KEMBAR78
Web Syllabus | PDF | Computer Network | Ip Address
0% found this document useful (0 votes)
44 views4 pages

Web Syllabus

The document outlines a curriculum for a computer hardware and networking course, detailing competencies, content, and learning outcomes across various topics. It covers safety procedures, computer assembly, operating system installation, troubleshooting, and ethical computing in the first term, followed by networking, security, and project work in subsequent terms. Each section specifies the duration and expected skills to be acquired by students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views4 pages

Web Syllabus

The document outlines a curriculum for a computer hardware and networking course, detailing competencies, content, and learning outcomes across various topics. It covers safety procedures, computer assembly, operating system installation, troubleshooting, and ethical computing in the first term, followed by networking, security, and project work in subsequent terms. Each section specifies the duration and expected skills to be acquired by students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Competency

Competency Content Learning Outcomes Period


Level
Term 1:
Fundamentals of
120
Computer
Hardware
Personal Safety & Electrical
Precautions: Handling electrical
components, Preventing electrical
hazards, Using anti-static wrist
straps and mats, Proper handling
of power supplies and batteries,
First aid for electrical shocks. Demonstrate proper
Safe Handling of Computer handling of computer
Components: Preventing damage hardware components.
to motherboard, CPU, RAM; ESD Identify potential
prevention techniques; Proper electrical and physical
Safety
storage and transportation. hazards. Apply safety
Procedures in
Workplace Safety & precautions while
Computer Week 1 10
Ergonomics: Ergonomic assembling and
Hardware &
workspace setup, Preventing troubleshooting
Networking
repetitive strain injuries, Proper hardware. Implement
ventilation for equipment. Fire cybersecurity
Safety & Emergency measures to protect
Procedures: Fire risks in IT personal and system
environments, Safe use of fire data.
extinguishers, Emergency
response planning. Cybersecurity
Safety: Strong password policies,
Data protection, Malware and
phishing prevention, Safe internet
browsing.
Computer Basics: Definition and
significance of computers.
Describe the evolution
Evolution of Computers: First to
and significance of
Fifth Generation. Characteristics
computers. Identify
of Modern Computers: Speed,
different types of
automation, accuracy, versatility.
computers and their
Introduction to Basic Components of a
Week 2-3 applications. 20
Computers Computer System: Input, output,
Differentiate between
storage, processing units.
hardware and
Hardware vs Software:
software. Recognize
Differences and importance.
key components and
Types of Computers: Desktop,
their functions.
Laptop, Server, Embedded
Systems.
Input, Output & Week 4-5 Input Devices: Keyboard, Mouse, Identify and explain 20
Storage Devices Scanner, Joystick, Microphone. the function of input,
Output Devices: Monitor, Printer, output, and storage
Speaker, Projector. Storage devices. Compare the
Competency
Competency Content Learning Outcomes Period
Level
advantages and
disadvantages of
Devices: HDD, SSD, Optical
different storage
Disks, USB Drives, Memory
technologies.
Cards. Storage Technologies:
Demonstrate the
RAID configurations, Cloud
ability to connect and
Storage principles.
configure these
devices.
Motherboard Role: Function and
importance. CPU & Processing: Identify key
Working principle, clock speed, motherboard
cores. Memory Types: RAM, components and their
Cache, Virtual Memory. Chipsets functions. Explain the
Motherboard and & Expansion Slots: PCIe, RAM role of the CPU and
Week 6-7 20
Components slots, compatibility. Power different types of
Supply Units (PSU): Voltage, memory. Demonstrate
wattage calculation, efficiency the ability to
ratings. BIOS/UEFI & Boot configure BIOS/UEFI
Process: Configuration and settings.
troubleshooting.
Required Tools: Screwdrivers,
anti-static wristbands, thermal
Assemble a fully
paste. Step-by-Step Assembly:
functional PC.
Installing motherboard, CPU,
Identify and resolve
RAM, Storage devices.
Computer assembly-related
Week 8-9 Connecting Power & 20
Assembly issues. Demonstrate
Peripherals: Power supply,
safe and efficient
cables, external devices. Safety
hardware installation
Precautions: Handling delicate
practices.
components, avoiding static
discharge.
Types of OS: Windows, Linux,
macOS. Installation Process:
Bootable media, installation steps.
Install and configure
Partitioning Hard Drives: Disk
an operating system.
Installing and partitions, Dual Boot Setup.
Manage user accounts
Configuring an Week 10-11 Installing Drivers & Software: 20
and permissions.
OS Importance of drivers, software
Install necessary
management. User Account
drivers and software.
Management: Creating accounts,
setting permissions, managing
security.
Troubleshooting Week 12 Common Hardware Issues: Diagnose and 10
and Maintenance Causes and solutions. Preventive troubleshoot hardware
Maintenance: Cleaning and issues. Perform
servicing hardware. Diagnostic preventive
Tools: Software utilities, BIOS maintenance. Utilize
troubleshooting. System Errors diagnostic tools for
& Software Crashes: Handling system repair.
Competency
Competency Content Learning Outcomes Period
Level
crashes, safe mode recovery.
Ethical Computing: Definition
and importance of computer
ethics. Privacy & Data
Protection: Ethical handling of Understand the
user data, data privacy laws. importance of ethical
Cyberbullying & Online computing practices.
Harassment: Recognizing and Recognize data
preventing online abuse. privacy laws and best
Computer Intellectual Property & practices. Identify
Week 13 10
Ethics Copyright: Understanding ways to prevent
software licenses, fair use cyberbullying and
policies. Responsible Internet online harassment.
Use: Avoiding plagiarism, Apply ethical
respecting digital rights. decision-making in
Professional Conduct in IT: IT-related scenarios.
Ethical hacking, responsible
software development, avoiding
conflicts of interest.
Term 2 & Term
3: Networking,
240
Security &
Projects
Explain different
types of networks and
Network Types: LAN, WAN, their use cases.
MAN. Network Topologies: Bus, Identify and
LAN & WAN
Weeks 1-2 Star, Mesh, Hybrid. Data differentiate between 20
Basics
Transmission: Wired vs Wireless various network
networks, Transmission mediums. topologies. Describe
different data
transmission methods.
Identify and explain
Networking Devices: Switches, the function of
Routers, Modems. Cables & networking devices.
Network
Connectors: Ethernet, Fiber Demonstrate proper
Hardware & Weeks 3-4 20
Optic, Coaxial cables. cabling techniques.
Cabling
Networking Standards: IEEE Understand
802.3, 802.11. networking standards
and protocols.
Apply IP addressing
IPv4 & IPv6 Addressing: schemes. Perform
Structure, classes, subnet masks. subnetting
IP Addressing &
Weeks 5-6 Subnetting Techniques: CIDR, calculations. 20
Subnetting
VLSM. Private vs Public IPs: Differentiate between
Usage and importance. private and public IP
addresses.
Configuring Weeks 7-8 Network Setup: Configuring Set up a small local 20
Local Networks home/office networks. DHCP & network. Use network
Competency
Competency Content Learning Outcomes Period
Level
troubleshooting tools
DNS: Assigning IP addresses
effectively. Configure
dynamically. Troubleshooting
DHCP and DNS
Tools: Ping, Tracert, Nslookup.
settings.
Security Threats: Malware,
Recognize
Phishing, DoS Attacks. Firewalls
cybersecurity threats
& Encryption: Network security
and risks. Implement
Cybersecurity & policies, data encryption
Weeks 9-10 security best practices. 20
Firewalls techniques. User Authentication
Configure firewalls
& Access Control: Multi-factor
and access control
authentication, Role-based access
measures.
control.
Set up and configure
Wi-Fi Standards: 802.11
wireless networks.
a/b/g/n/ac/ax. Server
Wireless Configure and manage
Configuration: File servers, Web
Networking & Weeks 11-12 different types of 20
servers, Cloud servers. Network
Servers servers. Understand
Protocols: HTTP, HTTPS, FTP,
various network
TCP/IP.
protocols.

You might also like