Course: GNS 312 – Digital Skill Acquisition  (1 credit – Compulsory)

Course Duration: 1 hour per week for 15 weeks, ((15 hours) Theory and (30 hours) Practical)

 

Developer (s) :  1W. O Egbewole, 2M. I. Ahmed, 3B. A. Oluwade,  3R. G. Jimoh, 3A. O. Ameen, 3O. C. Abikoye, 3A. O. Bajeh, 2A. R. Tomori, 2M. A. Mabayoje, 2M. Abdulraheem, 2A. G. Akintola,  2A. O. Balogun & 2S. A. Salihu

 

 

1General Studies Division

University of Ilorin, Ilorin, Nigeria

 

2Computer Services and Information Technology (COMSIT)

University of Ilorin, Ilorin, Nigeria

 

3Department of Computer Science,

Faculty of Communication & Information Sciences,

University of Ilorin, llorin, Nigeria.

 

Corresponding E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Consultation Hours: 12noon – 2pm (Wednesdays)

 

Course Content

 Computer Fundamentals: types of computers, computer network and information sharing, elements of a personal computer, Understanding Memory, Identifying Input/output Devices, storage systems, types of Printers, and troubleshooting techniques; Computer Security and Privacy: Protecting data and computer, safe working environment, ergonomics, computer viruses, and data backup; The Internet and the Web: Internet providers, connections and protocols. E-mail, Internet services, E-commerce, Browsers, search tools, Web utilities, Intranets, extranets, and firewalls; Office Applications: Operating Systems, Word processor, spreadsheet, database Management system, and presentation graphics.

 

Course Description

The course is designed to deliver required digital literacy skills to all 21st century graduates so as to be able to compete for the 21st century jobs. The course covers general introduction of computing and computer fundamentals, computer security and privacy, internet and the world wide web, operating systems  and office applications.

 

Course Justification

The emerging technology-driven society has changed the required skills and knowledge by university Graduates. This can only be delivered through a digital literacy course with relevance in all disciplines.

 

 

 

 

Course Objectives

The main objectives of this course is to enable students acquire the required digital literacy skills. At the end of this course, the students should be able to:

  1. demonstrate an understanding computing practice and concepts;
  2. understand how to interact with computer and internet resources;

iii. use the wealth of internet to their advantage;

  1. use operating system in a more productive way
  2. use appropriate office applications depending on their field of study;

.

Course Requirements

Students are expected to satisfy all requirements as specified in the course.  Students must as well participate in all assignments whether individual or group. All students must activate their  e-mail accounts. Continuous assessment will be carried out ubiquitously. PC-Tab and internet access are compulsorily required.

 

Methods of Grading

 

S/N

Grading System

Score (%)

1.

Test

15

2.

Electronic Assignment

5

3.

Online discussion

10

4

Final Examinations

70

                                

TOTAL

100

 

Course Delivery Strategies

The course delivery strategies  for lectures and practicals will be purely virtual. An online discussion will be available to all students registered for the course to exchange ideas.

 

Practical Schedule

Students are expected to be familiar with the following:

 

  1. Components of computer
  2. Ways of securing data and information on the internet
  3. Identify components of an E-mail address
  4. Creation of E-mail accounts
  5. Microsoft Access
  6. Establish a one-many relationship between entities of a database
  7. Command prompt
  8. Common windows icons e.g, task bar, menu bar

 

 

 

 

 

 

 

 

 

 

LECTURE CONTENT

 

Weeks 1 and 2: General Introduction to Computer.

 

Objectives

Brief definition of computer, classification and architecture

 

 

Description

Definition of  computer, Describing and explaining basic computer architecture and discussing basis for classifying computers.

 

Practical Hour

Identification of different types of computer based on classifications.

 

Study Questions

What is computer?

Describe computer architecture.

How many generations of computer do we have?.

What is the present generation of computer?.

What are the types computer resulting from classification by type of data?

 

Reading List

French, C.S. (2007). Computer Science, 5th Edition, Cengage Learning, ISBN: 0826458068, 9780826458063

 

Weeks 3 and 4: Components of Computer and Troubleshooting

 

Objectives

The main objectives of this week are to:  identify  and describe components of computer system, characteristics of computer, and troubleshooting.

 

Description

 

First Hour

There will be detailed description and identification of major and popular components of computer hardware. Also, discussion on characteristics of computer will be done so as to reveal justification for its application in the student's field of study. Finally, a brief description on how to carry out computer troubleshooting.

 

Practical Hour

  1. Identification of computer components

2, Troubleshoot a faulty computer

 

Study Questions

  1. What are the characteristics of computer?.
  2. Enumerate the basic components of computer.
  3. Why is the use of external storage inevitable in computing?
  4. What is the difference between ROM and RAM?.
  5. What is a system software?.
  6. State the basic troubleshooting procedures.

Reading List:

French, C.S. (2007). Computer Science, 5th Edition, Cengage Learning, ISBN: 0826458068, 9780826458063

 

Weeks 5  and 6– Computer Security and Privacy

 

Objectives

The objective of this topic is to familiarize the students with the ethics and practice of achieving a secured transactions on computers. Students are expected to:

  1. understand concepts and terminologies of computer security
  2. know possible security threats

iii. understand countermeasures to mitigate against attacks

 

Description

 

First Hour

Fundamentals and concepts of computer security, possible security threat, ways of preventing security attacks.

 

Practical Hour

Describe how different forms of attacks can be prevented.

 

Study Questions

  1. Define computer security.
  2. What is confidentiality?
  3. What is integrity?
  4. What is availability?
  5. Define privacy with respect to computer security?
  6. What are common computer security threats?
  7. Explain spoofing attacks
  8. List four categories of cyber criminals

 

Reading List

  1. Bosworth, S., Kabay, M. E., & Whyne, E.(2014).“Computer Security Handbook ” Sixth Edition, Volume 1. Published by John Wiley & Sons, Inc., Hoboken, New Jersey, U.S.A.
  2. Isaac, D. S., & Isaac, M. J. (2003).“The SSCP Prep Guide: Mastering The Seven Key Areas of System Security ”. Published by Wiley publishing, Inc., Indianapolis, Indiana, U.S.A.
  3. Nestler, V., White, G., & Arthur Conklin, WM.(2011). “Principles of Computer Security: Comptia Security+ and beyond” Lab Manual, Second Edition. Published by McGraw Hill Companies.
  4. Stewart, J. M., Tittel, E., & Chapple, M.(2005).“Certified Information System Security Professionals: CISSP” Study Guide, Third Edition. Published by Sybex Inc., 1151 Marina Village Parkview, Alameda, CA 94501.

 

 

 

Weeks 7 and 8:  Internet and the Web

 

Objectives

The objective of this topic is to enable students:

  1. understand concept of internet and the world wide web
  2. know major Internet Service Provider (ISP)

iii. understand internet connection protocols

  1. use electronic mailing system
  2. understand available internet services
  3. understand web utilities

 

Description

 

First Hour

Students will be introduced to internet and the world wide web. All licensed ISP in Nigeria will be discussed, discussing internet connection protocols, describing operations of the electronic mailing system, discussing internet services and web utilities.

 

Practical Hour

  1. Study of how browser fetches web page from a server by requesting a particular page address.
  2. E-mail account set up, mail composition and processes
  3. Identify the acronym URL and its relevance

 

Study Questions

  1. What is internet?
  2. Explain briefly how browsers fetch web pages.
  3. List any six (6) internet connection protocols
  4. Define web utilities
  5. List common internet and intranet services

               

Reading List

  1. Teach ICT- GCSE ICT- The internet and the WWW. Available at:.http://www.teach-ict.com/gcse_news/internet/internet_www/miniweb/pg5.htm . Retrieved 25 May, 2015
  2. Teach ICT- GCSE ICT- The internet and the WWW. Available at: http://www.teach-ict.com/gcse_news/internet/internet_www/miniweb/pg4.htm. Retrieved 25 May, 2015
  3. Top 15 Most Popular Search Engines | February 2015 http://www.ebizmba.com/articles/search-engines. Retrieved 25 May, 2015
  4. http://searchwindevelopment.techtarget.com/definition/Internet
  5. https://www.reference.com/technology/different-parts-email-address-2b83fd5ca98b21cc. Retrieved 31 August, 2016
  6. http://www.studentprojectideas.com/wp-content/uploads/2014/06/Intranet-Mailing-System.jpg. Retrieved 31 August, 2016

7              https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSbi53Znyvwd1z-KhDU9WuZDk-lh3mCULGf2onMzfOIM2raKtH6uQ. Retrieved 31 August, 2016

  1. Sameer S Paradkar(2014)” eCommerce in the Customer Empowerment Era” Available at: http://www.bptrends.com/bpt/wp-content/uploads/03-04-2014-ARTeCommerce-in-the-Customer-Empowerment-Era-Paradkar.pdf. Retrieved 25 January, 2016.
  2. Jeff Tyson, “How Firewalls Work” Available at: http://computer.howstuffworks.com/firewall.htm. Retrieved  25 May, 2015
  3. http://s.hswstatic.com/gif/firewall.gif Retrieved 25 May, 2015

Weeks  9 and 10: Operating Systems

 

Objectives

The objective of this topic is to introduce to the students concepts and definitions of operating system, two major types of operating systems  (Microsoft Disk Operating System (MSDOS) and Windows) and their basic commands and menus respectively.

 

Description

 

First Hours

Definitions and functions of operating systems, types of operating system, operating system commands in DOS, operating system commands in Windows.

 

Practical Hour

  1. Open a new file
  2. Creating a folder
  3. Copy a document from folder A to another folder B
  4. Start an application program from Windows start bar
  5. Rename a folder named DSA to DSAnew"
  6. View directory in DOS environment
  7. Delete a Directory in DOS environment
  8. List all files that start with alphabet A using wildcards

 

Study Questions

  1. Define operating system
  2. What are types of operating systems
  3. How do we open a new file in Windows environment?
  4. How do we rename a folder in Windows environment?
  5. What command is used to view directory in DOS environment

 

Reading List

https://www.prattlibrary.org/uploadedFiles/www/locations/central/public_computer_center/Introduction%20to%20Windows.pdf

http://searchenterprisedesktop.techtarget.com/definition/system-tray

http://searchenterprisedesktop.techtarget.com/definition/MS-DOS

http://www.tutorialspoint.com/operating_system/os_services.htm

https://www.prattlibrary.org/uploadedFiles/www/locations/central/public_computer_center/Introduction%20to%20Windows.pdf

 

Weeks 11 and 12: Word Processing (Microsoft Word)

 

Objectives

This topic is set to equip  students with practical skills required to be able to use Microsoft Word effectively as an office tool.

 

Description

 

First Hours

Introducing students to Microsoft Word environment, illustrating basic word processing operations in the Microsoft Word environment.

 

Practical Hours

  1. Create new document
  2. Save a document
  3. Copy a text
  4. Paste a text
  5. Format a text
  6. Bold a text
  7. Italicize a text
  8. Underline a text
  9. Create a copy of a document document
  10. Inter a table

Study Questions

  1. How can you start Microsoft Word from start bar
  2. How can a copy of a file document created in Microsoft Word?
  3. Describe how to copy and paste a text in Microsoft Word
  4. How is a text underlined in Microsoft Word?
  5. How do we create a table in Microsoft Word?

 

Reading List

  1. https://www.digitalunite.com/guides/creating-documents/microsoft-word?page=1
  2. https://support.office.com/en-us/word

 

Weeks 13 and 14 : Spreadsheet (Microsoft Excel)

Objective

The objective of this study is to equip student with required practical skills to use Microsoft Excel.

 

Description

First Hours

Introduction to Microsoft Excel environment, illustrating basic  spreadsheet operations in the Microsoft Excel environment.

 

Practical Hours

  1. Create new workbook
  2. Save a workbook
  3. Copy the content of a cell
  4. Paste the content of a cell
  5. Cell formatting
  6. Cell merging
  7. Italicize the content of a cell
  8. Text underlining

 

Study Questions

  1. How do you create a bar chart in Microsoft Excel?
  2. How do you copy a cell from one place to another?
  3. How do you save in Microsoft Excel?
  4. How do you merge cells in Microsoft Excel?
  5. How do you format a cell in Microsoft Excel?

 

Reading List

  1. www.investintech.com/resources/blog/archives/5430-excel-data-tips.html
  2. https://office.live.com/start/Excel.aspx
  3. www.keynotesupport.com/excel-basics/excel
  4. https://support.office.com/.../Excel

 

 

Week 15:  Database Management Application

Objective

The objective of this topic is to equip students with the required practical skills to create and operate basic database applications.

 

 

Description

First Hours

 Introducing students to Microsoft Access environment, illustrating basic  database management operations in the Microsoft Access environment.

 

Practical Hours

  1. Create table using design view
  2. Create queries using wizards
  3. Create forms using wizards
  4. Create report using design view

 

Study Questions

  1. How can you create table from design view in Microsoft Access environment?
  2. How can you create queries using wizards in Microsoft Access environment?
  3. How can you create forms using wizards in Microsoft Access environment?
  4. How can you create report using wizards in Microsoft Access environment?

 

Reading List

  1. www.zoho.com/creator/msaccess‎
  2. https://www.youtube.com/watch?v=eQMc30gSPN8
  3. https://support.office.com/.../Access-2013-videos-and-tutorials-a4bd10ea-d5f4-40c5
  4. www.quackit.com/microsoft_access/tutorial/

 

 General Reading List

  1. French, C.S. (2007). Computer Science, 5th Edition, Cengage Learning, ISBN: 0826458068, 9780826458063
  2. Bosworth, S., Kabay, M. E., & Whyne, E.(2014).“Computer Security Handbook ” Sixth Edition, Volume 1. Published by John Wiley & Sons, Inc., Hoboken, New Jersey, U.S.A.
  3. Isaac, D. S., & Isaac, M. J. (2003).“The SSCP Prep Guide: Mastering The Seven Key Areas of System Security ”. Published by Wiley publishing, Inc., Indianapolis, Indiana, U.S.A.
  4. Nestler, V., White, G., & Arthur Conklin, WM.(2011). “Principles of Computer Security: Comptia Security+ and beyond” Lab Manual, Second Edition. Published by McGraw Hill Companies.
  5. Stewart, J. M., Tittel, E., & Chapple, M.(2005).“Certified Information System Security Professionals: CISSP” Study Guide, Third Edition. Published by Sybex Inc., 1151 Marina Village Parkview, Alameda, CA 94501.
  6. Teach ICT- GCSE ICT- The internet and the WWW. Available at:.http://www.teach-ict.com/gcse_news/internet/internet_www/miniweb/pg5.htm . Retrieved 25 May, 2015
  7. Teach ICT- GCSE ICT- The internet and the WWW. Available at: http://www.teach-ict.com/gcse_news/internet/internet_www/miniweb/pg4.htm. Retrieved 25 May, 2015
  8. Top 15 Most Popular Search Engines | February 2015 http://www.ebizmba.com/articles/search-engines. Retrieved 25 May, 2015
  9. http://searchwindevelopment.techtarget.com/definition/Internet
  10. https://www.reference.com/technology/different-parts-email-address-2b83fd5ca98b21cc. Retrieved 31 August, 2016
  11. http://www.studentprojectideas.com/wp-content/uploads/2014/06/Intranet-Mailing-System.jpg. Retrieved 31 August, 2016
  12. https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSbi53Znyvwd1z-KhDU9WuZDk-lh3mCULGf2onMzfOIM2raKtH6uQ. Retrieved 31 August, 2016
  13. Sameer S Paradkar(2014)” eCommerce in the Customer Empowerment Era” Available at: http://www.bptrends.com/bpt/wp-content/uploads/03-04-2014-ARTeCommerce-in-the-Customer-Empowerment-Era-Paradkar.pdf. Retrieved 25 January, 2016.
  14. Jeff Tyson, “How Firewalls Work” Available at:

                http://computer.howstuffworks.com/firewall.htm.  Retrieved  25 May, 2015

  1. http://s.hswstatic.com/gif/firewall.gif Retrieved 25 May, 2015

16.htps://www.prattlibrary.org/uploadedFiles/www/locations/central/public_computer_center/Introduction%20to%20Windows.pdf

  1. http://searchenterprisedesktop.techtarget.com/definition/system-tray
  2. http://searchenterprisedesktop.techtarget.com/definition/MS-DOS
  3. http://www.tutorialspoint.com/operating_system/os_services.htm

20.https://www.prattlibrary.org/uploadedFiles/www/locations/central/public_computer_center/Introduction%20to%20Windows.pdf

  1. https://training.health.ufl.edu/handouts/Access/2010/Access2010Basics-Notes.pdf
  2. https://training.health.ufl.edu/handouts/access/2007/Access2007.ppt
  3. https://training.health.ufl.edu/handouts/Access/2010/Access2010Basics-Ppnt.pdf
  4. http://www.gcflearnfree.org/access2010
  5. www.investintech.com/resources/blog/archives/5430-excel-data-tips.html
  6. https://office.live.com/start/Excel.aspx
  7. www.keynotesupport.com/excel-basics/excel
  8. https://support.office.com/.../Excel
  9. https://www.digitalunite.com/guides/creating-documents/microsoft-word?page=1
  10. https://support.office.com/en-us/word
  11. www.zoho.com/creator/msaccess‎
  12. https://www.youtube.com/watch?v=eQMc30gSPN8
  13. https://support.office.com/.../Access-2013-videos-and-tutorials-a4bd10ea-d5f4-40c5
  14. www.quackit.com/microsoft_access/tutorial/

 

 

Legend

Available in the University Library

Available in Bookshops.

Available on the Web.

Personal Collection

Departmental Library

GNS Library