Mdc Computer Sc i II III Syl
Mdc Computer Sc i II III Syl
Mdc Computer Sc i II III Syl
Credit: 03 45 Hours
Course Objective
The goal of this course is to present overview of IT tools used in day to day use of computers and data base operations.
The Course has been designed to provide knowledge on various hardware and software components of computer,
operating system, various packages used for different applications, data base concepts & operations and various issues
related to IT and application of IT.
Syllabus
Introduction – Introduction to computers – Evolution – Generation of Computers – Computers Hierarchy –
Applications of Computers. (5 Hrs)
Windows Basics – Introduction to word – Editing a document - Move and Copy text - Formatting text & Paragraph
– Enhancing document – Columns, Tables and Other features.(10 Hrs)
Introduction to worksheet and shell – getting started with Excel – Editing cell & using Commands and functions –
Moving & Copying , Inserting & Deleting Rows & Columns - Printing work sheet.(5 Hrs)
Creating charts – Naming ranges and using statistical, math and financial functions, database in a worksheet –
Additional formatting commands and drawing toolbar – other commands & functions – multiple worksheet and
macros.(10 Hrs)
Introduction to Database Development: Database Terminology, Objects, Creating Tables, working with fields,
understanding Data types, Changing table design, Assigning Field Properties, Setting Primary Keys, Select data with
queries: Creating simple Query by design & by wizard (10 Hrs)
Overview of Power point – presenting shows for corporate and commercial using Power point –Introduction to Desktop
publishing – Computer viruses – Introduction to Internet – Web features.(5 hrs)
Reference Books:
i. Swinford, E., Dodge, M., Couch, A., Melton, B. A. (2013). Microsoft OfficeProfessional
2013. United States: O'Reilly Media.
ii. Wang, W. (2018). Office 2019 For Dummies. United States: Wiley. Microsoft
Lambert, J. (2019). Microsoft Word 2019 Step by Step. United States: Pearson Education.
iii. Jelen, B. (2013). Excel 2013 Charts and Graphs. United Kingdom: Que.
iv. Alexander, M., Jelen, B. (2013). Excel 2013 Pivot Table Data Crunching. UnitedKingdom:
Pearson Education.
v. Alexander, M., Kusleika, R. (2018). Access 2019 Bible. United Kingdom: Wiley.
Multi/Interdisciplinary courses
Semester-II
Credit: 03 45 Hours
Course Objective
This course is intended to teach the basics involved in publishing content on the World Wide Web. This includes the
‘language of the Web’ – HTML and the fundamental principles of how the Internet and the Web function.
Syllabus
Introduction : Evolution of Internet, concept of Intranet and Internet, Applications of Internet, Types of Connectivity
such as dial – up, leased, VSAT. etc., Internet Server and Clients module in various Operating Systems.(5 Hrs)
Usenet and Internet Relay Chart Introduction to World Wide Web: Evolution of WWW, Basics Features, WWW
Browsers, WWW servers, HTTP & URL’s. (5 Hrs)
WWW Browsers: Basic features, Bookmarks, history. Progress indicators, Personalization of Browsers,
Printing displayed pages and forms, Saving Web pages, Netscape Communicators, Internet Explorer,
Search and Downloads.(5 Hrs)
• Unit-III: Links
o Introduction
o Relative Links, Absolute Links
o Link Attributes
o Using the ID Attribute to Link Within a Document
• Unit-IV: Images
o Putting an Image on a Page
o Using Images as Links
o Putting an Image in the Background
• Unit V: – Tables
o Creating a Table
o Table Headers
o Captions
o Spanning Multiple Columns
o Styling Table
Reference Books
Credit: 3 45 Hrs
Course Objective
It aims to educate individuals about potential cyber threats, best practices for safeguarding sensitive information, and
how to respond effectively in case of a security incident.
Syllabus
History of Internet, Cyber Crime , Information Security ,Computer Ethics and Security , Choosing the Best
Browser according to the requirement and email security, Guidelines to choose web browsers , Securing
web browser , Antivirus , Email security 5 hrs
Guidelines for setting up a Secure password , Two-steps authentication ,Password Manager ,Wi-Fi Security
Guidelines for social media security , Tips and best practices for safer Social Networking , Basic Security
for Windows ,User Account Password 5 hrs
Counter Cyber Security Initiatives in India , Cyber Security Exercise ,Cyber Security Incident Handling
Online Banking Security , Mobile Banking Security , Security of Debit and Credit Card , UPI Security
Security of Micro ATMs , e-wallet Security Guidelines ,Security Guidelines for Point of Sales(POS)
Social Engineering , Types of Social Engineering ,How Cyber Criminal Works ,How to prevent for being
a victim of Cyber Crime
Cyber Security Threat Landscape , Emerging Cyber Security Threats , Cyber Security Techniques ,Firewall
Recovering from Information Loss , Destroying Sensitive Information , CCleaner for Windows
Reference Books: