{"id":63,"date":"2023-09-13T18:45:06","date_gmt":"2023-09-13T18:45:06","guid":{"rendered":"https:\/\/wp.odu.edu\/summer2017-interdisciplinary-studies\/?page_id=63"},"modified":"2023-09-13T18:45:06","modified_gmt":"2023-09-13T18:45:06","slug":"it-360t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/accybercrime\/leadership-electives\/it-360t\/","title":{"rendered":"IT 360T"},"content":{"rendered":"<p><strong>Principles of Information Technology<\/strong><\/p>\n<p>A survey of computer hardware, software, procedures, applications, and management information concepts. Provides an understanding of the application of the computer to the support of managerial decision making.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Principles of Information Technology A survey of computer hardware, software, procedures, applications, and management information concepts. Provides an understanding of the application of the computer to the support of managerial decision making.<\/p>\n","protected":false},"author":27490,"featured_media":0,"parent":49,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/pages\/63"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/users\/27490"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/pages\/63\/revisions"}],"predecessor-version":[{"id":64,"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/pages\/63\/revisions\/64"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/pages\/49"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/accybercrime\/wp-json\/wp\/v2\/media?parent=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}