Digital Competencies I

Course contents
  • WORD 2013
    Aim: knowing how to write a seminar paper
    Scope (14 course units = 9 hours)
    Ribbon Start: paragraph formatting, borders and shading, using existing styles,
    bulleted or numbered lists, search and replace
    Insert tab: pages, tables (table tools tab), using tabulators / tab stops, headers and footers
    Design tab: designs and formatting
    Page Layout tab: page setup, columns
    Review tab: spelling and grammar checker, thesaurus
    Inserting images (Picture Tools tab): SmartArt (layouts, templates, formats), alignment, layout options and grid lines, task panes
    Printing: Settings
    Word options: AutoCorrect und AutoFormat, file formats, AutoFit, Save as PDF
    Creating stylesheets, indexes (table of contents, footers, cross-references,

    POWER POINT 2013
    Aim: How to present seminar papers
    Scope (4 course units = 3 hours)
    Design tab: Themes
    Insert tab: adding shapes
    Drawing tools tab
    SmartArt tools tab
    Inserting organization charts
    Picture tools tab
    Screenshots (using either Word or PowerPoint, quick revision)
    tables, audio and video files
    How to draft a presentation
    Identify your aim, identify your target group, outline your presentation
    View tab: create slide and title masters, create notes pages and handouts
    Animations tab: texts, animating objects, timeline
    Slide Show tab: self-running presentation, action settings, action buttons, links
    to external files and objects

    How to present
    presentation options, print slides, handouts, notes and outline views, edit slide
    transitions, package a presentation for CD
    Data security
    Aim: How to use your computer safely
    Scope (2 course units = 3 hours)
    An overview of potential security issues
    What is a threat?
    What is my responsibility as a user?
    Typical incidents of the past
    Code of conduct for the use of computers at the work place: suspicion of a
    virus, passwort security, spamming, precautions, handling attacks
    Social engineering und phishing: methods and patterns, recognizing attacks,

    Information handling: Handling corporate data
    data storage and destruction, protecting Office files, protecting PDF files
    The internet: internet downloads, cookies and my tracks on the internet, my
    personal data, online shopping, firewall
    Secure communication: email attachments, encryption and digital signature
MCI uses cookies to align content and recommendations with your interests. Detail information on the use of cookies and services for web analysis and online marketing can be found in our privacy policy. By using our website, you consent to the use of our cookie policy.
Privacy Policy