AIS160

Overview of today's technologies, computer devices and the web

  1. Overview of AIS





Communication and Network


Digital Security, Ethics and Privacy

  1. What is Cyberterrorism?
  2. Types of Cybercrime
  3. Malware: Difference Between Computer Viruses, Worms and Trojans
  4. Difference between Hacker and Cracker
  5. Cyber Espionage: The Chinese Threat
  6. How To Manage Unethical Employees
  7. What is botnet and how does it spread?
  8. Denial of Service (DoS)
  9. What's a Backdoor?
  10. What is Spoofing?
  11. What is a Firewall?
  12. What is Phishing?
  13. What is Spyware?
  14. What is Adware?
  15. Software Theft
  16. Overview of Digital Forensics
  17. Content Filtering and Policy


Emerging Trends in IT 

  1. Cloud Computing Services Models 
  2. Public Cloud vs Private Cloud vs Hybrid Cloud
  3. What is fintech? | CNBC Explains
  4. The FinTech Revolution
  5. How Big Data is Changing Business (and Our Lives)
  6. TOP 10 FinTech Predictions for 2019 
  7. Bank 4.0 and the Future of Financial Services
  8. Inside The Cryptocurrency Revolution
  9. How the blockchain is changing money and business
  10. What is Social Engineering?
  11. Digital Transformation | The AirAsia Experience
  12. What is NFT?

MS Word

  1. Tips to Generate Random Text in Microsoft Word
  2. Tips - Double click and triple click
  3. Tips to create and format sections
  4. Tips to create and format columns
  5. Tips to format table
  6. Tips to apply Styles and Building Blocks
  7. Tips to work with Headers, footers & adding page numbers
  8. Tips to work with graphics
  9. Tips to use and create templates
  10. Tips to fix template problem
  11. Mail Merge
  12. How to create fillable forms in Word
  13. Microsoft Word Master & Subdocuments

MS Excel



MS PowerPoint



MS Access



No comments:

Post a Comment