This course helps you understand the interaction between humans and computing devices, know how hardware and software determine the storing capability, understand that troubleshooting is a systematic process, recognize that protocols help in sending and receiving information, understand how information sent can be protected from unauthorized access, know that algorithms automate data collection process and affect human-computer interaction, illustrate how applications store data as representations, explain data transformation that removes errors, simulate events using computer models, create variables to store data values, select and combine control structures, such as loops, event handlers, and conditionals, use procedures to organize code and making it easier to reuse, understand the designing of meaningful solutions by defining a problem's criteria and constraints, explore how advancements in computing technology change people's everyday activities, organize and engage in various topics through social media, and know the niches of protecting personal information.