Skip to content
2025 Fall

Computer Information Systems - CIS161/5 Fall 2025


Course
Jakub Steinbach
For information about registration please contact our admissions.

Lessons

Here is the course outline:

1. Syllabus and Introduction of the Course

Syllabus for the course and the introductionary presentation. You can find the topics of the course, links to reading materials as well as information on the various assignments in the syllabus.

2. Computer Basics, Data Representation

First lecture covering the computer basics and data representation. Slides for the First Lecture: Presentation slides covering the topics of computer basics and data representation. Cards for Synthesis Discussion: Cards used for the discussion on computer components and their function. It also includes points which students should attain by the end of the discussion. Keywords: Inputs and outputs (I/O), Central processing unit (CPU), Memory, Storage, Random-access memory (RAM), Flash memory, Hard drive (HDD), Solid-state drive (SSD), binary, bit, byte

3. Hardware Components, Software Fundamentals

This lecture covers the principle of data flow between different components with concentration on the processor and memory. The second part is dedicated to a group activity going through a tear-down of selected devices to show similarities and differences between different types of computers. Slides for the Second Lecture: Presentation slides covering the topics of computer basics and data representation. Tear-down Activity: Slides with QR codes and links to the tear-downs of the selected devices. Keywords: CPU: core, thread, multi-threading; Memory: cache, RAM; Software: Application, program, process, BIOS, UEFI, GUI, CLI, installation, execution

4. Office365, OneDrive, and Digital Workflows

This lecture covers the information about available storage as well as office SW for students and academic workers at AAU. In the first part, the differences between the services of Google and Microsoft are presented, along with the option of using network storage operated by AAU. The second part is dedicated to hands-on approach to learning about the intricacies of the Google and Microsoft apps. In the final part, an example of how a cloud storage can be used is shown on the collaborative writing tool Overleaf as well as on a project channel in MS Teams, used by a lecturer at UCT Prague for research work with multiple research groups. Slides for the Third Lecture: Presentation slides covering the topics of Office365, OneDrive, and Digital Workflows. Collaboration Test Drive Activity: Instructions on the group activity. Assignment 1: Assignment on sharing via Google Drive and OneDrive Keywords: Microsoft Office, Word, Excel, PowerPoint, Teams, Google Workspace, Docs, Sheets, Slides, Gmail, network drive.

5. Using AI Tools Ethically and Effectively

This Lecture covers the topic of using AI tools, specifically LLM models. It also covers the ethical use of AI in general and LLMs specifically. Files: - Presentation slides - Prompting Demo sheet - Confusion Contest activity sheet - Chat Bot Personification activity sheet Keywords: AI, LLMs, machine learning, prompt, prompting, prompt engineering, bias, hallucination

6. Networking & Cybersecurity Basics

This lecture introduces the basics of computer networking, explaining how devices connect using wired and wireless technologies and how local networks (LANs) differ from wide-area networks (WANs) and the Internet. Attention is also given to how devices are identified (IP and MAC addresses), how data is transmitted in packets, and the roles of switches and routers. The second part focuses on Internet security, covering secure online communication (encryption, HTTPS, certificates), the use of passwords and two-factor authentication, online privacy tools (Incognito Mode, VPN), and common hacking practices with defenses. A group activity simulates message exchange within and between networks to demonstrate routing, coordination, and broadcast communication. Slides for the Fifth Lecture: Presentation slides covering the topics of networking fundamentals, secure communication, and Internet security. Activity: Human network simulation with roles of router, managing device, and end devices, including logging and broadcast communication through a shared medium. Keywords: Network: LAN, WAN, Internet, router, switch, packet; Addressing: MAC, IP; Security: password, MFA/2FA, encryption, HTTPS, certificate, VPN, incognito; Threats: phishing, social engineering, MITM.

7. Microsoft Word – Formatting and Templates

This lecture introduces the fundamentals of working with Microsoft Word for academic and professional writing. The first part of the class explains the structure and key features of the Word interface, including creating and saving documents, text and paragraph formatting, indents, tabs, and the use of styles for consistent document structure. Students will also learn about section breaks, page layout settings, and basic tools for inserting and formatting images and tables. After the break, the second part focuses on practical application: students will format a provided unstructured document using proper styles, spacing, alignment, and layout settings. The session concludes with a short overview of reviewing tools and an introduction to differences between Word Desktop and Word Online. Practical Guide: Document with overview of Word functions Training Text Text used as a training excercise before assignment. Unformatted and final version provided. Intro Text Text used by the lecturer to show the basics of formatting. Keywords: Word, formatting, paragraph spacing, indentation, tabs, styles, layout, sections, reviewing, templates

Back to top