Digital Competencies I

Course contents
Course content Arnim Franzmann, René Mühlbacher and Othmar Tamerl:
* WORD 2013
Objective: To be able to write seminar papers Content (14 units = 10.5 hours)
* POWER POINT 2013
Objective: To be able to present seminar papers Content (4 units = 3 hours)
* DATA SECURITY
Objective: To be able to use a PC safely Content (2 units = 1.5 hours)


WORD 2013
Objective: To be able to write seminar papers
Ribbon start: paragraph formatting, borders and shading, using existing style sheets
templates, numbering and enumeration, search and replace
INSERT tab:
Pages, tables (TABLE TOOLS tab), use of tabs /
tab stops, headers and footers
DRAFT tab:
Designs and general document formatting
PAGELAYOUT tab:
Page setup, columns, REVIEW tab, spell check and grammar, thesaurus
grammar, thesaurus
Inserting graphics (PICTURE TOOLS tab):
SmartArt (layouts, templates, formats), ArrangeLayout options and
guides, task areas
Printing: Settings
Word Options: AutoCorrect and AutoFormat, File Formats, Customizations,
Saving as PDFs
Create style sheets, directories (content, footnotes, cross-references,
keywords)

POWER POINT 2013
Goal: Be able to present seminar papers
Tab DRAFT: Designs
Insert tab: Insert shapes
DRAWING TOOLS tab
SMART TOOLS tab
Insert Organigrams
PICTURE TOOLS tab
Screenshot
(this one either in Word or PP and then short repetition)
Tables, audio and video files
Conception of presentations:
Determine goal, determine target audience, plan presentation.
View tab:
Creating slide and title masters, using handout and note templates.
ANIMATIONS tab: animating texts, objects, timeline
SCREEN PRESENTATION tab: Automatically running presentations,
Action settings, Interactive buttons, Linking external data and objects
data and objects
The presentation
Possibilities during the presentation, slides, handouts, notes and
Print outlines, Edit slide transitions, Packaging for CD

DATA SECURITY
Goal: Use PC securely
Overview of potential security issues
What is the threat?
What is my responsibility as a user?
Typical incidents from the past
Rules of conduct for the PC workplace: suspected viruses, password security ,
Spamming, preventive measures, dealing with attacks
Social engineering and phishing: methods and patterns, recognizing attacks, preventive
attacks, preventive measures
Information handling: handling company data
Custody or destruction of data, protection of Office documents
Protection of PDF documents
The Internet: Internet downloads, cookies and my tracks on the Internet,
My personal data, purchases on the Internet, firewall
Security in communication: e-mail attachments, encryption &
Digital signature