Lecture Series | Description | Lecture By |
---|---|---|
Lecture 1 | Characteristics of computers | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 2 | Hardware Devices | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 3 | Software Devices | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 4 | Human ware | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 5 | Firmware devices | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 6 | Functions of different units of computer-1 | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 7 | Functions of different units of computer-2 | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 8 | Classification of computers | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 9 | Primary Memory | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 10 | Secondary Memory | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 11 | Types of software | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 12 | Introduction to OS, Functions of OS | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 13 | Types of OS | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 14 | Boosting Procedure, Start up Sequence | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 15 | Introduction to GUI | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 16 | Directory, File, Volume | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 17 | Label and Drive Name | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 18 | Compiler | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 19 | Interpreter and Assembler | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 20 | Types of computer languages | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 21 | Introduction to word processor | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 22 | Presentation software | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 23 | Meaning, features, applications and advanced functions of Excel | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 24 | Creating, Tables, Graphs and Charts | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 25 | Table formatting, Worksheets management | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 26 | Sort and filters tools, Subtotal | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 27 | Mathematical functions, Statistical functions, date and time functions | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 28 | Text functions, financial functions | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 29 | Analyze data with pivot tables | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 30 | Create and manage scenarios and summaries | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 31 | Data communication concepts, types of communication media | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 32 | Computer networks, Internet, Intranet, Extranet | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 33 | Network Topologies, Networking Devices, OSI Model | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 34 | Application of IT in Railways, Airlines | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 35 | Application of IT in Banking, Online Banking System | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 36 | Application of IT in Insurance, Inventory Control | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 37 | Application of IT in Financial Systems, Hotel Management | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 38 | Application of IT in education | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 39 | Application of IT in entertainment and health | Lecture by A, Lecture by B, Lecture by C, Lecture by D |
Lecture 40 | Application of IT in security issues in information technology | Lecture by A, Lecture by B, Lecture by C, Lecture by D |