Computer Hardware and Software CIT 111

Presents a practical view of computer hardware and client operating systems. Covers computer hardware components; troubleshooting, repair, and maintenance; operating system interfaces and management tools; networking components; computer security; and operational procedures.

Correlated Learning Outcomes

  • AR-01 Diagram the digital components of computing architecture. [Applying]
  • AR-09 Demonstrate the basic concepts of interrupts and I/O operations. [Understanding]
  • AR-10 Compare the cost and performance of different types of memory technology. [Analyzing]
  • CYB-03 Investigate various countermeasures and security controls to minimize risk and exposure. [Applying]
  • CYB-08 Apply security principles and practices in a dynamic environment. [Applying]
  • CYB-10 Illustrate with examples the goals of end-to-end data security. [Applying]
  • CYB-13 Discuss the benefits and limitations of designing multiple layers of defenses.[Understanding]
  • CYB-19 Examine likely attack types against standalone and networked systems. [Analyzing]
  • CYB-21 Describe key terms in cryptology, including cryptography, cryptanalysis, cipher, cryptographic algorithm, and public key infrastructure. [Understanding]
  • CYB-25 Explain browser and web security model concepts including same-origin policy, web sessions, and secure communication channels. [Understanding]
  • NC-01 Diagram the basic structure of the Internet. [Applying]
  • NC-02 Describe the layered structure of a typical networked architecture, including routing and switching. [Understanding]
  • NC-03 Diagram the layers of the OSI model, including associated protocols. [Applying]
  • NC-04 Categorize the principles used for naming schemes and resource location.[Analyzing]
  • NC-06 Describe security concerns in designing applications for use over wireless networks. [Understanding]
  • NC-07 Illustrate secure connectivity among networked applications. [Applying]
  • NC-08 Explain the advantages and disadvantages of using virtualized infrastructure in cloud computing. [Understanding] See also PD-05
  • OS-02 Compare prevailing types of operating systems. [Analyzing]
  • OS-03 Illustrate potential threats to operating systems and appropriate security measures. [Applying]
  • OS-05 Illustrate how computing resources are used by applications and managed by the operating system. [Applying]
  • OS-06 Manipulate a device list or driver I/O queue. [Applying]
  • OS-08 Illustrate the principles of memory management. [Applying]
  • OS-09 Illustrate the concepts of virtual memory, including paging, thrashing, and partitioning. [Applying]
  • OS-10 Investigate the features and limitations of an operating system used to provide protection and security. [Applying]
  • OS-13 Diagram the physical hardware devices and the virtual devices maintained by an operating system. [Applying]
  • SP-07 Examine various ethics scenarios in computing. [Analyzing]
  • SP-10 Differentiate the terms among intellectual property, fair-use, copyright, patent, trademark, and plagiarism. [Understanding]
  • SP-16 Use effective oral, written, electronic, and visual communication techniques with stakeholders. [Applying]
  • SP-18 Develop technical artifacts. [Creating]