powered by
Center for Curriculum and Transfer Articulation
Extended Microcomputer Usage
Course: BPC140

First Term: 1988 Spring
Lec + Lab   2 Credit(s)   3 Period(s)   2.7 Load  
Subject Type: Occupational
Load Formula: S


Description: Microcomputer data protection and storage, legal and ethical responsibilities of end-users and manufacturers, computer communication capabilities, information transfers, hardware and software evaluations and technological developments



MCCCD Official Course Competencies
1. Identify and implement various types of data and program security and maintenance procedures. (I)
2. Describe legal and ethical responsibilities of the end-user including licensing, copyright protections and use of software. (II)
3. Read and interpret manufacturer and/or vendor warranties to the end-user. (II)
4. Describe the steps necessary to set up a communications package. (III)
5. Demonstrate the ability to use communication hardware and software. (III)
6. Convert data from one application software program to another. (IV)
7. Evaluate and recommend hardware and software requirements based on given need. (V)
8. Evaluate the advantages and disadvantages of integrated software and integrating stand-alone packages. (V)
9. Identify possible hardware and software upgrades of various microcomputer systems. (V)
10. Identify and describe available software for ancillary information processing such as memory-resident software, desk top publishing and icon-based systems. (VI)
11. Describe methods which enable an end-user to remain abreast of new microcomputer developments. (VI)
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements.
 
MCCCD Official Course Outline
I. Data Protection and Storage
   A. Physical Security of Software
      1. Disk Storage
      2. Fire
      3. Theft
      4. Loss
   B. Electronic Security
      1. Password Protect
      2. Data Encryption
   C. File Maintenance
      1. Software Repair Utilities
      2. Back-up Files
II. Legal and Ethical Obligations
   A. Software Licensing/Agreements
   B. Copyright
      1. Interpretations
      2. Copying Software
   C. Software Registration
   D. Consumer Responsibilities
   E. Vendor/Manufacturer Responsibilities
III. Computer Communication Capabilities
   A. Hardware
      1. Modems
      2. Local Area Networks (LANS)
   B. Software
      1. Common Functions Supported
      2. Terminal Emulation
   C. Bulletin Boards
      1. Commercial
      2. Free Access
IV. Information Transfers
   A. File Types
      1. Text
      2. DIF
      3. Sylk
      4. ASCII
      5. File Extensions
   B. Methods
V. Hardware and Software Evaluation
   A. Criteria
      1. Needs Assessment
      2. Hardware Support
      3. Software Support
      4. Cost Factors
   B. Integrated Software vs. Integrating Stand-Alone Packages
   C. Upgrades
      1. Hardware
      2. Software
VI. Microcomputer Technological Developments
   A. Hardware/Software
      1. Memory-Resident Software
      2. Desk Top Publishing
      3. Icon-Based Systems
   B. Publications
   C. User Groups
 
MCCCD Governing Board Approval Date:  11/10/1987

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.