The history of personal computing
Ethical considerations in technology
Cybersecurity essentials everyone should know