1
|
Topic 1.
|
Computer Ethics
|
|
|
� Computer Ethics (What are ethics ?)
|
|
|
� Need for Computer ethics
|
|
|
� Computer ethics
|
|
|
� Commandments of computer ethics
|
2
|
Topic 2.
|
Cyber Crime (What is a Cyber Crime?)
|
|
|
� Some most happening Cyber Crime are
|
|
|
� Software Piracy
|
|
|
� Preventing the software Piracy
|
|
|
� Hacking
|
|
|
� Email bombing
|
|
|
� Way to prevent email bombing
|
|
|
� Virus , worm, Trojan attacks and logic bombs
|
|
|
� Worms
|
|
|
� Trojans
|
|
|
� Logic Bombs
|
|
|
� Computer protect
|
|
|
� Unauthorized access
|
3
|
Topic 3.
|
Computer networks
|
|
|
� Network Definition
|
|
|
� Components of a computer networks (Server)
|
|
|
� Components of a computer networks (Resource sharing)
|
|
|
� Communication Channels
|
|
|
� Communication Channels (Co-axial cable)
|
|
|
� What is the Recycle bin
|
|
|
� Communication Channels (Radio Transmission)
|
|
|
� Communication Channels (Satellite Communication)
|
|
|
� Communication Channels (wireless Communication)
|
4
|
Topic 4.
|
Introduction to HTML (Website & HTML)
|
|
|
� Introduction to HTML (Tag)
|
|
|
� The underline code of a web page
|
|
|
� Step to create a web page (Software you need to create a web page)
|
|
|
� Creating and saving a HTML document
|
|
|
� Creating and saving a HTML document (Modifying the HTML document)
|
|
|
� Viewing a web page in the web browser
|
|
|
� Elements of HTML document
|
5
|
Topic 5.
|
Control structures in QBASIC (What is loop?)
|
|
|
� Loop are basically of two types
|
|
|
� For next loop
|
|
|
� While wend loop
|
|
|
� Advantage of using while wend loop
|
|
|
� Difference between for next and while wend loop
|
|
|
� Nested loops
|
|
|
� Rules of using nested loops
|