Upon successful completion of all program requirements, graduates will be able to:
- Discuss the various problems encountered in the area of information security.
- Describe current strategies used to protect data.
- Describe the range of services available for use over the Internet.
- Discuss the legal issues affecting the recovery of evidence during investigations involving the Internet.
- List and describe the civil liability issues associated with Internet investigations.
- List and describe some of the more common viruses that have infected computer systems.
- Apply State and Federal law and develop an investigative plan to address the relevant issues.
- Identify basic concepts and computer terminology relative to hardware and software applications.
- Understand the growing dependence and reliance on personal computers in our society.
- Identify the availability of technology-based products on the market today.
- Develop a level of comfort when using office productivity software such as MS Word, Excel, Powerpoint, and MS Access.
- Understand the uses of database management software and its applicability to the business environment.
- Identify a variety of Network Operating System Software and the features and functionality each provides.
- The student will be able to work with all the MS-DOS commands, both internal and external.
- The student will be able to understand the purpose and use of the memory management software.
- The student will be able to author batch file scripts when necessary.
- The student will work with the various components of WINDOWS 95 and the system registry.
- The student will understand various Network Operating Systems (NOS) used in Local Area Networks (LANS).
- The student will understand the various components, including physical designs of LANS.