Course Content
Mandatory Steps
Before accessing the course content, please complete the following essential steps to ensure a smooth learning experience: 1️⃣ Attempt the Pre-Assessment Test – This short test will help evaluate your current understanding of the subject. It is not graded but will provide insight into your knowledge level. 2️⃣ Watch the Demo Session – This session will give you an overview of the course structure, key topics, and how to navigate the learning materials effectively. Once you complete these steps, you can proceed to the main course content.
0/4
Lecture : 1
Welcome to Lecture 1 of the "Introduction to Information and Communication Technologies (ICT)" course. This lecture serves as a foundational introduction to the world of ICT, exploring its basic concepts, components, and significance in various sectors of society. We will begin by defining Information Technology (IT) and Information and Communications Technology (ICT), highlighting their differences and interconnections. You will learn about the essential components that constitute ICT, such as software, hardware, communications technology, and data. Additionally, we will delve into the pivotal role that IT plays in different fields including education, finance, healthcare, and more. The lecture also introduces fundamental computing models like the Turing Model and the Von Neumann Model, providing a theoretical framework for understanding how computers process information. Finally, we will cover various input and output devices, essential for interacting with and utilizing ICT systems.
0/1
Lecture : 2
Welcome to Lecture 2 of the "Introduction to Information and Communication Technologies (ICT)" course. This lecture focuses on how computers process data, providing an in-depth understanding of the core components and operations involved in the data processing cycle. We will begin by exploring the concept of data processing and the fundamental operations it involves: input, processing, storage, and output. You will learn about the Central Processing Unit (CPU), often referred to as the brain of the computer, including its main components and their functions. Additionally, we will cover different types of memory, such as RAM and ROM, and their roles in data processing. The lecture also delves into the importance of registers and cache memory for enhancing CPU efficiency, the function of buses and ports in data transfer, and the system clock and machine cycle that govern the timing of all computer operations. By the end of this lecture, you will have a comprehensive understanding of how computers transform raw data into useful information.
0/1
Lecture : 3
Welcome to Lecture 3 of the "Introduction to Information and Communication Technologies (ICT)" course. This lecture focuses on the various types of storage devices used in computing, providing an in-depth understanding of their characteristics, advantages, and applications. We will begin by introducing the concept of storage devices and their importance in any computer system. You will learn about the three main categories of storage devices: magnetic, optical, and solid-state storage devices. Each type will be discussed in detail, with examples to illustrate how they store data and their specific uses. Additionally, we will cover the data read and write processes, which are fundamental to the operation of these storage devices. By the end of this lecture, you will have a comprehensive understanding of different storage technologies and how they are used to manage and store data effectively.
0/1
Task 3: Feedback on Videos
We’d love to hear your feedback! Please answer a few short questions about the interactive videos you’ve watched: ✅ Lecture 1: Introduction to ICT ✅ Lecture 2: How Computers Process Data ✅ Lecture 3: Storage Devices Your answers will help us improve the content and make your learning experience even better!
0/1
Quiz: Applications of ICT
0/1
Lecture : 4
Welcome to Lecture 4 of the "Introduction to Information and Communication Technologies (ICT)" course. This lecture focuses on how computers represent data, providing a comprehensive understanding of the different methods and systems used to encode and store information. We will start by exploring the basic concepts of data representation and the types of signals used in computers, namely analog and digital signals. You will learn about the binary system, which forms the foundation of all data representation in computers. The lecture will cover three main forms of data representation: number systems, bits and bytes, and text codes. Each of these forms will be discussed in detail, with examples to illustrate their applications and importance. By the end of this lecture, you will have a solid grasp of how computers convert and store various types of data using binary systems and coding schemes.
0/2
Task 5 : Module 2 – Pre-Knowledge Assessment
his assessment consists of 50 MCQs and is mandatory for all students. It aims to measure your current knowledge before starting the next four video lectures of "Applications of ICT." 🔹 No impact on your CGPA. 🔹 Honest attempts are encouraged. 🔹 Complete it to continue to the next module.
0/1
Task 6 : Assignment
Total Marks: 20 | Due Date: Sunday, May 4, 2025 – Before 1:30 PM Parts: Part A: Concept in Your Words (5 Marks) Part B: Storage Devices & Real-World Connection (5 Marks) Part C: ICT Applications & Impact (10 Marks)
0/1
Lecture: 5
0/1
Task 7
Here are a 2 concise and engaging home task for you after watching Lecture 5 (Number Systems) and Lecture 6 (Number System Arithmetic):
0/1
Lecture : 7
This lecture introduces system software and application software, explaining their roles in managing computer operations and supporting user tasks. It highlights how both types work together to enable smooth and effective computing.
0/3
Lecture : 8
An essential guide to how computer networks connect us—and how cybersecurity keeps us safe.
0/3
Applications of ICT (CSC101)
About Lesson

Lecture # 8 “Computer Networks”

In this lecture, we’ll explore the vital role of computer networks in connecting the world, and the importance of cybersecurity in keeping our digital lives safe. You’ll learn how networks operate, how devices communicate, and how to protect yourself and your data from digital threats.

Through real-life examples, updated insights, and interactive activities, this lecture will guide you through the foundations of networking and the modern challenges of staying secure in an increasingly connected environment.

Additional Resources: 

🎥 Learning Videos

  1. What Is a Computer Network? – Techquickie
    YouTube Link
    → A simple explanation of networks, routers, and IP addresses.
  2. Types of Computer Networks – Simplilearn
    YouTube Link
    → Covers LAN, WAN, MAN, and PAN with visual examples.
  3. What Is Cybersecurity? – IBM Technology
    YouTube Link
    → A beginner-friendly overview of cybersecurity threats and protection.
  4. How Ransomware Works – Wired
    YouTube Link
    → Real-world explanation of ransomware and why it’s dangerous.

📖 Articles & Blogs

  1. Introduction to Computer Networks – GeeksforGeeks
    Read Here
    → Great breakdown of network types, components, and protocols.
  2. Cybersecurity Basics – National Cybersecurity Alliance
    Read Here
    → Practical security tips for everyday users.
  3. What Is Zero Trust Security? – Microsoft Learn
    Read Here
    → A clear explanation of the modern zero-trust model in cybersecurity.
  4. AI in Cybersecurity – IBM Blog
    Read Here
    → How machine learning is used in threat detection and prevention.

🧩 Interactive Tools & Quizzes

  1. Cisco Networking Self-Assessment Quiz
    Practice Here
    → Quick review of basic networking concepts.
  2. Cybersecurity Awareness Quiz – StaySafeOnline
    Take the Quiz
    → Tests your knowledge of phishing, malware, and safe practices.

 

 

By the end of this lecture, students will be able to:

  1. Define the purpose and types of computer networks (LAN, WAN, MAN, PAN).
  2. Identify key components of a network and explain how they function together.
  3. Explain common cybersecurity threats like phishing, malware, and ransomware.
  4. Apply best practices to enhance personal and professional digital security.
  5. Describe modern trends in cybersecurity, including AI, biometrics, and cloud security.