking, and computer security, along with social and ethical issues. Students will learn to evaluate computer components and software, understand the impact of cybercrime, and develop skills for online information validation. The course includes quizzes, exams, and a strict attendance policy, with grading based on the university's system.

Uploaded by

s4zwjtgvzx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

INF 101: INTRODUCTION TO COMPUTING

University of Cape Coast


Dept. of Comp. Sci. & Info. Tech
Faculty of Physical Sciences
College of Agricultural & Natural Sciences

————————————————————————————————————————————
Instructor: Kofi Akotoye Email: xakotoye@ucc.edu.gh
Credit Hours: 3 Term: Semester 1/2025
Office Hours: Tuesday/09:00 - 11:00 Phone: 020 940 7354 (Whatsapp only)
————————————————————————————————————————————
COURSE DESCRIPTION
This course will introduce students to computers and its application to problem solving. Students will learn
fundamental concepts of hardware, software, networking, computer security and e-commerce application.
Additional lectures examine social, legal, ethical issues including privacy, intellectual property, health con-
cerns, green computing, and accessibility. Students will also learn techniques to search, evaluate, validate,
and cite information found online.
The mode of delivering the course will be by lectures, class discussions and collaborative investigation.

STUDENT LEARNING OUTCOMES


After successfully completing this course, the student should be able to:

ˆ explain what the basic concept of modern computers is.

ˆ identify and evaluate the components of a modern computer.

ˆ identify and evaluate the various computer softwares.

ˆ evaluate the functions and applications of computers.

ˆ demonstrate a clear understanding of the impact of cybercrime, ethical and privacy issues and rec-
ognize the impact of computers on society.

REFERENCES

ˆ Vermaat, M., E., Sebok, S., L., Freund, S., M., Campbell, J., T., Frydenberg, M. (2018). Discover-
ing Computers, Digital Technology, Data, and Devices, Cengage Learning, ISBN: 978-1-337-
28510-0

ˆ Attipoe, E. K. (2019), Introduction to Computers, AA Press, Cape Coast

UNIVERSITY POLICIES:

CLASS ATTENDANCE POLICY


The University attaches great importance to adequate exposure of students to course content and the
benefits of lecture hall/classroom interaction among lecturers and students. Accordingly, students are
required to attend all lectures and laboratory/field practical sessions.
Students should note that lectures and examinations would normally be held during the working week
(i.e., Monday - Friday). However, being a secular institution, it may become necessary for the University
to hold lectures and have examinations over the week-end (Saturdays and Sundays) and on public holidays.

1
To obtain a grade for a course, the student shall not absent himself/herself for more than the equivalent of
three weeks contact hours for the course. This should be cumulative and not necessarily consecutive. This
implies for a three-credit course, the number of classes missed shall not exceed nine (9) hours.

QUALIFYING TO WRITE EXAMS


A candidate shall qualify to write a University Examination if:

ˆ He/she has registered and followed the approved course as a regular student and has not absented
himself/herself for more than the equivalent of three weeks contact hours for the course.

ˆ He/she has continuous assessment marks for relevant course.

ˆ He/she is not under suspension from the University.

ˆ He/she does not owe fees to the University.

PLAGIARISM
Plagiarism includes copying someone elses work with or without their consent, or copying material (such as
text or code) from other sources such as textbooks or the internet without acknowledging the source. Al-
lowing someone access to your work is also deemed an offence because it promotes plagiarism. Plagiarism is
both unethical and criminal, and when you plagiarize you deceive by earning marks that you do not deserve
and rob yourself the opportunity to acquire knowledge. When an act of plagiarism is detected both the
taker and giver will be equally treated as guilty. Disciplinary action will be taken against students
who commit plagiarism.

GRADING AND EVALUATION


Grading is based on the University grading system (see the students’ handbook ). A grade varying from A
to E is determined for the course based on the total mark earned from the assessments.

ASSESSMENT
Quiz 1 To be announced (Online & Paper-based) 20%
Quiz 2 To be announced (Online & Paper-based) 20%
Exams To be announced (Online Only) 60%
COURSE PAGE
INF 101 Moodle page (UCC elearning platform)

CLASS SCHEDULE
Weekday Time Venue
Thursday 2pm - 4pm Online
Tutorial To be announced
ASSISTANT
Aballa Osman

2
Lecture Unit Scope
i. Administrivia
1 Introduction
ii. Overview & Introduction
i. Processor
ii. Memory
2 Computing Components iii. Bus channel
iv. Power Supply
v. Data Representation
i. Keyboard
ii. Pointing Devices
iii. Touch Screens
iv. Pen Input
3 Input & Output Devices
v. Motion, Voice & Video Input
vi. Scanners & Reading Devices
vii. Display Output
viii. Printers ix. Other Output Devices
i. Hard Drives
ii. Flash Memory Storage
4 Storage Devices iii. Optical Storage
iv. Cloud Storage
v. Enterprise Storage
i. Introduction
ii. Productivity Apps
5 Programs & Apps iii. Graphics & Media Apps
iv. System Management Tools
v. Security Tools
i. OS Functions
6 Operating Systems (OS)
ii. Types of Operating Systems
i. Mobile Computers & Desktops
ii. Servers
iii. Terminals
iv. Supercomputers
7 Computers & Mobile Devices
v. Mobile Devices
vi. Cloud Computing
vii. Game Devices
viii. Embedded Devices
i. Internet
ii. The world wide web
8 Internet & Communication I iii. Types of websites
iv. Digital media
v. Web resources and services
i. Communication Networks
ii. Network Communication Standards & Protocols
9 Internet & Communication II iii. Communication Channels
iv. Communication Devices
v. Transmission Media
i. Security
ii. Threats
10 Security & Ethical Issues iii. Privacy
iv. Ethics
v. Defences
3
The instructor reserves the right to change the content of the course material if he/she perceives a need
due to postponement of class caused by inclement weather, instructor illness, etc., or due to the pace of
the course. Students are responsible for any announcement made in class. If you have to send an email,
email with clear subject, course and section number, most importantly, do not reply to one of the earlier
emails. If you have any issues talk to your instructor during office hours or before or after the class, do
not completely rely on emails.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy