Course Objectives
1) Students will be able to explain basic terms of information system.
2) Students will be able to explain the basic mechanism of the information system.
3) Students will be able to explain basic knowledge in the information society.
Rubric
| Ideal Level of Achievement (Very Good) | Standard Level of Achievement (Good) | Unacceptable Level of Achievement (Fail) |
Evaluation 1 | Students clearly are able to explain basic terms of information system. | Students partially are able to explain basic terms of information system. | Students are unable to explain basic terms of information system. |
Evaluation 2 | Students clearly are able to explain the basic mechanism of the information system. | Students partially are able to explain the basic mechanism of the information system. | Students are unable to explain the basic mechanism of the information system. |
Evaluation 3 | Students clearly are able to explain basic knowledge in the information society. | Students partially are able to explain basic knowledge in the information society. | Students are unable to explain basic knowledge in the information society. |
Assigned Department Objectives
Teaching Method
Outline:
The goal is to acquire the basic skill of computers as an end user. This lecture depends on `Information Basic I' and `Information Basic II'. In addition, the lecture contents correspond to "information processing utilization ability examination information processing utilization first grade" supported by Ministry of Education.
Style:
This class will be a mix of lectures and exercise style.
Notice:
Those who receive a score of less than 60 points can petition for a supplementary examination. In a case that those who will be awarded credits by the examination, the score will be 60 points.
Characteristics of Class / Division in Learning
Course Plan
|
|
|
Theme |
Goals |
2nd Semester |
3rd Quarter |
1st |
Internet basics |
Application of internet technology and WWW
|
2nd |
Network |
Abstruct of network
|
3rd |
Network |
LAN basic knowledge
|
4th |
Network |
Construction of WiFi and netsork security
|
5th |
Network |
Exercise
|
6th |
Information morals and Network security |
Encyript technology
|
7th |
Information morals and Network security |
Electronic autholization and sigunature
|
8th |
Information morals and Network security |
Exercise
|
4th Quarter |
9th |
Computer Software |
The kinds of software and use
|
10th |
Computer security |
Computer virus
|
11th |
Computer security |
Morals for information and the law
|
12th |
Computer security |
Life and information security
|
13th |
Computer security |
Policy of information security
|
14th |
Computer security |
Exercise
|
15th |
Term examination |
Confirmation of the lecture contents
|
16th |
Confirmation of score |
Summalize the lecture and confirm the score.
|
Evaluation Method and Weight (%)
| Examination | Homework | Mutual Evaluations between students | Behavior | Portfolio | Other | Total |
Subtotal | 80 | 20 | 0 | 0 | 0 | 0 | 100 |
Basic Ability | 40 | 20 | 0 | 0 | 0 | 0 | 60 |
Technical Ability | 40 | 0 | 0 | 0 | 0 | 0 | 40 |
Interdisciplinary Ability | 0 | 0 | 0 | 0 | 0 | 0 | 0 |