Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying the operation of and the maintenance of the networked information systems of a modern hospital. Individual workstation operation systems will be treated specifically including Linux and Windows. Modern networking protocols, equipment and software will be studied specifically focusing TCP/IP based networks. The major topics are: Command prompt skills, operating systems, networking, and medical systems applications including PACS/DICOM. Associate Degree Courses Types of Instruction Instruction Type Lecture Lab Credits/Hours 2 CR/36 HRS 2 CR/72 HRS Core Abilities 1 Demonstrate ability to think critically 2 Demonstrate ability to value self and work ethically with others in a diverse population 3 Make decisions that incorporate the importance of sustainability 4 Use technology effectively Program Outcomes 1 Demonstrate a competency of computers and networks used with biomedical equipment. Course Competencies 1 Explain computer networking in general terms. Course Outcome Summary - Page 1 of 7
Your definition includes the purpose of and methods used to network computers. Your list includes maintenance issues related to medical equipment as well as patient data transfer and storage applications. Your list includes all the required parts of a network including physical and software components. You use appropriate general computer terminology on all assigned activities. manuals, SW) in assigned activities related to investigating general computer networking. Define computer networking. List applications of networking related to medical equipment. List the components of a network. 2 Perform common command prompt activities. You access command prompt in several different ways for each operating system. You define the function of a variety of common prompt commands including the different versions of different operating systems. You use file extensions while at command prompt. You are able to manipulate files and folders at prompt including: move, copy, delete, and create types of activities using precise command formats. You are able to specify the file structure for the files you manipulate comparing a hierarchy file system to a flat file system and indicating the efficiencies of each. You complete a variety of maintenance tasks including drive management, networking, and troubleshooting tasks. Your explanation includes why command prompt is required in certain medical equipment maintenance or networking tasks. You use appropriate command prompt terminology on all assigned activities. manuals, SW) related to command prompt in assigned activities. Compare the advantages and disadvantages of graphical user interfaces, GUIs, to command line interfaces. Access the command prompt for Windows and Linux operating systems. Define terminology related to the command prompt. Maintain files and folders while at command prompt. Perform computer maintenance tasks using command prompt. Explain the use of command prompt skills for maintaining medical equipment and networks. 3 Utilize operating systems. You explain operating systems by using Windows as the example operating system. Your explanation of the job of an operating system includes its utility in file maintenance, networking, accessing applications, running hardware, user interface, and Input/Output capabilities. Your explanation of the functional parts of an operating system includes system files, the registry, HAL, control Course Outcome Summary - Page 2 of 7
panel, device manager, system tools, and other administrative tools. You compare different windows operating systems from DOS to the most current Windows system. You are able to use the components of an operating system required to use and maintain computers. You use appropriate operating system terminology on all assigned activities. manuals, SW) related to operating systems in assigned activities. Explain the job of an operating system. Explain the functional parts of an operating system. Describe the differences between operating systems. Define terminology related to operating systems. Use different features of operating systems. 4 Operate Linux/Unix operating systems. Your comparison of various Linux/Unix systems to Windows systems includes their capabilities, limitations, advantages, and disadvantages. You include the evolution of Linux from an offshoot of Unix including the similarities and differences between them. Your description of Linux includes the history and main features including the variety of distributions. You use the internet to research appropriate Linux distributions for specific applications. You are able to use the components of a Linux system required to use and maintain computers both thru the GUI and the console (command prompt). You use appropriate Linux/Unix operating system terminology on all assigned activities. manuals, SW) related to Linux/Unix operating systems in assigned activities. Compare Linux operating systems to Windows operating systems. Describe the similarities and differences between Linux and UNIX operating systems. Describe the unique features of Linux operating systems. Select an appropriate Linux distribution for a particular application. Use a Linux operating system. 5 Install operating systems. You determine the most appropriate method to install a Windows operating system selecting from a clean install, upgrade, image, remote installation bases on the situation parameters. You verify HW and SW compatibility for Windows installation. You perform pre installation tasks for Windows such as setting up hard drives and partitions and file systems. You perform post installation tasks for Windows such as installing upgrades, restoring user data, migrating data, installing applications, setting up system, and backing up system. You install a Linux system from disk. Your multi-boot installation adheres to the most appropriate order of installing the systems including dealing with the boot files. You use appropriate installation terminology on all assigned activities. Course Outcome Summary - Page 3 of 7
manuals, SW) installing operating systems in assigned activities. Install a Windows operating system. Install a Linux operating system. Set up a multi-boot system. 6 Maintain drives. Your explanation for partitioning includes the procedures, purpose, and justification for the partitioning arrangement. Your explanation for formatting includes the description and characteristics of different file systems and the purpose and procedures for formatting drives. You utilize disk management to complete partition and formatting tasks. Your comparison of disk types includes the advantages limitations, and characteristics of each. Your maintenance of hard drives includes defragmentation, check disk, backups, and troubleshooting. You use appropriate drive terminology on all assigned activities. manuals, SW) related to different types of drives in assigned activities. Explain partitioning hard drives. Explain formatting hard drives. Partition hard drives. Format hard drives. Compare basic and dynamic disks. Maintain drives using operating system utilities. 7 Perform maintenance tasks within operating systems. Your performance of basic maintenance tasks is accomplished using both the GUI and the command prompt if possible. You utilize the Windows website to maintain a system. You utilize Windows features for troubleshooting including the boot/startup options, recovery features, msconfig, logs or event viewer, device manager, control panel, backup, device manager, task manager, and other administrative tools. You use appropriate Windows maintenance terminology on all assigned activities. manuals, SW) related to performing maintenance tasks in assigned activities. Perform basic maintenance tasks in Windows operating systems. Repair operating system faults in Windows systems. 8 Perform basic security tasks for computer systems. Course Outcome Summary - Page 4 of 7
Your explanation of authentication includes methods used to authenticate users. Your explanation of different categories of users includes preset users including administrator, and specifying user permissions. Your setup of computer access includes users, groups, permissions, login requirements, and encryption. Your list of medical networks and data includes HIPPA and common medical community privacy requirements. You use appropriate computer security terminology on all assigned activities. manuals, SW) related to computer security in assigned activities. Explain authentication. Explain different categories of users. Set up different access schemes for users with different authority. List security requirements particular to medical networks and data. 9 Set up local area networks. Your description includes terms, acronyms, topologies, peer-to-peer, domains, and the OSI seven layer model. Your explanation of Ethernet includes methods of managing data, addressing, specifications, and standards. Your protocol explanation includes TCP/IP, NetBIOS/Broadcasting, and other protocols. Your explanation of addressing includes default gateway, subnet mask, IP address, physical address, network IDs, static addressing, dynamic addressing, and DHCP. Your explanation includes different types of physical interconnectivity and topologies. Your network setup includes physical interconnection, SW settings, and communication device. You troubleshoot networks using Windows utilities and hardware test tools. You use appropriate network terminology on all assigned activities. manuals, SW) related to setting up local area networks in assigned activities. Describe network concepts. Explain Ethernet. Explain network protocols. Explain addressing. Explain types of network hardware. Set up networks. Troubleshoot networks. Describe network applications in a modern hospital or clinical setting. Describe the function of different network hardware components and troubleshooting tools. 10 Perform wireless networking tasks. Course Outcome Summary - Page 5 of 7
Your definition includes the characteristics of the different wireless Ethernet protocols. Your definition of hardware includes access points, antennas, and frequencies. Your explanation includes radio frequencies, infrared, cellular devices, and Bluetooth. Your explanation of wireless security includes WEP, WAP, WPA, SSID, passwords, MAC filters, and encryption. You access screens used to configure wireless networks. You use appropriate wireless terminology on all assigned activities. manuals, SW) related to performing wireless networking tasks in assigned activities. Define wireless network standards. Describe different types of wireless network hardware. Explain different methods of transferring information wirelessly. Explain different methods of securing wireless networks. Configure a wireless network. 11 Demonstrate adept use of the internet. Your internet description includes HW and SW protocols and access providers. Your explanation of IP addressing includes the classes and format of the addresses. Your protocol descriptions include dial-up, DSL, satellite, cable, fiber, and ISDN. Your explanation includes DNS and IP address resolution concepts. You troubleshoot computer system internet access problems utilizing Windows tools. Your internet applications description includes ports, proxy server, pop-ups, filters, HTTP, HTTPS, e-mail, FTP, VoIP, remote desktop, remote access. Your use of internet applications includes port numbers, remote access, and remote assistance. You use appropriate internet terminology on all assigned activities. manuals, SW) related to demonstrating adept use of the internet and troubleshooting the internet in assigned activities. Describe the internet. Explain IP addressing. Describe different internet access protocols. Explain address resolution. Troubleshoot internet access. Describe internet applications. Utilize internet applications. 12 Explain securing networks. Course Outcome Summary - Page 6 of 7
You describe malware including viruses, Trojans, worms, spam, spyware, grayware, pop-ups, and phishing. Your explanation of protection methods includes firewalls, ports, DMZ, and SW packages. Your explanation includes social engineering as part of the threat and remedy. You use appropriate network security terminology on all assigned activities. manuals, SW) related to securing a network in assigned activities. Describe malware. Explain methods to protect against malware. Explain unauthorized access threats. 13 Explain medical network applications. Your explanation of PACS includes terminology, applications, and setups. Your explanation of DICOM includes terminology, applications, and setups. Your explanation includes the functions of the database. You use appropriate PACS/DICOM/Database terminology on all assigned activities. manuals, SW) related to explaining PACS/DICOM/Medical Equipment Databases in assigned activities. Explain PACS. Explain DICOM. Explain medical equipment management databases. Academic Honesty Teamwork is strongly encouraged. Plagiarism is not teamwork. Cheating is not academic honesty. Violation of the academic dishonesty policy will be subject to disciplinary action possibly ranging from receiving a zero on a piece of work to being expelled from the school depending upon the nature of the violation(s). Please be aware of what constitutes academic dishonesty and the disciplinary actions as defined in the WTC Student Handbook. http://www.westerntc.edu/student_handbook/studentplanner.pdf All work is expected to be your own. Credit must be given for any quotes, web excerpts and illustrations, and for assistance from other students or instructors. Course Outcome Summary - Page 7 of 7