week
| Topics of practical / seminars
| Number of academic hours
| Used visual aids, and others. The material and technical equipment
| recommended reading
|
| Practice 1.Role of ICT in key sectors of development of society. Standards in the field of ICT.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 1-2
|
| Practice 2.Computer Systems. Overview of computer systems. Components of computer systems. The evolution of computer systems
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 3-5
|
| Practice 3.The peripheral devices of a computer. Setup and installation of peripherals
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 3-5
|
| Practice 4.Software. Operating systems.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 3-5
|
| Practice 5.Representation of data in computer systems. Bits and bytes. Number Systems. The use of computer systems.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 1-5
|
| Practice 6.System database. Fundamentals of database management systems: concept, characteristics, architecture. Data Model. Normalization.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 6-7
|
| Practice 7.Working in Microsoft Access 2010
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 6-7
|
| Practice 8.Networking and Telecommunications
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 1-2
|
| Practice 9.Networking and Telecommunications
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 1-2
|
| Practice 10. Cybersecurity. Threats to Information Security. Methods of information security. Means of protection of information systems. Software and technical measures to ensure information security. Cryptographic data protection.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 8-10
|
| Practice 11. Internet technology. Introduction to Internet technologies. Architecture. The client-server and peer to peer network.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 11-14
|
| Practice 12.Cloud technology. General characteristics of cloud computing.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 15-17
|
| Practice 13. Multimedia technologies.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 18-20
|
| Practice 14.Smart Technology. Priorities for SMART Technologies.
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 18-19
|
| Practice 15.E-technology. E-commerce
|
| Interactive board, work with personal computers programs, a methodical instructions of practical works, slides
| 11-12
|