Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
WOLKITE UNIVERSITY
COLLEGE OF COMPUTING AND INFORMATICS
DEPARTMENT OF INFORMATION TECHNOLOGY
Four Year Study Program
Bachelor of Science Degree (BSc)
In
Information Technology
Nationally Harmonized Modular Curriculum
October, 2012
1
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Table of Contents
1.
Program Objective ................................................................................................................... 3
1.1 Objectives ............................................................................................................................. 3
2.
Graduate Profile ....................................................................................................................... 4
3.
Attitudes and Values ................................................................................................................ 5
4.
Degree Nomenclature .............................................................................................................. 5
5.
Assessment and Evaluation ..................................................................................................... 5
6.
Assignment of Course Codes .................................................................................................. 6
7.
List of Modules, Courses required .......................................................................................... 6
8.
Course Breakdown .................................................................................................................. 8
9.
Annexes ................................................................................................................................. 10
Module and Course Handbook ................................................................................................. 10
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
1. Program Objective
1.1 Objectives
1.1.1 General Objectives
To produce high quality IT Graduate with entrepreneur and problem solving
mind set. Providing a broad knowledge and skill in information technology
management
Providing students with the necessary skill and knowledge to configure and
maintain ICT infrastructure
Enabling students to develop and integrate information systems
Building students problem solving and critical thinking skills
Enabling students to cope up new technological developments
1.1.2 Specific Objective:
To produce graduates who possess the right combination of knowledge and
practical skills to take care of an organizations technology and infrastructure
needs and peoples that needs it.
To produce professionals that take responsibilities for selecting hardware and
software products appropriate for an organization, integrating those products
with organizational needs and infrastructure
To produce graduates who installing, customizing and maintaining
applications (network installation, network administration, Web site design,
development of multimedia resources, installation of communication
components and oversight of email system ) for the organization.
To produce professionals to work in organizations implementing and
managing automated information systems for different scientific, educational,
commercial and other purposes.
To produce graduates that plan and manage the technology lifecycle by which
an organizations technology is maintained, upgraded and replaced.
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
2. Graduate Profile
The graduates of the program will be able to:
Analyze, identify and define the IT requirements that must be satisfied to
address problems or opportunities faced by organizations or individuals.
Use and apply current technical concepts and practice in the core area of
Information Technology.
Design effective and usable IT-based solutions and integrate them into the
user environment.
Identify and Evaluate current and emerging technologies and assess their
applicability to address the users needs.
Assist in the creation of an effective project plan.
Analyze, adopt and demonstrate IT best practices, standards and their
application.
Demonstrate independent critical thinking and problem solving skills
Collaborate in teams to accomplish a common goal by integrating personal
initiatives
Communicate effectively and efficiently with clients, users and peers both
verbally and in writing, using appropriate terminology.
Analyze the impact of technology on individuals, organizations and society,
including ethical, legal and policy issues;
Demonstrate an understanding of best practices and standards and their
application;
Identify and analyze user needs and take them into account in the selection,
creation, evaluation and administration of computer-based systems.
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
3. Attitudes and Values
The graduates will be inspired:
To have professionalism at the center of their mentality;
To have a positive and responsive attitude towards the value of information
resources and towards their profession (love, dedication, commitment, etc.);
To have good personal confidence in their jobs and professional activities;
To have the sense of co-operation, honesty, loyalty, etc.; and
To be ethical.
4. Degree Nomenclature
English
The Degree of Bachelor of Science in Information Technology
Amharic
5. Assessment and Evaluation
Cognitive Abilities: Cognitive abilities are assessed by a combination of written examinations
and continuous assessment, including marked essays, class tests and computer
programming problems.
Practical Abilities: Practical Abilities are assessed mostly by continuous assessment. Some of
practical abilities are assessed as part of group project module.
Transferable skills: some skills, like the use of software tools and ability to communicate orally
and in written form are directly assessed, in assignments or projects, other skills are not
directly assessed but their effective use will enhance the students overall performance.
Evaluation will be done based on the midterm exam, assignments, laboratory sessions
demonstrations, Project work, and final exam and etc
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
6. Assignment of Course Codes
The course code will have four alphabets and four digit numbers like Itec1011. The four
alphabets code indicates the name of the program with the first alphabet capital letter, For
instance, Itec indicates abbreviation of the program of Information Technology. The four digits
indicates the year of course offering (the first number, 1, indicates the level of the course in
terms of the year; accordingly '1' for 1st year, '2' for 2nd year , 3 for 3rd year and 4 for 4th
year courses); the middle numbers, 01, indicates module code number in the program (example
01, 02, 03, 04, 05, 06, 07, 08, 09, 10), the last number, 1, indicates order of the course within
the module.
7. List of Modules, Courses required
Module
Number
ITec-M-01
Module Name
Courses
Information
Technology Basics
ITec-M-02
Computer Systems
Introduction to Information
Technology
Computer System Application
Computer Organization and
Architecture
Operating Systems
ITec-M-03
ITec-M-04
Computer
Maintenance
Basic
Programming
ITec-M-05
Advanced
Programming
ITec-M-06
System
Development and
Management
ITec-M-07
ITec-M-08
Database Systems
Database and
Information
Management
Computer Maintenance and
Technical Support
Fundamentals of Programming
I
Fundamentals of Programming
II
Data structure and Algorithms
Object Oriented Programming
Event-Driven Programming
Advanced Programming
Structural System Analysis
and Design
Object Oriented System
Analysis and Design
Information Technology
Project Management
Fundamentals of Database
Systems
Advanced Database Systems
Information Storage and
Retrieval
Database Administration
Course
Code
ITec1011
Cr.
Hr
3
Lec
Lab
Tut
HS
EC
TS
5
ITec1012
ITec2021
2
3
0
2
6
0
0
3
0
5
3
5
ITec2022
ITec4031
ITec1041
ITec2042
ITec2051
ITec2052
ITec3053
ITec3054
ITec1061
4
3
4
3
3
3
2
2
2
2
3
3
6
3
0
0
0
0
0
3
8
5
6
5
5
7
5
7
5
5
ITec2062
ITec2063
ITec2071
ITec2072
ITec3081
4
3
2
2
6
3
0
0
6
5
7
5
ITec4083
Undergraduate Information Technology Program National Harmonized Modular Curriculum
ITec-M-09
ITec-M-10
ITec-M-11
ITec-M-12
ITec-M-13
ITec-M-14
ITec-M-15
ITec-M-16
ITec-M-17
ITec-M-18
Web Systems and
Technologies
Computer
Networks
Network design,
configuration and
administration
Integrative
Programming and
Technics
Multimedia and
HCI
Information
Technology and
Society
Knowledge based
Systems
IT Research and
Project
Electricity and
Electronics
Statistics and
Probability
ITec-M-19
Mathematics for IT
ITec-M-20
Business
Management
ITec-M-21
Civics and Logic
ITec-M-22
Communicative
English
2012
Fundamentals of Internet
Programming
Advanced Internet
Programming
E-Commerce
Data Communication and
Computer Networks
Advanced Networking
Introduction to Distributed
Systems
Telecom Technologies
Wireless Networking and
Mobile Computing
System and Network
Administration
Network Design
ITec2091
ITec3092
ITec3093
ITec3101
2
4
2
3
0
3
0
0
4
8
3
7
ITec3102
ITec3103
3
3
2
2
3
3
0
0
5
5
5
5
ITec3104
ITec3105
2
3
2
2
0
3
0
0
4
5
3
5
ITec4111
ITec4112
Network Device and
Configuration
Integrative Programming and
Technics
ITec4113
ITec4121
Multimedia Systems
Human Computer Interaction
Information Assurance and
Security
Social, Professional and Ethics
in Information Technology
Current Topics in Information
Technology (Elective)
Artificial Intelligence
(Elective)
Individual Project
ITec3131
ITec3132
ITec4141
3
2
3
2
2
2
3
0
3
0
0
0
5
4
5
5
3
5
ITec4142
ITec4143
ITec3151
ITec3161
Basic Research Method in IT
Industrial Project I
Industrial Project II
Fundamentals Electricity and
Electronics Device
Introduction to Statistics and
Probability
ITec3162
ITec4163
ITec4164
EEng1171
2
3
3
4
2
0
0
4
0
0
0
0
0
0
0
0
4
10
10
10
3
5
5
7
Stat2181
Applied Mathematics for IT
Discrete Mathematics and
Combinatory
Entrepreneurship and Small
Business Management
Introduction to Management
Civics and Ethical Studies
Logic and Reasoning Skill
Communicative English Skills
Basic Writing Skills
Math1191
Math1192
4
3
4
3
0
0
2
0
8
7
7
5
Mngt4201
Mngt1202
CEEt1211
Phil1212
EnLa1221
EnLa1222
3
3
3
3
3
3
3
3
3
3
0
0
0
0
0
0
0
0
0
0
7
7
7
7
7
5
5
5
5
5
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
8. Course Breakdown
Year I Semester I
Module Code
Course Title
ITec_M_01
Introduction to Information
Technology
Computer Systems Application
Communicative English Skills
Civics and Ethical Studies
Logic and Reasoning Skill
Applied Mathematics for IT
ITec_M_01
ITec_M_22
ITec_M_21
ITec_M_21
ITec_M_19
Course
Code
ITec1011
Cr.Hr
CP
ITec1012
EnLa1221
CEEt1211
Phil1212
Math1191
2
3
3
3
4
18
3
5
5
5
7
30
Course
Code
ITec1041
ITec1192
Cr.Hr
CP
3
3
5
5
EnLa1222
EEng1171
3
4
5
7
ITec1061
Mngt1202
3
19
5
32
Course
Code
ITec2021
Cr.Hr
CP
ITec2042
ITec2062
3
3
5
5
ITec2071
ITec2063
3
3
5
5
Stat2181
18
30
Year I Semester II
Module2
Code
ITec_M_04
ITec_M_19
Course Title
ITec_M_22
ITec_M_17
Basic Writing Skills
Fundamentals Electricity and
Electronics Device
Structural System Analysis and
Design
Introduction to Management
ITec_M_06
ITec_M_20
Fundamentals of Programming I
Discrete Mathematics and
Combinatory
Year II Semester I
Module
Code
ITec_M_02
ITec_M_04
ITec_M_06
ITec_M_07
ITec_M_06
ITec_M_18
Course Title
Computer Organization and
Architecture
Fundamentals of Programming II
Object Oriented System Analysis and
Design
Fundamentals of Database Systems
Information Technology Project
Management
Introduction to Statistics and
Probability
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Year II Semester II
Module
Code
ITec_M_05
ITec_M_05
ITec_M_02
ITec_M_07
ITec_M_09
Course Title
Data structure and Algorithms
Object Oriented Programming
Operating Systems
Advanced Database Systems
Fundamentals of Internet
Programming
Course
Code
ITec2051
ITec2052
ITec2022
ITec2072
ITec2091
Cr.Hr
CP
4
3
4
4
3
7
5
7
7
5
18
31
Cr.Hr
CP
4
3
3
2
3
4
7
5
5
3
5
7
19
32
Cr.Hr
CP
2
2
3
3
2
3
3
3
5
5
3
5
3
3
21
5
5
34
Year III Semester I
Module
Code
ITec_M_05
ITec_M_05
ITec_M_09
ITec_M_09
ITec_M_13
ITec_M_10
Course Title
Event-Driven Programming
Advanced Programming
Advanced Internet Programming
E-Commerce
Multimedia Systems
Data Communication and Computer
Networks
Course
Code
ITec3053
ITec3054
ITec3092
ITec3093
ITec3131
ITec3101
Year III Semester II
Module
Code
ITec_M_13
ITec_M_16
ITec_M_10
ITec_M_10
ITec_M_10
ITec_M_10
ITec_M_08
Course Title
Human Computer Interaction
Individual Project
Advanced Networking
Introduction to Distributed Systems
Telecom Technologies
Wireless Networking and Mobile
Computing
Elective
Information Storage and Retrieval
Course
Code
ITec3132
ITec3161
ITec3102
ITec3103
ITec3104
ITec3105
ITec3081
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Year IV Semester I
Module
Code
ITec_M_08
ITec_M_16
ITec_M_11
ITec_M_03
ITec_M_12
ITec_M_16
Course Title
Course
Code
ITec4082
ITec4163
ITec4112
ITec4031
Cr.Hr
CP
3
3
3
4
5
5
5
7
3
2
20
5
3
33
Course
Code
ITec4164
ITec4111
ITec4201
Cr.Hr
CP
3
3
3
5
5
5
ITec4113
ITec4141
ITec4142
3
3
2
5
5
3
17
29
Database Administration
Industrial Project I
Network Design
Computer Maintenance and Technical
Support
Integrative Programming and Technics ITec4121
ITec4162
Basic Research Method in IT
Year IV Semester II
Module
Code
ITec_M_16
ITec_M_11
ITec_M_20
ITec_M_11
ITec_M_14
ITec_M_14
Course Title
Industrial Project II
System and Network Administration
Entrepreneurship and Small Business
Management
Network Device and Configuration
Information Assurance and Security
Social, Professional and Ethics in
Information Technology
9. Annexes
Module and Course Handbook
Wolkite University
College of Computing and Informatics
Information Technology Program
Module Number
Module Name
Total ECTS of the
ITec_M_01
Information Technology Basics
10
10
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
module
Objective of the
module
The objectives of the module are:
To provide students with the basic knowledge, skills and
applications of IT
To provide students with the understandings of information
technology fundaments, major components and applications
To understand the implications and impacts of information
technology.
Course Code
ITec1011
ITec1012
Courses in the Module
Course Name
Credit Hours
(existing)
Introduction to Information
3
Technology
Computer Applications
2
ECTS (CP)
5
5
Wolkite University
Program
Information Technology
Course Code
ITec1011
Course Title:
Introduction to Information Technology
Degree Program
Information Technology
Module Name
Information Technology Basics
Module No.
ITec_M_01
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
11
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical Home Study
Total
(per week)
10
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
1st year Information Technology Students
Year /Semester
Year: I, Semester: I
Pre-requisites
None
Status of the
Course
Compulsory
Course Outline
Course
Description
The aim of the course is to develop a basic awareness of information and
communication technology. The course will:
Enhance learning and make the learners more productive and
creative
Enable the learners to locate , collect , evaluate , and process
information from a variety of sources
Course
Objectives
Help the learners to solve problems and make informed decisions
At the end of the course, students will be able to:
Explain the major concepts , function and principles of ICT
Explain the computer system
Explain historical development of computers with their
characteristics
Describe data representation techniques and computer
12
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
arithmetic
Define computer networking , its components and applications
Make use of the basic MS office applications
Describe basic concepts in Internet.
Course content
DATE
TOPICS
An overview of IT and data processing
ASSIGNMENT/PROJECT
/READINGS
Complete Guide to IT: pp. 17-49.
(Chapter One)
Week 1
What is IT?
and 2
Components of IT
Functions and application of IT
Data and Information processing
Computers (Chapter Two)
Definition of computers
Week 3
Evolution of computers
and 4
Historical development of
Complete Guide to IT: pp. 50-77.
computers
Types of computers
Computer System (Chapter Three)
Complete Guide to IT: pp. 78-129.
Hardware
o Input
Weeks
o Output
5 and 6
o Processing unit
o Storage
o Memory
Week 7
Week 8
Lab Exam 1
Software
Complete Guide to IT: pp. 78-129.13013
Undergraduate Information Technology Program National Harmonized Modular Curriculum
o System software
2012
155.
o Application software
Week 9
Mid Exam
Data representation and computer
Complete Guide to IT: pp. 155-172.
arithmetic (Chapter Four)
Weeks 10
and 11
Data representations in computers
Coding methods
Number system
Computer arithmetic
Data communication, computer
Complete Guide to IT: pp. 545-626.
networking and Internet (Chapter Five)
Weeks
Data communication
Computer networks
o Types of networks
12 and 13
o Network configuration
o Network topologies
o Network devices and
transmission media
Week 14
Internet
Complete Guide to IT: pp. 627-632,
645 and 707-720
Week 15
Lab Exam 2
Week 16
Final Exam
Methodology
Lecture
For this course two lecture hours are scheduled per week.
Laboratory
In the laboratory session of this course, students are expected to practice MS Windows and
MS DOS.
Lab Exam
14
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Lab exam is given in the lab to be performed individually. Assessment is undergone immediately
for each student.
Assessment methods (should be continuous):
LabExam
100%
Lecture
100%
Reference materials:
RequiredReference books:
1) Williams and Sawyer, Using Information Technology.
2) Dida Midekso, Introduction to Computer Science.
3) Mergia, Complete Guide to Information Technology.
Biblography
4) Laudon and et. al., Inforamtion Technology: Concepts and Issues.
5) Corbitt, Information Technology and its Application.
6) Morley and Parker, Understanding Computers: Today and Tommorow.
Wolkite University
Program
Information Technology
Course Code
ITec1012
Course Title:
Computer applications
Degree Program
Information Technology
Module Name
Information Technology Basics
Module No.
IT_M_01
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
15
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Mobile:
2012
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical Home Study
Total
(per week)
10
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
1st year Information Technology Students
Year /Semester
Year: I, Semester: I
Pre-requisites
None
Status of the
Course
Compulsory
Course Outline
Overview of application packages; word processing; spreadsheet;
presentation Software; Internet, etc.
At the end of the course, the students should be able to:
Explain application software
Make use of word processing software
Operate spreadsheet applications
Prepare effective presentation using presentation software
Manage database using Ms Access
Understand different services provided by the Internet
Browse and use the Internet for information exchange
Course
Description
Course
Objectives
Course Content
Week
Practical Work
Tasks
Reading
CHAPTER ONE: BASICS OF PC AND WINDOWS
Starting and closing computer, Using mouse and
keyboard, Windows concepts, Windows Environment,
The Desktop Elements, Parts of a Window, Changing
Desktop Background and Screen Saver, Starting
programs, Using accessories program, Managing files
and folders, Adjusting Date And Time, Creating
shortcut programs, Managing programs on Start menu,
Attend
Manual
demonstration,
work on
exercises,
forward
16
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Getting help
1
Lab Exam I
CHAPTER TWO: OFFICE APPLICATIONS
MS Office Background
Desktop applications
MS WORD
Introduction To Ms-Word
Ribbons And Chunks
Basic Word Concepts And Text Proofing
Document Formatting
Document Editing
Table Basics
Document Page Setup And Printing
Lab Exam 2
CHAPTER TWO: OFFICE APPLICATIONS
MS EXCEL
Introduction To MS-Excel
Understanding Excels Files
Saving A Workbook
Closing Workbooks
Working With Worksheets
Entering Data
Creating And Editing Formulae andFunctions
Formatting And Proofing
Charts Basics
Printing And Page Setup
Lab Exam 3
CHAPTER TWO: OFFICE APPLICATIONS
MS POWER POINT
Introduction To Ms-Power Point
Creating Presentation
Slide
Design Template
Slide Transition
Custom Animation
Navigation
Slide Show
Printing
CHAPTER TWO: OFFICE APPLICATIONS
MS ACCESS
1
3
1
2
2012
questions
Attend
demonstration,
work on
exercises,
forward
questions
Manual
Attend
demonstration,
work on
exercises,
forward
questions
Manual
Attend
demonstration,
work on
exercises,
forward
questions
Manual
Attend
demonstration,
work on
exercises,
forward
questions
Manual
Lab Exam 4
17
Undergraduate Information Technology Program National Harmonized Modular Curriculum
CHAPTER THREE: INTERNET APPLICATIONS
What Is Internet?
Internet History
Internet Services
Types Of Web Sites
Finding Information On The Web
2012
Attend
demonstration,
work on
exercises,
forward
questions
Manual
TEACHING AND LEARNING METHODS
The mode of the delivery of the course is laboratory or practical activities, questioning and
answering, assignments, individual and /or group works.
ASSESSMENT METHODS
Evaluation will be carried out based on continuous assessment (minimum of 50%) which
assignments, seminar and laboratory works, and mid-exam and/or final examination.
Practical (100%)
Lab exam1 ---------------------------------------------------------------------15%
Lab exam2 ----------------------------------------------------------------------20%
Lab exam3 -----------------------------------------------------------------------25%
Lab exam4 ----------------------------------------------------------------------- 15%
Assignment1 (Given at week 9, due date week 11) ---------------------------15%
Assignment2 (Given at week 14, due date week 16) --------------------------10%
REFERENCE
Manual
Microsoft Windows help and support
Microsoft Office help
Wolkite University
College of Computing and Informatics
Information Technology Program
Module Code
ITec_M_02
Module Name
Total ECTS of the
Computer Systems
12
18
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
module
Objective of the
module
Course Code
Itec2021
Itec2022
At the end of this module students should be able to: Identify Boolean algebra, logic gate and their
relationship
Describe basic digital components of computer like
decoder, encoder, register, counter, multiplexer etc
Describe data representation and basic instruction in a
computer system
Describe control unit and ALU design
Indentify memory and input/output organization in a
basic computer system
Identify BIOS and its setting
Perform disk partitioning and manipulating
Install, use and troubleshoot windows and Linux
operating system
Courses in the Module
Course Name
Credit Hours
ECTS (CP)
(existing)
Computer Organization and
Architecture
Operating Systems
19
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Wolkite University
College of Computing and Informatics
Information Technology Program
Program
Information Technology
Course Code
Itec2021
Course Title:
Computer Organization and Architecture
Degree Program
Information Technology
Module Name
Computer Systems and Maintenance
Module No.
02
Course Chair
TBA
Office location: TBA
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: II, Semester: I
Pre-requisites
Itec1011
Status of the
Course
Compulsory
TBA
2nd year Information Technology Students
20
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course
Description
Course Objective
Course Outline
2012
All students of computing should acquire some understanding and
appreciation of a computer systems functional components, their
characteristics, their performance, and their interactions. Students need to
understand computer architecture in order to structure a program so that it
runs more efficiently on a real machine. The focus of this course is to deal
with Digital logic and digital systems; Machine level representation of
data; Assembly level machine organization; Memory system organization
and architecture; Interfacing and communication; and Functional
organization.
Describe the progression of computer architecture from vacuum
tubes to VLSI.
Demonstrate an understanding of the basic building blocks and
their role in the historical development of computer architecture.
Use mathematical expressions to describe the functions of simple
combinational and sequential circuits.
Design a simple circuit using the fundamental building blocks.
1. Digital logic and digital systems
1.1. Overview and history of computer architecture
1.2. Fundamental building blocks (logic gates, flip-flops, counters,
registers, PLA)
1.3. Logic expressions, minimization, sum of product forms
1.4. Register transfer notation
1.5. Physical considerations (gate delays, fan-in, fan-out)
2. Data Representation
2.1.
2.2.
2.3.
2.4.
2.5.
Bits, bytes, and words
Numeric data representation and number bases
Fixed- and floating-point systems
Signed and twos-complement representations
Representation of nonnumeric data (character codes, graphical
data)
2.6. Representation of records and arrays
3. Assembly level machine organization
3.1.
3.2.
3.3.
3.4.
3.5.
3.6.
3.7.
3.8.
Basic organization of the von Neumann machine
Control unit; instruction fetch, decode, and execution
Instruction sets and types (data manipulation, control, I/O)
Assembly/machine language programming
Instruction formats
Addressing modes
Subroutine call and return mechanisms
I/O and interrupts
4. Memory system organization and architecture
21
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
4.1.
4.2.
4.3.
4.4.
4.5.
4.6.
Storage systems and their technology
Coding, data compression, and data integrity
Memory hierarchy
Main memory organization and operations
Latency, cycle time, bandwidth, and interleaving
Cache memories (address mapping, block size, replacement and
store policy)
4.7. Virtual memory (page table, TLB)
4.8. Fault handling and reliability
5. Interfacing and communication
5.1. I/O fundamentals: handshaking, buffering, programmed I/O,
interrupt-driven I/O
5.2. Interrupt structures: vectored and prioritized, interrupt
acknowledgment
5.3. External storage, physical organization, and drives
5.4. Buses: bus protocols, arbitration, direct-memory access (DMA)
5.5. Introduction to networks
5.6. Multimedia support
5.7. RAID architectures
6. Functional organization
7. Implementation of simple datapaths
8. Control unit: hardwired realization vs. microprogrammed
realization
9. Instruction pipelining
10. Introduction to instruction-level parallelism (ILP)
Methodology
Assessments
Attendance
requirements
Methodology
Attendance
requirements
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 60%
Final exam 40%
85% for lecture and 100% for lab
Lectures supported by tutorials, assignments
85% for lecture and 100% for lab
Text Reference
D. A. Patterson and J. L, Hennessy (1996) Computer Architecture:
A Quantitative Approach, 2nd edition. Morgan Kaufmann, Inc.
D.A. Patterson and J.L Hennessy (1991} Computer Organization
and Design: The
Hardware/Software Interface, 2nd edition. Morgan Kaufmann
Publishers
J.D. Carpinelli (2000) Computer Systems Organization and Architecture,
Addison Wesley Pub Co.
A.S. Taneubaum (1998) Structured Computer Organization. Prentice
22
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Hall M.
M. Mario (1992) Computer System Architecture, Prentice Hall
Hemacher: Computer Organization
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
ITec2022
Course Title:
Operating Systems
Degree Program
Information Technology
Module Name
Computer Systems and Maintenance
Module No.
02
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
7
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
14
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: II, Semester: II
Pre-requisites
Itec1011
TBA
2nd Year Information Technology Students
23
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Status of the
Course
Course Objective
Compulsory
Course Outline
Chapter 1: History and overview
2012
The course introduces students to basics of operating system design
principles and components, and their functions. It will also discuss
memory management, processor management, process management and
deadlocks, concurrency control, scheduling and dispatching, device
management, file systems, file management, security and protection, and
system performance evaluation. In addition, students will be introduced
with different operating systems, and they will see their similarities and
differences.
1.1. Indicate some reasons for studying operating systems
1.2. Indicate some important topic areas such as function and design,
concurrency, scheduling, dispatch, memory management, device
management, file systems, security, and protection
1.3. Describe the purpose of an operating system
1.4. Indicate the meaning of an interrupt
1.5. Describe the meaning of concurrency and the reasons for its
importance
1.6. Illustrate the manner in which scheduling and dispatch take place
in a computer through its operating system
1.7. Describe the manner and importance of memory management
1.8. Describe the manner and importance of device management
1.9. Explore some additional resources associated with operating
systems
1.10.
Explain the purpose and role of operating systems in
computer engineering
Chapter 2: Design principles
2.1. Functionality of a typical operating system
2.2. Mechanisms to support client-server models, hand-held devices
2.3. Design issues (efficiency, robustness, flexibility, portability,
security, compatibility)
2.4. Influences of security, networking, multimedia, windows
2.5. Structuring methods (monolithic, layered, modular, microkernel models)
2.6. Abstractions, processes, and resources
2.7. Concepts of application program interfaces (APIs) specific to
operating systems
2.8. Applications needs and the evolution of hardware/software
techniques
2.9. Device organization
2.10.Interrupts: methods and implementations
2.11.Concept of user/system state and protection, transition to kernel
mode
24
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Chapter 3: Design principles
3.1.
3.2.
3.3.
3.4.
3.5.
3.6.
3.7.
3.8.
States and state diagrams
Structures (ready list, process control blocks, and so forth)
Dispatching and context switching
The role of interrupts
Concurrent execution: advantages and disadvantages
The mutual exclusion problem and some solutions
Deadlock: causes, conditions, prevention
Models and mechanisms (semaphores, monitors, condition
variables, rendezvous)
3.9. Producer-consumer problems and synchronization
3.10.Multiprocessor issues (spin-locks, reentrancy)
Chapter 4: Scheduling and dispatch
4.1.
4.2.
4.3.
4.4.
Preemptive and non-preemptive scheduling
Schedulers and policies
Processes and threads
Deadlines and real-time issues
Chapter 5: Memory management
5.1.
5.2.
5.3.
5.4.
5.5.
5.6.
5.7.
Review of physical memory and memory
management hardware
Overlays, swapping, and partitions
Paging and segmentation
Placement and replacement policies
Working sets and thrashing
Caching
Chapter 6: Device management
6.1.
6.2.
6.3.
6.4.
6.5.
Characteristics of serial and parallel devices
Abstracting device differences
Buffering strategies
Direct memory access
Recovery from failures
Chapter 7: Security and protection
7.1.
7.2.
7.3.
7.4.
7.5.
7.6.
7.7.
7.8.
Overview of system security
Policy/mechanism separation
Security methods and devices
Protection, access, and authentication
Models of protection
Memory protection
Encryption
Recovery management
Chapter 8: File systems
8.1 Files: data, metadata, operations, organization, buffering,
25
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
sequential, nonsequential
8.2 Directories: contents and structure
8.3 File systems: partitioning, mount/unmount, and virtual file
systems
8.4 Standard implementation techniques
8.5 Memory-mapped files
8.6 Special-purpose file systems
8.7 Naming, searching, access, backups
Text Reference: Andrew S. Tanenbaum (1992) Modern Operating
Systems. Prentice-Hall International Inc.
Operating Systems, 4th edition by W. Stalling (editor) PrenticeHall 2001
Distributed Systems: Concepts and Design (3rd edition), George
Coulouris, Jean
Dollimore and Tim Kindberg, Addison Wesley Longman, 2000.
Distributed Programming with Java, Qusay H. Mahmoud, Manning
Publications Co., 2000.
Distributed Systems: Principles and Paradigms, Andrew S.
Tanenbaum and Maarten van Steen, Prentice-Hall, 2002.
Software Requirements: UNIX/Linux operation systems
Instructional: Lectures, Laboratory
Methods of Evaluation: Assignment, mid and final exams
Instructional
Methods
The course will be delivered through lectures, discussions, and
Assignment. Students are expected to actively participate in the
discussions.
Assessment
50% continuous assessment
50% final exam
26
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
University Logo
University Name
Information Technology Program
Module Code
ITec_M 03
Module Name
Total ECTS of the
module
Computer Maintenance
Objective of the
module
The objectives of the module are:
To Understand concepts of maintenance and troubleshooting
Choose CPU that matches their motherboard and install it
Choose different cards that match their motherboard and
install them
Install RAM, Cards and other devices
Diagnose computer problems and solve the problems
Upgrade computer system hardware
Install OS and any other application software
Identify and solve computer problems whether software
related or hardware related
Course Code
ITec4031
Understand and identify PC hardware components
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
4
7
Computer Maintenance and
Technical Support
27
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Wolkite University
College of Computing and Informatics
Program
Information Technology
Course Code
ITec4031
Course Title:
Computer Maintenance and Technical Support
Degree Program
Information Technology
Module Name
Computer Maintenance
Module No.
02
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
7
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
14
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
4th year Information Technology Students
Year /Semester
Year: IV, Semester: I
Pre-requisites
Computer Organization and ArchITECture
Status of the
Course
Course
Description
Compulsory
This course exposes the student to hardware components of computer
system and software from technicians point of view. The course teaches
about CPU types and installation, RAM types and installation, expanding
28
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
computer using cards, troubleshooting computer problems, and installing
OS and application packages. Solving problems related computer system,
whether hardware or software, is what the course deals about.
Course Objective
After completion of this course ,students will be able to :
Understand and identify PC hardware components
Build ,configure ,upgrade ,and maintain a computer
Install operating systems and application software
Providing basic knowledge of preventive maintenance and how to
use windows built-in diagnostic tools.
To have practical experience of troubleshooting PC hardware and
software problems
Understand concepts of maintenance and troubleshooting
Choose CPU that matches their motherboard and install it
Choose different cards that match their motherboard and install
them
Course Outline
Install RAM, Cards and other devices
Diagnose computer problems and solve the problems
Part I Hardware Concepts
1. Basics
General concepts about PC and tech support
Lab procedures and maintenance tools
Static energy and its effect on computers
Safety rules
Preventive maintenance and troubleshooting
1. Computer Cases and the Motherboard
Computer cases
Safety and the computer
System Cover removal and replacement
System board defined
System board evolution
29
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Removing and replacing motherboard
Troubleshooting the motherboard
2012
2. The CPU
History of CPU
Types of CPU
CPU Sockets and slots
Upgrading CPUs
3. Memory
Random Access Memory defined
Physical memory packaging
Types of memory
Read-only Memory and Cache Memory
Identify Memory Problems and upgrading
4. Power Supplies
Power supplies
Types of power supply
Batteries
Troubleshooting the Power Supply
5. Storage Devices
6.
The Floppy Drive
The Hard Drive
The CD-ROM Drive
Bus and Cards
Bus
o Types of Bus
o Expansion Buses
Cards
o The Video Card
o The Sound Card
30
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
o Network card
7.
8.
I/O Connectors
The Serial Port
The Parallel Port
I/O connectors
The Monitor
Introduction to Monitor
Types of Displays
Health and Safety Concerns
Monitor Connections
Troubleshooting the Video System
9. BIOS
Basic Input/Output System
Error messages and solutions
Advanced BIOS Features
10. Printers
Printer Types and Printer Technology
Printer Field Replaceable Units
Printer Maintenance Techniques
Part II Software Concepts
1.
2.
Introductions
History of Operating System
Types of Operating System
Purpose of Operating System
Disk use, Booting and File systems
File systems:
o FAT
o NTFS
31
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
o HPFS
3.
4.
Sectors, Clusters and Fragmentation
Boot sector and other areas of disk
NTLDR, GRUB, LILO and other boot loaders
Registry Editing in Windows
What is Registry
Managing and Editing Registry
Back up registry
OS ArchITECture and Important OS files
ArchITECture of Windows NT
Kernel
Types of Kernel
Important Windows files (NTdetect.com, Boot.ini, NTLDR,
etc)
5.
6.
Installing Hardware, and Software
How to install hardware and drivers
Plug and Play devices
Installing/uninstalling application software
Operating System Installation and Management
Install Windows as single or dual boot
Recover failed Windows OS
Install Linux as Single or dual Boot
Manage user accounts and access rights
Computer security ring
Disable/Enable registry editing, task manager, and
Command Prompt
7.
Use Administrative tools and control Panel
Resource Sharing and Management
File Sharing
Printer Sharing
32
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Server management (e.g. Web server)
Protecting attacks(e.g. Virus)
2012
Lab. Classes:
Computer Disassembly
Disassemble a computer using safe lab procedures and
proper tools.
Computer Assembly
Install the Power Supply
Install the Motherboard
Install the Drives
Install Adapter Cards
Install Internal Cables
Complete the Computer Assembly
Boot the Computer
Operating System
Upgrade Components
Install Windows XP
Windows XP User Accounts and Updates
FAT32 and NTFS
Run Commands
Install Third-Party Software
Restore Point
Windows Backup and Recovery
Assessment Method
Assignment-1 Due20%
Practical ------------------------------------------------------------15%
Mid Exam . 25%
Final Examination 40%
Practical work supportedby projects and assignments
33
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Reference
1.
2.
PC troubleshooting and repair , Stephen J. Bigelows
PC troubleshooting and repair
Stephen J. Bigelows(available at main Library)
3.
A+ a complete guide, third edition.
By David Groth (available in softcopy)
4.
Upgradingand Repairing Microsoft Windows
By Scott Mueller, Brian Knittel (available in softcopy)
University Logo
Wolkite University
College of Computing and Informatics
Information Technology Department
Module Code
Module Name
Total ECTS of the
module
Objective and
competences of the
module
ITec_M_04
Basic Programming
10
This module is designed to:
-
Enable students design, code, debug and document large
programs using procedural programming style.
Course Code
ITec1041
ITec2042
Courses in the Module
Course Name
Fundamentals of Programming I
Fundamentals of Programming II
Credit
ECTS (CP)
Hours
(existing)
3
5
3
34
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Wolkite University
College of Computing and Informatics
Program/Department Information Technology
Course Code
ITec1041
Course Title:
Fundamentals of Programming I
Degree Program
Information Technology
Module Name
Basic Programming
Module No.
ITec_M_04
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits (CP)
Contact Hours (per
Lecture
Tutorial
Lab/Practical Home
week)
Total
Study
2
Lecture days, Hours
and Room:
Tutorial/Lab days
and Hours
Target Group:
1st year Information Technology Students
Year /Semester
Year: I, Semester: II
Pre-requisites
Introduction to Information Technology
Status of the Course
Compulsory
10
Course Outline
Course Description
The course aims to help students gain experience and confidence with
concepts of computer programming that will allow them to solve
35
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Objectives
2012
meaningful problems in a variety of fields. Basic ideas of computer and
software architecture will be covered along with programming concepts
such as flow, logic, data structures, and modularity. The core emphasis
of the course is on the following: 1) Programming Concepts
recognizing and understanding the fundamental constructs present in all
programming languages; 2) Design Methodology Using abstraction
to simplify complex problems into concrete subtasks; 3) Algorithmic
Thinking Defining the process used to glean information from data,
and being able to convince oneself of its correctness; 4) Literate
Programming Writing programs which are clearly structured and can
be read by a human as well as a machine; 5) Methodical and efficient
development of computer programs using step-wise refinement and
incremental testing and debugging
On completion of this course, students should be able to:
-
fully understand the software development life cycle
Discuss the importance of algorithms in the problemsolving process.
Design algorithms for solving simple problems.
Use pseudocode or a programming language to
implement, test, and debug algorithms for solving
simple problems.
Describe strategies that are useful in program
debugging.
Understand and explain the behavior of simple programs
involving the fundamental programming constructs.
Modify and expand short programs that use standard
conditional control structures and functions.
Design, implement, test, and debug a program
Course Content
1. Problem solving using computers
Computer Fundamentals
Programming Languages
Identifying and Analyzing problems
Software Crisis
Software development method (Problem Definition,
Requirement analysis, Design (algorithm, Flow charts,
Pseudo codes), Coding, Testing & Maintenance,
Documentation.
2. Fundamentals of the C/C++ Programming Language
A brief history of C/C++
Procedural and Object-Oriented Programming
C++ and Object-Oriented Programming
The structure of C++ Programs
36
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Compilation process of C++
A simple C++ program
Input/Output in C++
Comments in C++
3. Constants, Variables, data Types and Operators
C++ tokens
Declaring a variable
Naming rules for variables
Basic data types
Assigning values to variables
Constants
Operators and operator precedence
Mathematical operators
Relational operators
Logical operators
Increment and decrement operators
4. Control Flow Statements (Selection and Repetition
Statements)
Selection Statements
If
ifelse
Nested if.else
switch
Repetition statements (loops)
for loop
while loop
do while loop
Nested loops.
5. Introduction to Arrays and Functions
Introduction to arrays
Introduction to functions
Declaring and defining function
Function Prototype
Calling function
Lab Contents:
Compilation process of C++
Displaying message using cout
Declaring and initializing variables with different data
types
Declaring constant identifiers and use in the program
Assigning values to variables
Accepting values from users through cin
Practicing operators and expressions
Practicing control structures (sequential, if, ifelse,
nested if else, switch, for loop, while loop, do while
37
Undergraduate Information Technology Program National Harmonized Modular Curriculum
References
2012
loop and Nested loops)
Arrays and functions
1. Walter Savitch, Problem solving with C++ - The Object of
programming, Menlo Park: Addison-Wesley, 1996.
1. Dietel&Dietel, C How To Program, Third Edition, Prentice
Hall, 2003
2. Robert Lafore, The Waite Groups programming Using Turbo
C++ Techmedia, 1993
3. John R. Hubrard, Fundamentals of Computing with C++,
Shuams Outline, 1997
4. Jess Liberry, An Introduction to C++ 1995
Robert Lafore, The Wait Group Object Oriented programming With
C++ 1994
Teaching Learning
Methods:
Assessment Methods:
Lectures, Laboratory and Tutorials
Continuous Assessments (60%):
- Lab works
- Quizzes
- Assignment
- Tests
- Project
Final exam-40%
38
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Wolkite University
College of Computing and Informatics
Program/Department Information Technology
Course Code
ITec2042
Course Title:
Fundamentals of Programming II
Degree Program
Information Technology
Module Name
Basic Programming
Module No.
ITec_M_04
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits (CP)
Contact Hours (per
Lecture
Tutorial
Lab/Practical Home
week)
Total
Study
2
Lecture days, Hours
and Room:
Tutorial/Lab days
and Hours
Target Group:
1st year Information Technology Students
Year /Semester
Year: II, Semester: I
Pre-requisites
Fundamentals of Programming I
Status of the Course
Compulsory
10
Course Outline
Course Description
This course is designed for people with prior programming experience.
The topics covered in this course are the fundamental concepts behind
programming preparing students to learn advanced programming
39
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Objectives
2012
languages. Topics include basic logic constructs functions, array,
pointers, file systems structures and structured programming
statements.
On completion of this course, students should be able to:
-Solve problems using procedural programming languages
-To know and use C++ programming language
-To know concepts of class in C++
-To get familiar with pointer and its application
Course Content
1.
Array and String
one-dimensional array
multi-dimensional array
working with string
2.
Pointers in C++
3.
Function
4.
Fundamentals of Classes
Data Types
User Created Data Types
Using The Class Concept
Defining a class
public
The Scope Resolution Operator ::
public
Using class Objects Like Built-in Types
Scope
Constructors
Member Initialization Lists
Destructors
Array of Objects
Pointers
The this Pointer
Passing Objects To Functions
and private Access Levels
and private Access Levels (again)
40
Undergraduate Information Technology Program National Harmonized Modular Curriculum
5.
Returning Objects From Functions
static
2012
Class Members
Operator Overloading
Introduction
Rules for Operator Overloading
Rationale for Operator Overloading
Overloading Member Functions
Overloading Non-Member Functions
friend
The copy Constructor
The Assignment Operator
Overloading [ ]
Overloading Increment and Decrement Operators
const
Functions
Objects and References
I/O
6.
7.
The iostream Library
Predefined Streams
operator<<
Overloading << for User-Defined Classes
Overloading >> for User-Defined Classes
Manipulators
Stream States
Formatted I/O
Disk Files
Internal Transmission of Data
Reading & Writing Objects
Advanced Topics
Template Functions
Template Classes
Multiple Inheritance
User-Defined Conversions
41
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Lab Content
References
Data Structures
An Iterator Class
Exceptions
Arrays and string
Pointers
Functions
Classes
constructors
lists
public and private access method
destructor
array of object
passing objects to functions
Overloading increment and decrement operators
I/O and files
User defined classes
Advanced topics
2012
Template and exceptions
2. Walter Savitch, Problem solving with C++ - The Object of
programming, Menlo Park: Addison-Wesley, 1996.
5. Dietel&Dietel, C How To Program, Third Edition, Prentice
Hall, 2003
6. Robert Lafore, The Waite Groups programming Using Turbo
C++ Techmedia, 1993
7. John R. Hubrard, Fundamentals of Computing with C++,
Shuams Outline, 1997
8. Jess Liberry, An Introduction to C++ 1995
Robert Lafore, The Wait Group Object Oriented programming With
C++ 1994
Teaching Learning
Methods:
Lectures, Laboratory and Tutorials
42
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Assessment Methods:
2012
Continuous Assessments (60%):
- Lab works
- Quizzes
- Assignment
- Tests
- Project
Final exam-40%
University Logo
Wolkite University
College of Computing and Informatics
Information Technology Department
Module Code
Module Name
Total ECTS of the
module
Objectiveof the
module
ITec_M_05
Advanced Programming
24
The objectives of the module are:
-
Enable students to analyze variety of problems and
generate appropriate algorithmic solutions and explore the
syntax and semantics programming language fundamentals
Enable students to understand and implement varieties of
algorism analysis and implementation techniques
To enable students in identifying and analyzing classes,
relationship between classes and implement using
programming languages
Enable students to apply Rapid Application Development
and visual programming concepts and tools
Course Code
ITec2051
ITec2052
ITec3053
ITec3054
Courses in the Module
Course Name
Data structure and Algorithms
Object Oriented Programming
Event-Driven Programming
Advanced Programming
Credit
Hours
(existing)
4
3
4
3
ECTS (CP)
7
5
7
5
43
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Wolkite University
College of Computing and Informatics
Program/Depart Information Technology
ment
Course Code
ITec2051
Course Title:
Data structure and Algorithms
Degree Program Information Technology
Module Name
Advanced Programming
Module No.
ITec_M_05
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tuto
r
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
7
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
14
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
1st year Information Technology Students
Year /Semester
Year: II, Semester: II
Pre-requisites
Fundamentals of Programming II
Status of the
Course
Compulsory
44
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Course Outline
Course
Description
Course
Objectives
The goal of the course is to give a basic understanding of how common
computational problems can be solved efficiently on a computer. In general,
the course teaches students how to write fast and efficient programs and
enables them to analyze the efficiency of their programs.
On completion of this course, students should be able to:
Use dynamic memory management in their programs
Implements linked lists, stacks, queues, trees, and graphs
Write programs that utilize complex data structures (lists,
stacks, trees)
Analyze complexity algorithms
Integrate different modules to solve a single problem
Write fully functional programs that consists of multiple files
Course Content
1. Algorithm analysis concepts
Measuring complexity,
complexity of algorithm
big-oh notation and others
2.
Time complexity of known algorithms
Simple algorithms; Sorting and searching
3. Data structures and applications
Linked lists
Queues
Stacks
Trees
Graphs
4. Advanced sorting and searching algorithms
Shell sort
Quick sort
Heap sort
Merge sort
5. Hashing
Lab Content
o
o
o
o
Function and array revision
Simple searching and sorting algorithm
Linked list, Queue, Stack, Trees
Advanced sorting and searching algorithm
References
Algorithms and Data Structures: The Science of Computing by
Baldwin/Scragg. Charles River Media. 2004.
45
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Teaching
Learning
Methods:
Assessment
Methods:
MichaelT.GoodrichandRobertoTamassia,DataStructuresandAlgorith
msinJavaWiley.
Lectures, Laboratory and Tutorials
Continuous Assessments (60%):
- Lab works
- Quizzes
- Assignment
- Tests
- Project
Final exam-40%
46
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Wolkite University
College of Computing and Informatics
Program/Department Information Technology
Course Code
ITec2052
Course Title:
Object Oriented Programming
Degree Program
Information Technology
Module Name
Advanced Programming
Module No.
ITec_M_05
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits (CP)
Contact Hours (per
Lecture
Tutorial
Lab/Practical Home
week)
Total
Study
3
Lecture days, Hours
and Room:
Tutorial/Lab days
and Hours
Target Group:
2st year Infor0mation Technology Students
Year /Semester
Year: II, Semester: II
Pre-requisites
Fundamentals of Programming II
Status of the Course
Compulsory
14
Course Outline
Course Description
The goal of the course is to give a basic of class; data members
&member functions; friends, static members, overloading; inheritance
&composition; virtual functions; virtual base classes; templates;
47
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Objectives
2012
exception handling; File handling; object-oriented design concepts.
Upon completion of this course, students should be able to:
Create Java technology applications that leverage the objectoriented features of the Java language, such as
encapsulation, inheritance, and polymorphism
Execute and run a Java technology application
Use Java technology data types and expressions
Use Java technology flow control constructs
Use arrays and other data collections
Implement error-handling techniques using exception
handling
Create event-driven GUI using Java technology GUI
components: panels, buttons, labels, text fields, and text
areas
Create multithreaded programs
Create JDBC applications
Course Content
Chapter 1: Introduction
Features of Object-Oriented Programming
Object-Oriented Programming vs. Procedural
programming
Object-Oriented Programming Languages
Chapter 2: Classes and Objects
Defining Classes
Access Control (Private, protected, public)
Attributes and methods
Working with Objects
Storage Allocation
o Static, automatic and dynamic memory
allocation
o newand deleteoperators
o Constructors and Destructors
Inline Functions
Friend Functions
String Class
Chapter 3: Pointers and References
Pointers
o Pointers to objects
o this pointer
References
o Defining references
o Passing references as function arguments
48
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
o Returning by references
Chapter 4: Polymorphism
Function overloading
Operator overloading
Chapter 5: Inheritance
Types of inheritance
Derived Classes
pointers to Derived Classes
Constructors in Derived Classes
Virtual Base Classes
Abstract Classes
Virtual Functions
Early vs. late binding
Nesting Classes
Chapter 6: Input/ Output
Formatting Consol I/O
File I/O
o Sequential access files
o Random access files
Chapter 7: Templates and Exception Handling
Templates
o Class template
o Function template
Exception handling
Lab Content
References
Teaching Learning
Methods:
Assessment Methods:
E.Balagurusamy, Object oriented programming with
C++, Tata Mc. Graw Hill
Gary J Bronson , C++ for Engineers and Scientists
R.J.Mitchell, C++ Object Oriented Programming, SpringerVerlag Book Publishing Company.
Lectures, Laboratory and Tutorials
Continuous Assessments (60%):
- Lab works
- Quizzes
- Assignment
- Tests
49
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
- Project
Final exam-40%
University Name
50
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
School/College/Faculty/Institute
Program/Department Information Technology
Course Code
ITec2052
Course Title:
Advanced Programming
Degree Program
Information Technology
Module Name
Advanced Programming
Module No.
ITec_M_05
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits (CP)
Contact Hours (per
Lecture
Tutorial
Lab/Practical Home
week)
Total
Study
3
Lecture days, Hours
and Room:
Tutorial/Lab days
and Hours
Target Group:
1st year Information Technology Students
Year /Semester
Year: III, Semester: I
14
Pre-requisites
Status of the Course
Compulsory
Course Outline
Course Description
This course covers topics on advanced features of programming in Java
which includes introduction, Applets, Java Beans, Servlet
programming, Java database connectivity (JDBC), Java server
page(JSP) fundamentals and Remote Method invocation. Other major
51
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Objectives
2012
topics in this course include Network Programming, Multithreading,
files and Interfaces.
After completion of this course student will be able:
To know the features of Applets and develop Applet
programs
To have a good understanding of threads programming
To know how to program client/server interaction using
Sockets
To expose with the knowledge of manipulating databases
with JDBC
To know the concept of Servlet and how to handle the get
and post requests
To know the concepts of Java Server Page.
Course Content
Chapter 1: Introduction
Features of Object-Oriented Programming
Object-Oriented Programming vs. Procedural
programming
Object-Oriented Programming Languages
Chapter 2: Classes and Objects
Defining Classes
Access Control (Private, protected, public)
Attributes and methods
Working with Objects
Storage Allocation
o Static, automatic and dynamic memory
allocation
o newand deleteoperators
o Constructors and Destructors
Inline Functions
Friend Functions
String Class
Chapter 3: Pointers and References
Pointers
o Pointers to objects
o this pointer
References
o Defining references
o Passing references as function arguments
o Returning by references
Chapter 4: Polymorphism
52
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Function overloading
Operator overloading
Chapter 5: Inheritance
Types of inheritance
Derived Classes
pointers to Derived Classes
Constructors in Derived Classes
Virtual Base Classes
Abstract Classes
Virtual Functions
Early vs. late binding
Nesting Classes
Chapter 6: Input/ Output
Formatting Consol I/O
File I/O
o Sequential access files
o Random access files
Chapter 7: Templates and Exception Handling
Templates
o Class template
o Function template
Exception handling
Lab Content
References
Teaching Learning
Methods:
Assessment Methods:
Lectures, Laboratory and Tutorials
Continuous Assessments (60%):
- Lab works
- Quizzes
- Assignment
- Tests
- Project
Final exam-40%
53
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
University Logo
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module
Objective of the
module
Course Code
ITec1061
ITec2062
ITec2063
ITec_M06
Systems Development and Management
15
The objectives of the module are:
Demonstrate the structural systems analysis and design concepts
and fact finding techniques and describe the information systems
development life cycles (SDLC)
Demonstrate the object-oriented system analysis and design
concepts, tools, techniques
Enable students understand a range of standards, techniques and
tools developed to support software project management and the
production of high quality software
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Structural Systems Analysis and Design
3
5
Object-Oriented System Analysis and
3
5
Design
Information Technology Project
3
5
Management
University Name
Program
Information Technology
Course Code
Itec1061
Course Title:
Structural System Analysis and Design
Degree Program
Information Technology
Module Name
Systems Development and Management
Module No.
IT_M 06
Course Chair
Office location:
54
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Mobile:
2012
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical Home Study
Total
(per week)
10
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
1st Year Information Technology Students
Year /Semester
Year: I, Semester: II
Pre-requisites
None
Status of the
Course
Compulsory
Course
Description
This course will explore the Systems theory; systems thinking; organization
and management; information systems concepts; types of information
systems; roles in IS development; IS development life cycle; information
systems development methodologies; approaches to IS development;
Structured systems analysis and design concepts; Structured analysis; fact
finding techniques; analysis tools and techniques for requirements
structuring. Individual and/or team project involving reports and walkthrough in systems analysis and general design is also a major component
of this course using CASE tools.
Course
General objectives of the course:
55
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Objectives
At the end of the course students will be able to:
Understand the various information system concepts and system
development methodologies
Demonstrate the systems analysis and design concepts
And fact finding techniques
Describe the information systems development life cycles (SDLC)
List alternatives to the systems development life cycle
Demonstrate knowledge of project management terms and
techniques
Course Content
Content
Brief Introduction about the course
Chapter 1. Foundations for systems
development
1.1 Systems development environment
1.2
2012
Date
Week 1
Reference book
Course guide book
Week 2
Week 3
Week 4
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 3-28 and 47-81
Managing the information systems
project
Chapter 2. Systems Panning and Section
2.1 Identifying and selecting Systems
Development projects
Week 5
Week 6
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 100-129
2.2 Initiating and Planning Systems
Development projects
3.1 Structuring System Process
Requirements
Week 7
3.2 Structuring system Logic Requirements
Week 8
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 206-238
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 252-281
Mid Exam
3.3 Structuring System data Requirements
Week 9
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 283-342
56
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Week 10
Week 11
Chapter 4:System design
1.3 Designing databases
1.4
Designing the human interface
Chapter 5: Systems implementation and Week 12
Week 13
Week 14
Maintenance
5.1 System implementation
2012
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 344-387
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
P 520
P560
5.2 Systems Maintaining information
systems
The course project presentation
Week 15
Final Exam
As per schedule of
the School
Methodology
The course will be delivered in lectures (with a participatory approach) - students are encouraged
to ask questions and also they are encouraged to answer whenever questions are raised), present
their assignments in the class and actively participate in the tutorial program.
Assessment Method (continuous):
Lecture 100%
Tutorial
100%
References:
Hoffer J.,George J. ,Valacich J. . (2008). Modern Systems Analysis and Design. 5th
Edition. Pearson Education,Inc.
References :
Jeffery, Whitten et al. 2001. System Analysis and Design Methods , 5th ed. McGraw Hill
Irwin.
Elmasri et al (2004). Fundamentals of Database Systems, 4thed, Pearson education
University Name
Program
Information Technology
Course Code
ITec2062
Course Title:
Object-oriented System Analysis and Design
57
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Degree Program
Information Technology
Module Name
Systems Development and Management
Module No.
06
2012
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical Home Study
Total
(per week)
10
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
2nd Year Information Technology Students
Year /Semester
Year: II, Semester: I
Pre-requisites
Status of the
Course
Compulsory
Course
Description
This course will explore the
Introduction to Object Technology; Principles of
Modeling, Principles of Object Orientation; systems development using the object
technology; Modeling; principles of modeling; requirements gathering and
modeling using use case; techniques of modeling static and dynamic aspects of
systems; finding classes and objects; Interaction Diagrams - sequence and
collaboration diagrams; Class Diagrams; object diagram; activity diagram;
Statechart diagrams; component diagram; deployment diagram. Individual and/or
team project involving reports and walk-through in systems analysis and design is
58
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
also a major component of this course using CASE tools.
Course
Objectives
At the end of the course students will be able to:
Understand the object technology and modeling principles.
Know the techniques of modeling aspects of systems
Analyze user requirements using UML of OO techniques.
Make a detailed design using UML of OO techniques.
Course Content
Content
Brief Introduction about the course
Period
Week 1
Reference book
Course guide book
1.1
OO concepts from structured point of view
o Abstraction, Encapsulation and information
hiding
o inheritance
o Association
o Aggregation
o Collaboration
o Persistence
o Coupling
o Cohesion
o polymorphism
o Interfaces
o components
o Patterns
Chapter 2: Object Orientation the new software paradigm
2.1. The potential benefits of object orientation
2.2. The potential drawbacks of object orientation
2.3. Object standards
2.4. The object orientation software process
Week 2
Week 3
Week 4
Object Primer Scott Ambler
2nd Edition
Pp 133-180
Week 5
Week 6
Object Primer Scott Ambler
2nd Edition
pp 9-30
Chapter 3: Gathering user requirements
Week 7
Week 9
Object Primer Scott Ambler
2nd Edition
pp 31-108
Chapter 1: Understanding the Basics :Object oriented concepts
3.1. Putting together requirements gathering team
3.2. Fundamental requirements gathering techniques
3.3. Essential Use Case Modeling
3.4. Essential User Interface Prototyping
3.5. Domain modeling with class responsibility collaborator
(CRC) cards
3.6. Developing a supplementary Specification
3.7. Identifying Change Cases
59
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
validation Techniques
4.1. Testing Early and Often
4.2. Use Case Scenario Testing
Week 10
Object Primer Scott Ambler
2nd Edition
Pp109 -132
Chapter 5: Determining What to Build: OO Analysis
5.1. System Use Case Modeling
5.2. Sequence Diagrams: From Use Cases to Classes
5.3. Conceptual Modeling :Class diagrams
5.4. Activity diagramming
5.5. User interface prototyping Evolving your
supplementary specification
5.6. Applying Analysis patterns Effectively
5.7. User Documentation
5.8. Organizing your models with packages
Chapter 6 : Determining How to Build Your System: OO Design
6.1. Layering your models :Class Type Architecture
6.2. Class Modeling
6.3. Applying Design Patterns Effectively
6.4. State chart modeling
6.5. Collaboration Modeling
6.6. Component Modeling
6.7. Deployment Modeling
6.8. Rational Persistence Modeling
6.9. User Interface Design
Chapter 7: Object Oriented Testing
Week 11
Week 12
Object Primer Scott Ambler
2nd Edition
Pp 181-248
Week 13
Object Primer Scott Ambler
2nd Edition
Pp 249-346
Week 14
Object Primer Scott Ambler
2nd Edition
Pp 403-426
Object Primer Scott Ambler
2nd Edition
Pp 427-437
Chapter 4:Ensuring Your Requirements Are correct: Requirement
Chapter 8 : Software process
Project Presentation
Week 15
Week 16
Methodology
The course will be delivered in lectures (with a participatory approach) - students are encouraged to ask
questions and also they are encouraged to answer whenever questions are raised), present their
assignments in the class and actively participate in the tutorial program.
Assessment Method (continuous):
Lecture 100%
Tutorial 100%
Text book
Ambler, S. W. (2001).The Object primer: The Application Developers Guideto Object
Orientation and the UML Second edition .New York. Cambridge University Press
60
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
References
Booch G., (2000).Object oriented analysis and design with applications, Second Edition,
Pearson Education,Inc.
Hoffer J.,George J. ,Valacich J. . (2008). Modern Systems Analalysis and Design. 5th
Edition. Pearson Education.
Subburaj R. (2003).Object Oriented with C++ ANSI/ISO Standard.Vikas Publishing
House PVT LTD.
Priestley M. (2003).Practical Object oriented Design with UML. second Edition
McGraw-Hill Education.
University Name
Program
Information Technology
Course Code
ITec2063
Course Title:
Information Technology Project Management
Degree Program
Information Technology
Module Name
Systems Development and Management
Module No.
06
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical Home Study
Total
(per week)
10
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
61
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Target Group:
2nd Year Information Technology Students
Year /Semester
Year: II, Semester: I
2012
Pre-requisites
Status of the
Course
Compulsory
Course Outline
Course
Description
This course will introduce the area of Information Technology project
management, presenting basic techniques and approaches and aiming to
develop a critical awareness of the challenges and shortcomings of the area.
IT Project Management is an important area of study since most non-trivial
software development efforts will be make use of some type of project
management approach in an aim to manage the development process in
such a way that the software meets its requirements and is on-time and
within budget.
Course
Objectives
At the end of the course students will be able to:
Course Content
Understand the issues involved in IT project management and the
factors that affect software quality;
Familiar with a range of standards, techniques and tools developed to
support IT project management and the production of high quality
software;
Develop IT project plans, supporting software quality plans and risk
management plans.
Capable of actively participating or successfully managing a software
development project by applying project management concepts
Demonstrate knowledge of project management terms and techniques
Lecture Topics
Reading/
Assignments
62
Undergraduate Information Technology Program National Harmonized Modular Curriculum
1) Introduction to IT Project Management
1.1. Importance of IT project management
1.1.1 What is a project?
1.1.2 Problems with IS Projects
1.1.3 What is Project Management?
1.2. Stages of Project
1.2.1. The Feasibility Study
1.2.1.1 The Cost-benefit Analysis
1.2.2. Planning
1.2.3. Project Execution
1.2.4 Project and Product Life Cycles
1.3. The Stakeholder of a Project
1.3.1 All parties of a project
1.3.2 The Role of Project Manager
1.4. Project Management Framework
1.5. Software Tools for Project Management
2) Project Planning
2.1. Integration Management
2.1.1 What is Integration Management
2.1.2. Project Plan Development
2.1.3. Plan Execution
2.2 Scope Management
2.2.1 What is Scope Management?
2.2.2 Methods for Selecting Projects
2.2.3 Project Charter
2.2.4 Scope Statement
2.2.5 Work Breakdown Structure
2.3 Stepwise Project Planning
2.3.1 Overview of Project Planning
2.3.2 Main Steps in Project Planning
3) Project Scheduling
3.1 Time Management
3.1.1. Importance of Project Schedules
3.1.2. Schedules and Activities
3.1.3. Sequencing and Scheduling Activity
3.2. Project Network Diagrams
2012
R1 pp 4-11
R1 pp 12-28
R1 pp29-38
R1 pp39-50
R1 pp51-64
Reading:
R1 pp65-82
Reading:
R1 pp83-94
Mid Exam
4) Project Cost Management
4.1. Importance and Principles of Project Cost
Management
4.2. Resource Planning
4.3. Cost Estimating
4.4. Cost Budgeting
4.5 Cost Control
Reading:
R1 pp95-106
63
Undergraduate Information Technology Program National Harmonized Modular Curriculum
5) Project Quality Management
5.1 Quality of IT Projects
5.2 Stages of IT Quality Management
5.2.1 Quality Planning
5.2.2 Quality Assurance
5.2.3 Quality Control
5.3 Quality Standards
5.4
Tools and Techniques For Quality Control
6) Project Human Resources Management
6.1. What is Project Human Resources Management?
6.2 Managing People
6.3. Organizational Planning
6.4. Issues in Project Staff Acquisition and Team
Development
7) Project Communication Management
7.1. Communications Planning
7.2. Information Distribution
7.3. Performance Reporting
7.4. Administrative Closure
7.5. Suggestions for Improving Project communications
8) Project Risk Management
8.1. The Importance of Project Risk Management
8.2. Common Sources of Risk in IS projects
8.3. Risk Identification
8.4. Risk Quantification
8.5. Risk Response Development and Control
9) Project Procurrent Management
9.1. Importance of Project Procurrent Management
9.2. Procurrent Planning
9.3. Sollicitation
9.4. Source Selection
9.5. Contract Administration
2012
Reading:
R1 pp107-116
Reading:
R1 pp117-126
Reading:
R1 pp127-146
Reading:
R1 pp147-160
Reading:
R1 pp1-30
9.6. Contract Close-out
10) Project Management Process Groups
10.1 Introduction to Project Management Process
Groups
10.2. Project Initiation
10.3. Project Planning
10.4. Project Executing
10.5. Project Controlling and Configuration
Management
10.6. Project Closing
Reading:
R1 pp 4-11
R1 pp 12-28
R1 pp29-38
64
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Methodology
Three lecture hours are scheduled per week for this course. These hours are fully used to lecture
the course. Students will be asked to read certain topics on their own before a class discussion.
As part of this courses assignment the class will be divided into groups. At the end of the
course, each group in the class is supposed to do assignments and present it in class.The delivery
of the project is subjected to deadline. No extensions will normally be granted for the deadline.
There will be midterm exam for this course. Final examination will be given on the dates
specified by the University. The examinations will focus on understanding and applying the
concepts taught in class and in tutorial sessions of the course. The following topic deals with the
details of the assessment methods of the course.
Assessment Methods (Continuous)
Lecture 100%
Tutorial 100%
Reference books
A Guide to the Project Management Body of Knowledge, Project Management Institute,
Pennsylvania, USA (2000)
Information Technology Project Management Kathy Schwalbe, International Student Edition,
THOMSON Course Technology, 2003
Basics of Software Project Management, NIIT, Prentice-Hall India, 2004
Software Project Management in Practice, PankajJalote, Pearson Education, 2002
Software Project Management, A Concise Study, S.A.Kelkar, Revised Edition, Prentice-Hall
India, 2003
University Logo
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module
Objective of the
module
ITec_M07
Database Systems
12
The objectives of the module are:
Develop an understanding of the different database models
Understand the basic principles of database design systems using
65
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Code
ITec2071
ITec2072
different database models
Design and create databases, tables, views, triggers and indices.
Write SQL queries and database programs
Design a distributed database system in homogenous and
heterogeneous environments
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Fundamentals of Database Systems
3
5
Advanced Database Systems
4
7
University Name
Program
Information Technology
Course Code
ITec2071
Course Title:
Fundamentals of database Systems
Degree Program
Information Technology
Module Name
Data and Information Management
Module No.
ITec_M07
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
Lecture
(per week)
Tutorial
Lab/Practical
Home Study
Total
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
66
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Target Group:
2nd Year Information Technology Students
Year /Semester
Year: II, Semester: I
Pre-requisites
ITec1011
Status of the
Course
Course Outline
Compulsory
Content
2012
Week
Chapter 1: Introduction
Introduction to database system
File based verses Database approach
Characteristics of the Database Approach
Users and actors of Database system
week 1 and week 2
Chapter 2: Database System Architecture
Data Models, Schema and Instances
DBMS Architecture and Data Independence
Database Language and Interface
The Database System Environment
week 3 and week 4
Classification of DBMS
Chapter 3: Database Modeling
The high-level conceptual model
Entity types and Sets, Attributes and Keys
Relationships, Associations, Roles and Structural Constraints
E/R Diagram naming conventions, and Design issues
Mapping ER-models to relational tables
Chapter 4: Enhanced Entity Relationship and Object modeling
Subclass, Super-class and Inheritance
Specialization and Generalization
Constraints and Characteristics of Specialization and
week 5 and week 6
week 7
67
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Generalization
Chapter 5: Functional Dependency and Normalization
Purpose of Normalization
Information redundancy and update anomalies
Functional Dependency
Normalization
week 8 and week 9
Chapter 6: |The Relational Data Model and the Relational Algebra
The Relational Model Concepts
The Relational Constraints and Relational Database Schemas
The Relational Operations
Chapter 7: Record Storage and Primary File Organization
Introduction
Operations on Files
Files of Unordered Records (Heap Files)
Files of Ordered Records (Sorted Files)
Hashing Techniques
week 10 and week
11
week 12, 13, and
week 14
Index Structure for Files
Types of Single level Ordered Index
Dynamic Multilevel indexes using B-Trees and B+ Trees
Indexes on Multiple Indexes
Chapter 8: Structured Query Language(SQL)
Data Definition Language
Data Manipulation Language
Basic SQL Queries
Views
week 15 and week
16
Lab Content:
68
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
The lab should be given using the current DBMS technology
Create database
Create table, primary key, foreign key, relationship, etc
Create view
Retrieve Data
Using aggregate functions
Formatting data, Etc
Methodology
The course will be delivered in lectures (with a participatory approach with particular attention to
encourage students in asking questions and answering), present their assignment and actively
participate in the lab session.
Assessment Method (Should be continuous):
Lecture 100%
Lab 100%
University Name
Program
Information Technology
Course Code
ITec2072
Course Title:
Advanced Database Management
Degree Program
Information Technology
Module Name
Data and Information Management
Module No.
ITec_M07
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
69
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Mobile:
2012
; e-mail:
Content
Brief Introduction about the course
Week
Week 1
Reference book
Course guide book
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
(per week)
6
Lecture
2
Tutorial
0
Lab/Practical Home Study
6
Total
14
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
2nd year Information Technology Students
Year /Semester
Year: II, Semester: II
Pre-requisites
ITec2071
Status of the
Course
Compulsory
Course
Description
This course covers file organizations, storage management, query optimization,
transaction management, recovery, and concurrency control, database
authorization and security. Additional topics include distributed databases, mobile
databases, and integration may also be covered. A major component of the course
is a database implementation project using current database languages and
systems.
Course
Objectives
At the end of this course the students will be able to:
Understand the database query processing and optimization
Know the basics of transaction management
Understand database security
Use different recovery methods when there is a database failure
Design a distributed database system in homogenous and
heterogeneous environments
Course Content
70
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Chapter 1: Query processing and Optimization
Translating SQL Queries into Relational Algebra
Basic Algorithms for Executing Query Operations
Using Heuristic in Query Optimization
Using Selectivity and Cost Estimates in Query
Optimization
Semantic Query Optimization
Chapter 2: Database Security and
Authorization
Introduction to DB Security Issues
Discretionary Access Control Based on Granting
/Revoking of Privileges
Mandatory Access Control for Multilevel Security
Statistical DB Security
Chapter 3: Transaction Processing Concepts
Introduction
Transaction and System Concepts
Properties of Transaction
Schedules and Recoverability
Serializability of Schedules
Transaction Support in SQL
2012
Week 2,3 and
4
Elmasri and Navathe
pp 512- 534
Week 5 and 6
Elmasri and Navathe
pp 616-626
Week 7 and 8
Elmasri and Navathe
pp 551 -562
Week 10,11
and 12
Elmasri and Navathe
pp 575-592
Week 13 and
14
Elmasri and Navathe
pp 597-610
Week 15 and
16
Elmasri and Navathe
pp 657-674
Week 9 Mid Term Examination
Chapter 4: Concurrency Control Techniques
Locking Techniques for Concurrency Control
Concurrency Control Based ON Timestamp Ordering
Multiversion Concurrency Control Techniques
Validation (Optimistic) Concurrency Control Technique
Granularity of Data Items and Multiple Granularity
Locking
Using Locks for Concurrency Control in Indexes
Chapter 5: Database Recovery Techniques
Recovery Concepts
Recovery Concepts Based on Deferred Update
Recovery Concepts Based on Immediate Update
Shadow Paging
The ARIES Recovery Algorithm
Recovery in Multidatabase Systems
Chapter 6: Distributed Database System
Distributed Database Concepts
Data Fragmentation, Replication, and Allocation
Techniques for Distributed database Design
Types of Distributed Database Systems
Query Processing in Distributed Databases
An over view of Client- Server Architecture and its
Relationship to Distributed database
Chapter 7: Spatial /multimedia/mobile databases
Spatial data model spatial queries- multimedia data sourcesmobile databases-data processing
71
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Chapter - Seven.: Web- based databases
Databases on www-providing access to databases web
integration-Open problems with web databases
Chapter Nine: Data Warehousing
Introduction, Data Warehouse, Multidimensional
Data Model, Data Warehouse
Architecture,
Implementation, Further Development, Data Warehousing to
Data Mining
Lab Content:
The lab should be given using the current DBMS technology
Function
Trigger
Security
Transaction
Stored Procedure
Spatial Database
Replication
Methodology
The course will be delivered in a participatory approach with particular attention to encourage
students in asking questions, present their assignment and actively participate in the lab.
Assessment Method (should be continuous):
Lecture 100%
Lab
100%
Text Book
Elmasri et al (2004). Fundamentals of Database Systems, 4thed, Pearson education
References
1 Thomas M. Connolly and Carolyn E.Begg. (2004). A step by step approach to building
databases, 2nded.Pearson Education Limited.
2 Ramon A ,etal. Shaums outlines, fundamentals of relational databases
72
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
3 David M. Kroenke. (1998). Database processing, 6th ed. Prentice Hall
4 Van der Lans (2006). Introduction to SQL, Mastering the relational database language.
3rd ed. London, Addis Wesley
5 Silbershatz A. Korth H andSundarshan (2006). Database System concepts, 5th ed. Boston,
McGraw Hill
6 RamaKrishman(1998). Database Management Systems. Boston McGraw Hill
7 Namdagopalan (2003). Database Management Systems with oracle and vb.Gandhinagar,
Appa Book house.
8 Date, .J (1981). An Introduction to Database systems. 3rd ed. Vol. 1. New Delhi. Narosa
publishing House
University Logo
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module
Objective of the
module
IT_M 08
Database and Information Management
13
The objectives of the module are:
To acquaint students with the various indexing, matching,
organizing and evaluating strategies developed for information
retrieval (IR) systems
Understand spatial database
Manage and administer database
Courses in the Module
Course Code
ITec3081
ITec4082
ITec4083
Course Name
Information Storage and Retrieval
Spatial Database Systems
Database Administration
Credit
ECTS (CP)
Hours
(existing)
3
5
2
3
3
5
73
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Name
Program
Information Technology
Course Code
ITec3081
Course Title:
Introduction to Information Storage and Retrieval
Degree Program
Information Technology
Module Name
Database and Information Management
Module No.
ITec_M08
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
3rd year Information Technology Students
Year /Semester
Year: III, Semester: II
Pre-requisites
Status of the
Course
Course
Description
Compulsory
This course will uncover introductory concepts of Information Storage and
Retrieval; automatic text operation including automatic indexing; data and file
structure for information retrieval; retrieval models; evaluation of information
retrieval systems and techniques for enhancing retrieval effectiveness; query
languages, query operations, string manipulation and search algorithms; Current
74
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Issues in IR etc.
Course Objective
At the end of the course students will be able to:
Understand the various
processes
Know the retrieval model and evaluation of Information Retrieval
Systems
Understand the processes of information storage and retrieval
Design ,develop and evaluate information retrieval models
Understand evaluation issues in IR
Understand current issues in IR
Information Retrieval Systems and
Introduction to ISR (Chapter One)
IR and IR systems
Data versus information retrieval
IR and the retrieval process
Basic structure of an IR system
Text/Document Operations and Automatic Indexing (Chapter Two)
Course Outline
Index term selection (Luhns selection and Zipfs law in IR)
Document pre-processing (Lexical analysis, Stop word Elimination,
stemming)
Term extraction (Term weighting and similarity measures)
Indexing Structures (Chapter Three)
Inverted files
Tries, Suffix Trees and Suffix Arrays
Signature files
IR Models (Chapter Four)
Introduction of IR Models
Boolean model
Vector space mode
75
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Probabilistic model
Mid Exam
Retrieval Evaluation (Chapter Five)
Evaluation of IR systems
Relevance judgment
Performance measures (Recall, Precision, etc.)
Query Languages (Chapter Six)
Keyword-based queries
Pattern matching
Structural queries
Query Operations (Chapter Seven)
Relevance feedback
Query expansion
Current Issues in IR (Chapter Eight)
Research in IR (Multimedia Retrieval, Web Retrieval, Question
answering. etc.)
Lab:
Using Python or Perl or any language demonstrate on tokenization, stemming, lexical analysis,
etc
Methodology
For this course three lecture hours and three tutorial hours are scheduled per week. Students are
expected to read topics in advance. Participation in class and discussion is anticipated from the
students.
Assessment method (Continuous):
Lecture 100%
Lab
100%
Text Book
76
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Ricardo A. Baeza-Yates, Berthier Ribeiro-Neto, Modern Information Retrieval, ACM Press,
1999.
OtherReference Books:
Salton, G. and McGill, M. J. Introduction to Modern Information Retrieval, McGraw-Hill
Co., 1983.
Robert R. Korfhage, Information Storage and Retrieval, John Wiley and Sons, 1997.
C. J. Van Rijsbergen. Information retrieval. London: Butterworths, 1979.(available at:
http://www.dcs.gla.ac.uk/~iain/keith/)
Information Retrieval: Data Structures and Algorithms by W. B. Frakes and R. Baeza-Yates
(Eds.) (Prentice-Hall) 1992, ISBN 0-13-463837-9.
Sprck Jones, K. and Willett, P. (eds.). Readings in information retrieval. San Francisco:
Morgan Kaufmann, 1997.
Department of Information Technology
Course Code
Course Title
Degree Program
Module
Module coordinator
Lecturer
ECTS Credits
Contact Hours (per
semester)
ITec4083
Database Administration
B. Sc. in Information Technology
TBA
TBA
5
Lecture
Lab
Tutorial proj present Evaluat Home
ect ation
ion
study
2
3
0
5
After completing this course the students will be able to
know:
Know general structure of database servers
Install and configure a database server
Course Objectives to be
Acquired
Describe need for security of servers
Maintain tables of the database
Create and manage database users
Secure the server
Perform backup and recovery of the server
Perform query optimization
77
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
This course is designed to give students the knowledge and skills
needed to maintain successful and efficient day-to-day
operations of databases and services. Administrators will gain
practical experience in setting up, administering, optimizing and
troubleshooting databases. They will gain an understanding of
the archITECture of a database. They will be able to ensure the
integrity and availability of a company's data within the database
environment.
Course contents:
Database ArchITECture
Installing and Configuring a database server
Starting, Stopping a database server
Security-Related Configuration
Database Creation
Course
Description/Course
Contents
Client Programs for DBA Work
Locking
Storage Engines
Table Maintenance
The Information Schema Database
Backup and Recovery
Stored Procedures
User Management
Securing the Server
Optimizing Queries
Optimizing Schemas
Optimizing the Server
Interpreting Error Messages
Optimizing the Environment
78
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Lab classes:
. Installing Database Server
SQL Server components
File particulars
The code
Installation
SQL Server security
Creating and configuring database roles
Creating and configuring logins
Creating and configuring users
SQL Server access
Creating a SQL Server database
Create database
Alter database
SQL Server advanced concepts
Locking
Isolation
SQL Server Lock management
Information schema database
Schema Definition
Assertion
Domains
Views
Stored procedures
Create stored procedures
Alter Stored procedures
Dropping Stored procedures
Query optimization and query processing
Error management
SQLCODE and SQLSTATE
79
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Pre-requisites
Semester
Status of Course
Teaching &Learning
Methods
2012
SQL statement codes
Year IV, Semester I
Compulsory
Lectures ,Lab, tutorial
85% during lecture and 100% in Lab
Attendance
Assessment
(Continuous)
Lecture 100%
Lab
100%
Oracle DBA Made SimpleOracle database administration
techniques Mike Ault
MySQL Database AdministrationSams PublishingPaul
References
Dubois
University Logo
University Name
Information Technology Program
Module Code
Module Name
Total ECTS of the
module
Objective of the
module
Itec_M 09
Web Systems and Technologies
13
The objectives of the module are:
To provide students with a working knowledge of Internet
terminology and services including e-mail, WWW browsing, search
engines, ftp, file compression, and other services using a variety of
software packages. Provides instruction for basic server
administration tasks related to Internet Service provision.
Learning Outcome:
To Obtain Capability to develop static and dynamic websites.
To achieve skills to Create Server/client side scripts,
commercial and scientific programs, Design the network
80
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
security enhancing applications.
An ability to analyze a web based problem, and identify and
define the requirements appropriate to its solution
An ability to design, implement, and evaluate a web based
program to meet desired needs
An ability to use current techniques, skills, and tools
necessary for internet programming
To possess skills to do Web Server programming, Develop
E-commerce Implementations.
Courses in the Module
Course Name
Course Code
Fundamentals of Internet
Programming
Advanced Internet Programming
ITec2091
ITec3092
ITec3093
E-Commerce
Credit
ECTS (CP)
Hours
(existing)
3
5
3
2
5
3
University Name
School/College/Faculty/Institute
Program
Information Technology
Course Code
ITec2091
Course Title:
Fundamentals of Internet Programming
Degree Program
Information Technology
Module Name
Web Systems and Technologies
Module No.
09
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
81
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
2nd Year Information Technology Students
Year /Semester
Year: II, Semester: II
Pre-requisites
Fundamental of programming I
COURSE DESCRIPTION
Overview of Internet and World Wide Web Technology: Client-server architecture: Web server and security.
HTTP Protocol; Web page design and development; information architecture and visualization; static and
dynamic pages, client side programming using hypertext and scripting languages (HTML, JavaScript); serverside programming (PHP and Java); web-based database application development.Advanced Web applications
and Web service development. In general this course addresses issues like: What is the basic architecture of the
Internet? How does it really work? What is client-server architecture? What are the standards and protocols
used in the communication? How do we develop web applications? What are client side and server side
scripting paradigms? How to handle database communication, sessions and cookies? What are the available
technologies and frameworks?
OBJECTIVES OF THE COURSE
After completing this course the student shall be able to
To understand web protocols , Design and development of static and dynamic pages
To develop an understanding of the technology and protocols underlying World Wide Web.
To become familiar with the common tools and techniques for developing Web-based
applications, both client-side and server-side.
To develop a working knowledge of HTML, JavaScript, PHP, JSP and Servlets as languages for
developing Web applications.
To become familiar with web-based database application development.
Use CSS on web pages
82
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Note:-Lecture notes will be uploaded to this course group website http://groups.google.com/group/IntEng. To join
this group you need to have a Google mail account so that you can download, use mail group and forum. And also
all the laboratory sessions exercises will be posted on the above link.
SCHEDULE OF LECTURE TOPICS AND READINGS
Topic/chapter
Lab
Session
Reading/assignments
Week
Internet Technologies and Protocols
LAB1
- Ref 7, pages 23 176
http://en.wikipedia.org/wiki/World_Wide
_Web
1. Overview of the Internet
2. World Wide Web
3. Client-server architecture
http://net.tutsplus.com/tutorials/htmlcss-techniques/20-html-forms-bestpractices-for-beginners/
4. How the Web works?
5. Hypertext Transfer Protocol (HTTP
http://www.lib.berkeley.edu/TeachingLib/
Guides/Internet/Evaluate.html
1.0/HTTP 1.1/secure HTTP)
6. Other Web protocols (FTP, SMTP,
...)
http://net.tutsplus.com/articles/general/su
ggestions-for-creating-step-by-step-webdevelopment-tutorials-for-nettuts/
7. Web content validation
8. Website evaluation
- Ref 7, pages 223 376
(readability, layout, coloring, trust)
- Reading assignment1 on port numbers
and their description.
-evaluating one of or website as per the
lesson learned.
HTML
1. General concepts of Web design
2. Basics of HTML
3. HTML tags and their attributes
LAB2
- Ref 1, pages 89 245
http://www.htmlgoodies.com/primers/htm
l/article.php/3478131
http://csciwww.etsu.edu/tarnoff/ntes1710.
html
4. Text formatting with HTML and
background changing
83
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
5. HTML frames implementations,
pros and cons
6. Tables in HTML
7. Forms in HTML
3
Style Sheets
LAB3
o http://www.w3.org/TR/REChtml40/present/styles.html#h-14.4.1
1. Adding style to HTML
o http://www.w3.org/TR/CSS2/aural.h
2. types of CSS styles (Inline,
tml
Embedded, and External
Style Sheets)
Assignment 1
3. Cascading style sheets
4. Media-dependent cascades
(Aural, screen, and print style
sheets)
JavaScript
LAB4
- Ref 2, pages 29 -79
http://homepage.ntlworld.com/kayseycarv
ey/index.html
1. Introduction
2. Language Format
3. data types and primitives
4. Hello world in JavaScript
1. Java script code/commands
LAB5
-Ref 2, pages 81 128
LAB6
http://en.wikipedia.org/wiki/Document_O
bject_Model
2. Functions in JavaScript
3. Assigns function to event
4. Sessions and cookies using
JavaScript
6
Using JavaScript on HTML forms
1. Form methods and properties
2. the DOM model(Window,
Document, forms and elements )
Assignment 2 upgrade
assignment using java script
the
first
3. Events (onsubmit() ..)
4. Interacting with form elements
84
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Server-side programming Introduction to
server-side programming and server-side
programming languages
LAB 7
2012
- Ref 3, pages 10 55
- Reading assignment 2 advantages of
server siding scripting
-web servers, execution engines, and
their installation
Basics of PHP
PHP Pros and Cons
Setting up your environment
(Directory structure, Error handling and
Debugging)
8
9
10
11
Midterm Examination, from all topics HTML and JavaScript
Elements of PHP
PHP variables and arrays
Control flow
Patterns for processing HTML
forms
Understanding $_GET, $_POST,
$_SESSION and other PHP superarrays
Dynamically generating HTML
Functions and String Manipulation
built-in functions
User-defined functions
Arranging function in separate
'include' files: code libraries.
String manipulation
File uploading and downloading
More about debugging and error
handling
PHP and MySQL
LAB 9
- Ref 3, pages 57-78
- delivery of reading assignment from
the previous week
LAB 10
- Ref 3, pages 79 104
-Ref 3, pages 105 128
- Submit assignment 2
- Assignment 3
LAB 11
-Ref 3, pages 129 155
85
Undergraduate Information Technology Program National Harmonized Modular Curriculum
12
PHP's customized MySQL
functions
Creating the database schema
Connecting to the database
Inserting and Updating data
Sessions and Cookies in PHP
2012
-Ref 3, pages 241 263
-Ref 3, pages 265 283
LAB 12
o http://www.nerdparadise.com/te
What is a session?
Dependencies on the php.ini file
Understanding PHP session
variables
Create a PHP session variable
Register and modify PHP session
variables
o http://devzone.zend.com/article/
Putting PHP session IDs in pages
o http://php.about.com/od/advanc
Good Practice with sessions and
PHP
edphp/ss/php_sessions.htm
Cookie properties
Setting a cookie in PHP
ch/coding/php/beginners9/
o http://www.learnphptutorial.com/Sessions.cfm
o http://www.tizag.com/phpT/php
sessions.php
646
10 Retrieving PHP cookies
13
Content Management Systems (CMSs)
and their applications.
LAB 13
Currently available Commercial
and open source CMSs.
http://cms-softwarereview.toptenreviews.com/
http://blog.webdistortion.com/2
008/05/17/13-free-cms-optionsfor-web-design-professionals/
http://net.tutsplus.com/tutorials/
other/intro-to-drupal-build-asimple-cms/
Assignment 4
14
Introduction to Advanced Topics on Web
Engineering
No Lab
- To be covered by a Guest Lecturer
Assignment
presentatio
86
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Web services
Semantic Web
RSS and ATOM
Captcha
workflow Languages
2012
Lab Contents:
o Using internet
o Cascading style sheet
o Creating table, special
character, links, lists
o Using html tags, xml tags
o Designing webpage,
multimedia integrated with
flash and adobe
15
Students Assignment presentation
16
Final Exam
READING ASSIGNMENTS
1. Reading Assignment 1: We will be discussing some of the basic network communication port numbers.
You have to read about and summarize the other port numbers and present your work in class. You need
to submit a printed copy of your summary.
Due date: 3rd week
2. Reading Assignment 2: Read about the different types of server side scripting languages and analyze
their advantages and disadvantages. You have to submit a printed copy of your analysis.
Due date: 6th week
3. Assignment 3: CGI is one of the most common server side scripting paradigms. In this assignment you
need to write a detailed summary of CGI: what it is, how it works, and what languages are used in CGI. In
addition, discuss add-on and plug-ins. You are required to submit a printed copy and present your work in
class.
Due date: 9th week
87
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
8. Course/Group project: Due date: 15th week
SUMMARY OF COURSE ASSIGNMENTS, TEST AND EXAM:
Assignments 35%
Midterm examination ... 20%
Final examination ..45%
Project and Lab Exercise 100%
Reference:
1.
HTML, Black Book, by Holzner
2.
JavaScript Bible 6th edition by Danny Goodman and Michael Morrison
3.
PHP and MySQL Web development by Luke Welling and Laura Thomson
4.
JavaScript for the World Wide Web by Tom Negrino and Dori Smith
5.
PHP5 and MySQL Bible by Tim Converse and Joyce Park with Clark Morgan
6.
The Internet and Its Protocols : A Comparative Approach (The Morgan Kaufmann Series in
Networking) by Adrian Farrel
7.
Computer Networking with Internet Protocols and Technology by William Stallings
University Name
School/College/Faculty/Institute
Program
Information Technology
Course Code
ITec3092
Course Title:
Advanced Internet Programming
Degree Program
Information Technology
Module Name
Web Systems and Technologies
Module No.
09
Course Chair
88
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
(per week)
Lecture
Tutorial
Lab/Practical
Home Study
Total
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
3rd Year Information Technology Students
Year /Semester
Year: III, Semester: I
Pre-requisites
Status of the
Course
ITec3091
Compulsory
COURSE DESCRIPTION
This course is a continuation of Internet Programming. It deals with web application development
using an enterprise application framework focusing on server side scripting. Topics overed include an
introduction to basic syntax, the development environment, state management, eb controls, connecting
web page to database, Web Services, security and design web page for E-commerce.
OBJECTIVES OF THE COURSE
89
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
After completing this course the student shall be able to
Understand server side scripting
Develop web-based applications
Create Forms on Websites
Connect WebPages to databases
Design web page for e-commerce
TENTATIVE SCHEDULE OF LECTURE TOPICS AND READINGS
Topic/chapter
Lab
Session
Reading/assignments
Week
Unit 1: Server Side Scripting LAB 1
Basics
Ref 4, pages 2 8
1.1.
http://www.w3schools.com/web/web_scrip
ting.asp
1.2.
http://www.w3schools.com/php/php_synta
x.asp
Introduction to serverside scripting
Server-side scripting
languages
1.3.
http://www.ozzu.com/programmingforum/brief-comparison-server-sidescripting-langauges-t90248.html
Use Basic Syntax
1.4.
Send Data to the Web
Browser
Ref 1, pages 6-31
1.5. Write Comments
2
Ref 2, pages 11-13
LAB 2
1.6.
Utilize Variables
1.7.
Manipulate Strings
1.8.
Manipulate Numbers
1.9.
Work with constants
Ref 5, pages recipe 1.1-recipe 3.17
http://www.w3schools.com/php/php_varia
bles.asp
http://www.w3schools.com/php/php_string
.asp
90
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Unit 2: HTML Forms and Server
Side Scripting
LAB 3
2012
Assignment 1
Ref 2, pages 44-55
2.1. Use Conditionals and
Operators
Ref 5, pages recipe 9.1-recipe 9.18
2.2. Validate Form Data
Ref 1, pages 34-54
2.3. Send Values to a Script
Manually
http://www.w3schools.com/php/php_forms
.asp
2.4. Work with Forms and
arrays of data
http://www.w3schools.com/php/php_get.as
p
2.5. Use For and While Loops
http://www.w3schools.com/php/php_post.a
sp
2.7. Create a Simple Form
using PHP
LAB 4
Ref 1, pages 55-88
LAB 5
Ref 2, pages 105-128
2.8. Use Get or Post
2.9. Receive Data from a Form in
PHP
Ref 5, pages recipe 22.1-recipe 9.10
2.10. Introduction to regular
expressions
Unit 3: Files and Directories
LAB 6
Ref 5, pages recipe 23.1-recipe 23.22
3.1. Write to Files
3.2. Read from Files
Ref 5, pages recipe 24.1-recipe 23.13
3.3. Create Directories
3.4. Upload Files
3.5. Rename and Delete Files
and Directories
LAB 7
http://www.w3schools.com/php/php_file_u
pload.asp
http://www.w3schools.com/php/func_files
ystem_delete.asp
Mid Exam
91
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Unit 4: Connecting to Databases
LAB 8
4.1. Connect to an existing
Database
Ref 5, pages recipe 10.1-recipe 10.16
4.3. Retrieve Data from a
Database
4.4. Modify Existing Data
LAB 9
4.5. Remove Existing Data
Unit 5: Cookies and Sessions
5.1. Describe the stateless
model
LAB
10
LAB
11
5.5. Create and Read data
from Cookies
5.7. Maintain session data
using Cookies
5.8. Add Parameters to a
Cookie
http://www.tizag.com/phpT/phpsessions.ph
p
http://www.tizag.com/phpT/phpcookies.ph
p
5.6. Destroy a session
13
Ref 5, pages recipe 8.1-recipe 8.18
http://www.w3schools.com/php/php_cooki
es.asp
5.3. Create and Read data
from sessions
5.4. Putting PHP session
IDs in pages
Ref 2, pages 479-494
http://www.w3schools.com/php/php_sessio
ns.asp
5.2. Explain the concepts of
maintaining state
with sessions
12
http://www.w3schools.com/php/php_mysql
_intro.asp
Ref 5, pages recipe 10.1-recipe 10.16
4.6. Data base security
using server side
scripting
11
Assignment 2
http://www.w3schools.com/php/php_mysql
_intro.asp
4.2. Send Data to a
Database
10
2012
LAB
12
Ref 8, pages 375-387
Ref 8, pages 356-373
5.9. Delete a Cookie
92
Undergraduate Information Technology Program National Harmonized Modular Curriculum
14
Unit 6: Introduction to CMS
6.1.
Overview of
Content Management
Systems (CMS) Using
Joomla
LAB
13
2012
Ref 6, pages 17-305
Ref 7, pages 11-146
http://www.joomla.org/
6.2.
Installation of
Joomla
6.3.
The Joomla
elements
15
6.4.
Joomla! Back-end
6.5.
Joomla! Front end
6.6.
Joomla! Templates
LAB
14
Ref 6, pages 17-305
Ref 7, pages 11-146
http://www.joomla.org/
Lab Contents:
o Client side scripting
Cascading
style sheet
Java script
Dynamic
HTML
o Server side program
Configuring
web server
Get way
PHP
o Database driven website
PHP and MY
SQL server
Generate
dynamic
content
o Advanced internet
programming
Java applet
93
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Java server
page
16
Final Exam
Assignments Highlight
Assign Assignment Descriptions
No
Submission Points
Date
in %
Number of
allowed
members in
a Group
This assignment will be about putting
what you have learned about PHP into
practice.
5 students
In this assignment, you are required to
develop a real word online application.
Select any organization and try to
develop an application using the
standards of software engineering.
Therefore, you need to submit proposal,
requirement
analysis
and
design
documents. After the implementation of
the system, you must submit the
documentation. This is a group project
that requires active participation of all
group members. You are obliged to
present what you have done to the class.
5 students
94
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
READING ASSIGNMENTS
1. Reading Assignment 1: Read about the different types of server side scripting languages and
analyze their advantages and disadvantages. You have to submit a printed copy of your analysis.
Due date:3rd week
2. Assignment 2: CGI is one of the most common server side scripting paradigms. In this
assignment you need to write a detailed summary of CGI: what it is, how it works, and what
languages are used in CGI. You are required to submit a printed copy and present your work in
class.
Due date: 9th week
3. Course/Group project: Due date: 15th week
SUMMARY OF COURSE ASSIGNMENTS, TEST AND EXAM:
Assignments .35%
Midterm examination . 20%
Final examination ....45%
Attendance: you are obliged to attend at least 80% of the lecture and Lab class to sit for final
exam.
Final Examination: Time and Date Set by the Office of the Registrar
Reference
1. PHP AND MYSQL FOR DYNAMIC WEB SITES by Larry Ullman
2. PHP and MySQL Web development by Luke Welling and Laura Thomson
3. PHP5 and MySQL Bible by Tim Converse and Joyce Park with Clark Morgan
4. Web Server Programming by Neil Gray
5. PHP Cookbook, 2nd Edition By David Sklar, Adam Trachtenberg
6. Beginning joomla by Dan Rahmel
7. Joomla for Dummies by Steven Holzner and Nancy Conner
8. SAMs Teach yourself PHP in 24 hours
95
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Name
School/College/Faculty/Institute
Program
Information Technology
Course Code
ITec3093
Course Title:
E-Commerce
Degree Program
Information Technology
Module Name
Web Systems and Technologies
Module No.
09
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
3rd year Information Technology Students
Year /Semester
Year: III, Semester: II
Pre-requisites
Itec3062
Status of the
Course
Course
Description
Compulsory
E-commerce is one of the fast growing areas of computer and network
96
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
applications. Although E-commerce systems can be built using different
functional components, there is a set of concepts, principles, and
technologies that are important in developing reliable E-commerce
systems. The purpose of this course is to introduce and overview such
concepts, principles, and technologies. This course will cover several
topics, including architectures of e-commerce systems, Internet and the
Web infrastructure, e-commerce software components and programming
tools, scalability, security, and payment systems.
Course Objective
Course Content
To study the fundamental concepts and basic technologies needed in the
development of an electronic commerce system. This course will help to
understand the possibilities and limitations of electronic commerce
systems.
Overview of e-commerce
e-commerce and describe how it differs from e-business
the unique features of e-commerce technology and discuss their
business significance
Overview of e-commerce
Traditional vs Electronic commerce
the major types of e-commerce
Successes in E-commerce
the major academic disciplines contributing to e-commerce
research
The E-commerce Business Models
The key components of e-commerce business models.
The major B2C business models.
Major B2B business models.
Business models in other emerging areas of e-commerce.
major e-commerce enablers
how e-commerce affects key business concepts and strategies
97
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
E-commerce software building blocks
key e-commerce technology concepts behind the Internet
E-commerce and Business strategies
E-commerce and client server computing
current structure of the Internet
Web based E-commerce architecture
Ecommerce Security and Cryptography
e-commerce crime and security problems
The key dimensions of e-commerce security
The tension between security and other values
key security threats in the e-commerce environment
Ecommerce Security and Cryptography(2)
various forms of encryption technology help protect the security
of messages sent over the Internet
tools to establish secure Internet communications channels
tools used to protect networks, servers, and clients
Appreciate the importance of policies, procedures, and laws in
creating security
Electronic Commerce: Legal, Ethical,and Tax Issues
The Legal Environment of Electronic Commerce
Use and Protection of Intellectual Property in Online Business
Electronic Commerce: Legal, Ethical,and Tax Issues(2)
Online Crime, Terrorism, and Warfare
Ethical Issues
98
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Assignment presentation
Frauds, Scams and Financial Euphoria
Straightforward dishonesty
System weaknesses
Unreal Maths
Inside trading and market manipulation
Institutional fraud
Countermeasures
Online Auctions, Virtual Communities, and Web Portals
Auction Overview
Online Auctions and Related Businesses
Virtual Communities and Web Portals
Electronic Commerce Software
Web Hosting Alternatives
Basic Functions of Electronic Commerce Software
Electronic Commerce Software for Small and Midsize Companies
Electronic Commerce Software for Midsize to Large Businesses
Web Site Development Tools
Assessment Methods
Midterm examination ... 40%
Final examination ..60%
Project+ Assignment + Lab Exercises.100%
Reference
Electronic Commerce, Gary P. Schneider and James T. Perry, Course Technology, 2007, 7th
Edition.
99
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
University Logo
University Name
Information Technology Program
Module Code
Module Name
Total ECTS of the
module
Objective of the
module
Course Code
Itec3101
Itec3102
Itec3103
Itec3104
Itec3105
Itec_M 10
Computer networks
25
At the end of this module, the student should be able to :-
Understand data transmission and transmission media,
protocol, and the concept of layering.
Recognize the importance of networking standards, and their
regulatory committees.
Describe the seven layers of the OSI model.
Compare and contrast the OSI model with the TCP/IP model.
Analyze how the foundations manifest themselves in
different ways depending on real-world constraints.
Understand the implications of new technologies.
Compare and contrast the advantage of wireless networking
with fixed media.
Understand the worldwide communications by wireless
communication
Construct wireless LANS Work with cellular devices
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
4
7
Data Communication and
Computer Networks
Advanced Networking
Introduction to Distributed
Systems
Telecom Technologies
Wireless Networking and Mobile
Computing
3
3
5
5
2
3
3
5
100
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Program
University Logo
University Name
Information Technology Program
Information Technology
Course Code
Itec3101
Course Title:
Data Communication and Computer Networks
Degree Program
Information Technology
Module Name
Computer Networks
Module No.
10
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
7
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
14
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: III, Semester: I
Pre-requisites
Itec3101
Status of the
Course
Course Outline
Compulsory
TBA
3rd Year Information Technology Students
Chapter 1: History and overview
1.1 Indicate some reasons for studying networks
101
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
1.2 Highlight some people that influenced or contributed to the area of
networks
1.3 Indicate some important topic areas such as network architectures and
protocols, network types (LAN, WAN, MAN, and wireless), data
security, data integrity, and network performance
1.4 Describe some of the hardware and software components of networks
1.5 Describe the operation of some network devices such as repeaters,
bridges, switches, routers, and gateways
1.6 Indicate some network topologies such as mesh, star, tree, bus, and
ring
1.7 Describe the purpose of network protocols
1.8 Mention some popular protocols
Chapter 2: Data Communications
2.1 Data transmission
2.2 Concepts and Terminology
2.3 Analog and Digital Data Transmission
2.4 Transmission Impairments
2.5 Transmission media
2.6 Guided Transmission Media
2.7 Wireless Transmission
Chapter 3: Communications network architecture
3.1.
Network line configuration (point-to-point, multipoint)
3.2.
Networking and internetworking devices: Repeaters,
bridges, switches, routers, gateways
3.3.
Network Topologies (mesh, star, tree, bus, ring)
3.4.
Connection-oriented and connectionless services
Chapter 4: Communications network protocols
4.1 Network protocol
4.2 Overview of the TCP/IP Protocol suites
4.3 Network Standards and standardization bodies
Chapter 5: Local and wide area networks
5.1. LAN topologies (bus, ring, star)
5.2. LAN technologies (Ethernet, token Ring, Gigabit Ethernet)
5.3 Large networks and wide areas
Chapter 6: Client-server computing
6.1. Web technologies: Server-side programs; Socket programs;
Server sockets; Client sockets; multithreading concepts;
Chapter 7: Data security and integrity
7.1 Fundamentals of secure networks; cryptography
7.2 Encryption and privacy
7.3 Authentication protocols
7.4 Firewalls
7.5 Virtual private networks
102
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
7.6 Transport layer security
8. Lab Description
Cabling and crimping, Peer to Peer Networking, Sharing Files, Sharing
Printers, Client Server Networking, Steps for Creating a home or small
office Network, Student Exercise, Installation, Server Roles, Setting up a
DNS Server, Configuring TCP/IP
Text and Reference: Computer Networking. Kurose and Ross. Addison
Wesley, latest edition
Software Requirements: Network Operating systems, Simulators, etc
Prerequisite
Status
Methodology
Assessments
Attendance
requirements
Itec 1011
Compulsory
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
Program
University Logo
University Name
Information Technology Program
Information Technology
Course Code
Itec3102
Course Title:
Advanced Networking
Degree Program
Information Technology
Module Name
Computer Networks
Module No.
10
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
103
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: III, Semester: II
Status of the
Course
Course
Description
Compulsory
Course Objective
The objectives of this course are to enable students to:
Understand the different uses of computer networks
Identify the network software and hardware components
Understand the network reference models
Differentiate between guided and unguided transmission media
Identify the different mechanisms used to detect and correct errors at
the data link layer
Understand and mention the different mechanisms of flow control at
the data link layer
Understand the Channel Allocation Problem
Understand Multiple Access Protocols
Compare and contrast Ethernet, Wireless LANs, Broadband
Wireless, and Bluetooth
Understand Data Link Layer Switching
Understand Network Layer Design Issues
Understand and identify different Routing Algorithms, Congestion
Control Algorithms
Understand Quality of Service, Internetworking
Compare and contrast TCP and UDP
Course Outline
TBA
3rd year Information Technology Students
Overview of computer networks, seven-layer architecture, TCP/IP suite of
protocols, etc. network hardware, network software, examples,
standardization, guided transmission media, wireless transmission, data
link layer design issues, error detection and correction, elementary data
link protocols, sliding window protocols, the channel Allocation problem,
multiple access protocols, Ethernet, wireless LANs, broadband LANs, blue
tooth, data link layer switching, the network layer design issues, Routing
Algorithms, QoS, Congestion control algorithms
1. Basics of computer Network
a. Introduction
104
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
b.
c.
d.
e.
Prerequisite
Status
Methodology
Assessments
Hardware and software
Topology
Types of networks
Transmission media
Wired and Wireless
f. OSI and TCP/IP protocol suite
2. Application layer
a. DNS Domain Name System
b. Electronic Mail
c. WWW- the World Wide Web
d. File Transfer Protocol
e. Host Configuration Protocol (DHCP)
f. Multimedia
3. Transport layer
a. The Transport Service
b. Elements of Transport Protocols
c. A Simple Transport Protocol
d. The Internet Transport Protocols: UDP
e. The Internet Transport Protocols: TCP
f. Congestion and flow-control
g. Performance and Reliability
4. Internet Layer
a. Introduction
b. Network Layer Design Issues
c. Routing Algorithms
d. Congestion Control Algorithms
e. Quality of Service
f. Internetworking
5. Network Access Layer
a. Ethernet
b. Address Resolution Protocol (ARP)
c. Frame Relay
d. Asynchronous Transfer Mode
e. Peer-to-Peer Networks
f. High-Speed LANs
6. Physical Layer
a. The Theoretical Basis for Data Communication
b. Guided Transmission Media
c. Wireless Transmission
d. Communication Satellites
e. Switching
Itec3101
Compulsory
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
105
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Attendance
requirements
2012
85% for lecture and 100% for lab
Textbook:
1. Computer Networking: A top down approach, 4th/5th edition,
James F. Kurose and Keith W. Ross
References:
2. Computer Networks: A systems approach, 4th ed, Larry L.
Peterson and Bruce S. Davie
3. Computer Networks: principles, technologies and protocols for
network design, Natalia Olifer, Victor Olifer.
4. Computer Networks, 4th Edition, Andrew S. Tanenbaum
5. W. R. Stevens. TCP/IP Illustrated, Volume 3: The protocols, Addison
Wesley
6. R. Handel, M. N. Huber, and S. Schroeder. ATM Networks: Concepts,
Protocols, Applications, Addison Wesley, 1998. Networks: Concepts,
Protocols, Applications, Addison Wesley, 1998.
7. W. Stallings. Cryptography and Network Security: Principles and
Practice, 2nd Edition, Prentice Hall
106
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec3103
Course Title:
Introduction to Distributed System
Degree Program
Information Technology
Module Name
Computer Networks
Module No.
10
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: III, Semester: II
Pre-requisites
Itec3101
Status of the
Course
Course
description
Compulsory
TBA
3rd Year Information Technology Students
This course covers the foundations of distributed systems including models
of computing, logical clocks and synchronization, consensus, distributed
indexing, concurrency, consistency, failures, reliability and security. We
will examine popular applications of distributed computing; analyze how
the foundations manifest themselves in different ways depending on real107
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
world constraints. Such applications include distributed file systems, peerto-peer systems, distributed transactions, and web services.
Course objective
At the end of the course the students should be able to:
understand the importance of distributed computing
Differentiate the uni-scalar machines with that of high-end parallel
systems
Course Outline
Introduction to Distributed Systems:
Issues and Architectures; Characterization of Distributed
Systems; Networking, internetworking and interposes
communication.
Naming and Threads: Naming and name services; Remote
Invocation, Processes and threads;
Models of Distributed Computing: Performance, Replication,
Virtualization, Scalability; Synchronous network model and
leader election; Asynchronous shared memory model, fairness, and
mutual exclusion ; Data-Centric Consistency Models; Multicore
architectures and benchmarks;
Methodology
Assessments
Attendance
requirements
Client-Centric Consistency Models
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
Textbook:
1. TBA
References:
2.TBA
108
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec3104
Course Title:
Telecom Technologies
Degree Program
Information Technology
Module Name
Computer Networks
Module No.
10
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
3
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: III, Semester: II
Pre-requisites
Itec3101
Status of the
Course
Course
Description
Compulsory
TBA
3th year Information Technology Students
This course is designed to introduce students to different
telecommunications technologies. It emphasizes on the techniques,
equipments and protocols involved in today's digital telecommunications
field. The course briefly describes both the theoretical and applicative
109
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Objective
Course Outline
Methodology
Assessments
Attendance
requirements
2012
aspects regarding the transmission of information, the analog, digital and
system standards of telecommunications. The Public Switched Telephone
Network (PSTN) and Public Land Mobile Network (PLMN) are described
briefly. The topics covered are Telecommunications, data transmission,
analog channels, digital channels, fixed and mobile switching, signaling
protocols, GSM, and GPRS.
After completing this course students will be able to:
Describe the basic telecom principles
Describe analog and digital channels
Understand physical communication media
Define different mobile communication standards
Identify different telecommunication
Introduction: General Considerations; General Model of a
Telecommunication Channel; Analog Telecommunication Channels;
Digital Telecommunication Channels; Open Systems Interconnection
(OSI) Model; Physical Media of Communication
Mobile Digital Telecommunications: Introduction; GSM Standard;
GPRS Standard; Advanced Mobile Telecommunication Standards:
EDGE, UMTS
Fixed Digital Telecommunications: Public Switched Telephone
Network (PSTN); Alcatel 1000 E 10 Commutation Center; Integrated
Services Digital Network (ISDN); Intelligent Telecommunication
Networks
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
TBA
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec3105
Course Title:
Wireless Networking
Degree Program
Information Technology
Module Name
Computer Networks
110
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Module No.
10
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
3th Year Information Technology Students
Year /Semester
Year: III, Semester: II
Pre-requisites
Itec 3101
Status of the
Course
Course
Description
Compulsory
Under this course, students will cover issues related to wireless
Communications, Principles of wireless communications, Modes of
wireless communication, Sea and Air Transceivers, Handheld Radio
Transceivers, Shortwave Transceivers, Cellular Radio Telephones
,Satellite Communications
Radio Modems
Wireless Communications and Transceiversan Overview
Non-Complex Signal Processing in a Low-IF Receiver
A Reconfigurable Baseband Chain for 3G Wireless Receivers
Field-Programmable and Reconfigurable Analogue and Mixed-Signal
Arrays
A Low-Power,Low-Voltage Bluetooth Channel Filter Using Class AB
CMOS Tran conductors
Design and Automatic Tuning of Integrated Continuous-Time Filters
Low-Voltage Integrated RF CMOS Modules and Frontend for 5 GHz and
Beyond
111
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Objective
Course Outline
2012
Design of Integrated CMOS Power Amplifiers for Wireless Transceivers
Parasitic-Aware RF IC Design and Optimisation
Testing of RF, Analogue and Mixed-Signal Circuits for
Communicationsan Embedded
Students will be able to
Compare and contrast the advantage of wireless networking with fixed
media.
Understand the world wide communications by wireless
communication
secure equipment and premises remotely
Contract wireless LANS
Work with cellular devices
Chapter One
1. WIRELESS COMMUNICATIONS FOR VOICE AND DATA
1.1.1. wireless techniques
1.1.2. a strategy for worldwide voice communications
1.1.3. cellular voice
1.1.4. wireless radio
1.1.5. wireless pbx systems
1.1.6. satellite voice services
1.2. wireless considerations for a data communications strategy
1.2.1. cdpd as a wireless option
1.2.2. specialized mobile radio
1.2.3. commercial mobile data communications services
1.2.4. satellite data wireless lans
1.3. wireless communication as an alternative to fixed media
1.3.1. the wireless cost advantage
1.3.2. vendor support for wireless solutions
1.3.3. outlook for wireless applications
1.3.4. mobile communications systems
1.4. safe mobile computing
1.4.1. introduction
1.5. determining if an organization is at risk
1.5.1. power protection
1.5.2. computer viruses
1.5.3. security programs
1.5.4. general backups
1.5.5. external drives
1.5.6. data recovery centers
1.5.7. backing up pdas
1.5.8. data transfers
1.6. physical security: locks and cases
1.6.1. cellular phone safety
1.6.2. securing equipment and premises remotely
1.6.3. practices for safe computing
1.6.4. cataloging equipment: the specifics
112
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
1.6.5. hardware and software setups
1.6.6. security setups
1.6.7. the orientation session
2. DEVELOPING A COST-EFFECTIVE STRATEGY FOR
WIRELESS COMMUNICATIONS
2.1.1. wireless network technologies and service providers
2.1.2. circuit- switched networks
2.1.3. packet data networks
2.2. choosing an architecture and access method
2.2.1. continuous-connection architectures
2.2.2. e-mail based systems
2.2.3. agent-based messaging systems
2.2.4. hosing wireless applications
2.2.5. wireless e-mail and fax systems
2.2.6. remote access and file synchronization utilities
2.2.7. single-transaction based applications
2.2.8. mobile enterprise applications
2.2.9. choosing wireless products
2.2.10. systems for communications management
3. SECURITY OF WIRELESS LOCAL AREA NETWORKS
3.1.1. introduction
3.1.2. an overview of costs and benefits
3.1.3. interoperability
3.1.4. performance
3.1.5. configuration
3.1.6. industry applications
3.1.7. security concerns
3.1.8. physical configuration
3.1.9. types of transmission
3.1.10. service availability
3.1.11. signal availability
3.1.12. circuit availability
3.1.13. equipment availability
3.1.14. wireless network controls
3.1.15. protective security mechanisms
3.1.16. protection of mobile computing assets
3.1.17. keeping pace with change
3.1.18. determining the value of information
3.1.19. computer security principles
3.1.20. protecting the mobile office
3.1.21. computer theft
3.1.22. theft of information
3.1.23. malicious code
3.1.24. eavesdropping
3.1.25. setting security policy
4. AN EMERGING MOBILE (CELLULAR) NETWORK SERVICE
4.1. introduction
113
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
4.2.
4.3.
4.4.
4.5.
4.6.
4.7.
4.8.
4.9.
cdpd fundamentals
underlying technologies
applications for cdpd
emerging class of remote users
service pricing
benefits to mobile users
equipment requirements
network architecture and protocols
4.9.1. mobile data-intermediate systems
4.9.2. mobile database systems
4.9.3. mobile-end systems
4.9.4. mobility management
4.9.5. mobile network registration protocol
4.9.6. mobile network location protocol
4.9.7. information protection
4.9.8. cdpd network backbone
4.9.9. mobile-end systems protocols
4.9.10. transparent operation
4.9.11. sending data from a mobile unit
4.9.12. registration procedure
4.9.13. sending data to a mobile unit
4.9.14. Is there a mass market for cdpd?
5. MOBILE USER SECURITY
5.1. availability
5.2. scheduling considerations
5.3. physical considerations
5.4. notebook connectivity
5.5. telephone communications tools
5.6. continuity
5.7. creating mobile backup
5.8. loss of computing resources
5.9. integrity
5.10. software considerations
5.11. confidentiality
5.12. mobile employee information security recommendations
5.13. software considerations
new technology considerations
Methodology
Assessments
Attendance
requirements
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
TBA
114
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
University Logo
University Name
Information Technology Program
Module Code
Module Name
Total ECTS of the
module
Objective of the
module
Itec_M 11
Network design, configuration and administration
15
At the end of this module students should be able to: Install and configure network operating system
Identify basic client server architecture
Configure web service, FTP service, active directory
Perform user and group administration tasks
Administer and secure servers
Design computer network for enterprise
Deploy small to medium size networks
Develop practical skill for network design in heterogynous
Discover Foundry network devices
Course Code
Itec4111
Itec4112
Itec4113
Advanced knowledge on network device configuration
Create and configure VLANs
Monitor changes to Foundry network devices
Store and retrieve network events
Configure router
Configure and manage switch
Implement and configure network protocols
Mangling network
Courses in the Module
Course Name
System and Network
Administration
Network Design
Network Device and
Configuration
Credit
ECTS (CP)
Hours
(existing)
3
3
5
5
115
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec4111
Course Title:
System and Network Administration
Degree Program
Information Technology
Module Name
Computer Networks
Module No.
11
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: IV, Semester: II
Pre-requisites
Itec3101
Status of the
Course
Compulsory
TBA
4th Year Information Technology Students
Course outline
Unit One
1. Introduction & Background
116
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
1.1. Computer Systems & Network overview
1.2. Philosophy of System Administration
Unit Two
2. Windows Network Concepts
2.1. Workgroups
2.2. Server Domain
2.3. Domain Controllers
2.4. LDAP & Windows Active Directory
Unit Three
3. User Administration Concepts & Mechanisms
3.1.1. Users and capabilities
3.1.2. Policy Tools & Roaming Profiles
3.1.3. Advanced Concepts I
3.1.3.1.
The Registry
3.1.4. Automating Administrative Tasks - Windows Host
Scripting
3.2. Advanced Concepts II
3.2.1. Routing and NAT
3.2.2. Proxies and Gateways
Unit Four
4. Resource Monitoring & Management I
4.1.1. Stand-alone systems (Memory, Disk Use, CPU Use)
4.1.2. Monitoring Tools
4.1.3. Routine Resource Maintenance
4.2. Resource Monitoring & Management II
4.2.1. Bandwidth
4.2.2. File & Mail Servers
4.2.3. Network Printers
4.3. Remote Administration
4.4. Performance
4.4.1. RAID
4.4.2. SCSI
Unit Five
5. Security
5.1. Introduction
5.2. Linux Systems and Network Concepts
5.3. Linux Resource Monitoring & Management
5.3.1. Monitoring Tools
5.3.2. Network Bandwidth and Processing Power
5.3.3. Managing Storage
5.4. Linux User Administration
5.5. Linux Service/Server Administration
5.5.1. Supporting a Windows Network - through SAMBA
117
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
5.5.2. Mail Server
Methodology
Assessments
Attendance
requirements
Methodology
Assessments
Attendance
requirements
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
TBA
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
Text and References
Computer Networks, 3rd edition, by Andrew Tanenbaum, Prentice Hall.
An Engineering Approach to Computer Networks, S. Keshav.
High Performance Communication Networks, Jean Walrand, Pravin .
Internetworking Multimedia, Jon Crowcroft, Mark Handley and Ian
Wakeman.
Software
Windows server 2011 operating System, Solaris
Operating System, Cisco IOS simulator,
118
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec4112
Course Title:
Network design
Degree Program
Information Technology
Module Name
Network design, configuration and administration
Module No.
11
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
TBA
Year /Semester
Year: IV, Semester: I
Pre-requisites
Itec3101
Status of the
Course
Compulsory
TBA
4th Year Information Technology Students
Course outline
1. Applying a Methodology to Network Design
119
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
2. Structuring and Modularizing the Network
3. Designing Basic Campus and Data Center Networks
4. Designing Remote Connectivity
5. Designing IP Addressing and selecting Routing Protocols
6. Evaluating Security Solutions for the Network
7. Identifying Voice Networking Considerations
8. Identifying Wireless Networking Considerations
Lab contents:
Design basic campus network
Design remote network connectivity
Design IP addressing network
Design wireless network
Reference
Network design reference manual (NDRM)- 6th edition
Top down network design(2nd edition) Cisco press
120
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
121
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec4113
Course Title:
Network device configuration
Degree Program
Information Technology
Network design, configuration and administration
Module Name
Module No.
11
Course Chair
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
TBA
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
4th Year Information Technology Students
Year /Semester
Year: IV, Semester: II
Pre-requisites
Itec 3101
Status of the
Course
Course Objective
Compulsory
After completion of this course student will be able to:
Discover Foundry network devices
Advanced knowledge on network device configuration
Create and configure VLANs
122
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Monitor changes to Foundry network devices
Store and retrieve network events
Configure router
Configure and manage switch
Implement and configure network protocols
Mangling network
Course outline
1. Device Configuration
Configuration Wizard.
View VLANs by device and port.
Automatic Discovery and Configuration Manager.
Wireless Mobility configuration menu
Device Schedules
VPN Policy Manager
Element Manager.
CLI Configuration Manager.
2. Router and Switch
Basic configuration
Passwords
Wildcard masks
Access Control Lists
Remote access
Logging with syslog usage
Miscellaneous
3. Routers
Router basic configuration
Static routing
Dynamic routing
Routing protocols matrix
RIP
IGRP
EIGRP
OSPF
DHCP
NAT and PAT
PPP
Frame Relay
Router on the stick
4. Switches
Switch basic configuration
CAM table
Port security
123
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
VLANs
STP
VTP
Inter VLAN communication
Miscellaneous
Labs
RS0 - Router and Switch basic configuration
S01 - Switch basic configuration
S02 - Switch VLAN configuration
R01 - Static routing
R02 - RIP v.1
R03 - RIP v.2
R11 - PAT and DHCP
R12 - PAT, DHCP and DHCP Relay
R13 - NAT/PAT and DHCP
R14 - PPP
R15 - ACL
R16 - Frame Relay
RS01 - DHCP and VLANs
Mix 01
Methodology
Assessments
Attendance
requirements
Methodology
Assessments
Attendance
requirements
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
Rufi, Oppenheimer, Woodward and Brady, Network Fundamentals,
CCNA Exploration Labs and Study Guide, CISCO Press, 2008.
Dye, McDonald and Riufi, Network Fundamentals, CCNA Exploration
Companion Guide, CISCO Press, 2007.
Top-Down Network Design (2nd Edition) By Priscilla Oppenheimer.
Published by Cisco Press. Published: May 27, 2004.
Christina J. Hogan. The Practice of System and Network Administration,
Addison-Wesley Professional, 2001.
124
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module
Objective of the
module
Course Code
ITec4121
ITec_|M 12
Integrative Programming and technologies
5
The objectives of the module are:
Describe and contrast the different types of architectures for
integrating systems.
Define the role of DCOM, CORBA, and RMI in distributed
processing.
Describe how web services are used to integrate disparate
applications in an organization.
Create valid WSDL, SOAP and UDDI XML documents to define a
web service. Write, debug, and test a web service. Deploy the web
service to middleware and invoke the web service from an application
across the network.
Design, develop and test a socket program that communicates
between two different services using both TCP/IP sockets and
Datagram sockets.
Describe the role of the WSDL, SOAP, and UDDI architectures in
creating and using web services.
Describe the role of socket programming in communicating between
systems.
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Integrative Programming and
5
Technologies
3
University Name
School of Computing and Electrical Engineering
Program
Information Technology
Course Code
ITec4121
Course Title:
Integrative Programming and Technologies
125
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Degree Program
Information Technology
Module Name
Integrative Programming and Technology
Module No.
ITec_M 12
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
4th year Information Technology Students
Year /Semester
Year: IV, Semester: I
Pre-requisites
Status of the
Course
Course
Description
Compulsory
Course Objective
At the end of this course students will be able to
Describe and contrast the different types of architectures for integrating
systems.
Define the role of DCOM, CORBA, and RMI in distributed
processing.
This course looks at systems integration with focus on communication
mechanisms and data standardization. Students learn how to choose their
communication approach by considering platform, data structure
similarity/dissimilarity as well as client requirements. They will learn how
to represent structure and how to transport data using XML and XML
related technologies and protocols. Standardization of XML documents for
the purpose of data exchange is stressed.
126
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Describe how web services are used to integrate disparate applications
in an organization.
Create valid WSDL, SOAP and UDDI XML documents to define a
web service. Write, debug, and test a web service. Deploy the web
service to middleware and invoke the web service from an application
across the network.
Design, develop and test a socket program that communicates between
two different services using both TCP/IP sockets and Datagram
sockets.
Describe the role of the WSDL, SOAP, and UDDI architectures in
creating and using web services.
Describe the role of socket programming in communicating between
systems.
Course Outline
Assessment
(Continuous)
References:
Module Code
Module Name
Total ECTS of the
module
Objective of the
module
Intersystem Communications: Architectures for integrating systems;
DCOM, CORBA, and RMI; Web Services and Middleware; Network
programming; Message and queuing services; Low level data
communications
Data Mapping and Exchange: Metadata; Data representation and
encoding; XML, DTD, XML schemas; Parsing XML documents; XSL,
XSLT and XPath
Integrative Coding: Design Patterns; Interfaces; Inheritance
Miscellaneous Issues: Adopt and Adapt vs. make; Versioning and
version control
Lecture 100%
Lab
100%
University Logo
University Name
Information Technology Program
Itec_M 13
Multimedia and Human Computer Interaction
8
The objectives of the module are:
Enable students understand fundamental concepts of
multimedia
Enable students know applicable areas of multimedia
127
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
systems
Enable students understand design and code multimedia
systems
Students enable to understand different human computer
interaction systems
Courses in the Module
Course Name
Course Code
Multimedia Systems
Human Computer Interaction
Itec3131
Itec3132
Credit
ECTS (CP)
Hours
(existing)
3
5
2
3
Program
University Logo
University Name
Information Technology Program
Information Technology
Course Code
Itec3131
Course Title:
Multimedia Systems
Degree Program
Information Technology
Module Name
Multimedia and human computer interaction
Module No.
13
Course Chair
Office location:
Mobile:
; e-mail:
128
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
3rd year Information Technology Students
Year /Semester
Year: III, Semester: I
Pre-requisites
Itec2051
Status of the
Course
Course
Description
Compulsory
Course Objective
Course Outline
Multimedia technologies; multimedia storage models and structures; data
models and interfaces; multimedia information systems; video/audio
networking; media synchronization; image computing and information
assimilation; conferencing paradigms and structured interaction support.
At the end of the course, students should:
Understand the basic concepts of multimedia
Understand where and how to use multimedia systems
Design different kinds of multimedia systems
Write different kinds of code that are used in Multimedia
Applications/perform multimedia functions
Chapter One
Introduction
1.1 What is Multimedia?
1.2 History of Multimedia
1.3 Multimedia and Hypermedia
1.4 Multimedia and World Wide Web
Chapter Two
Multimedia Authoring and Tools
2.1 What is Multimedia Authoring?
2.2 Some Useful Editing and Authoring Tools
2.3 Authoring Paradigms
Chapter Three
Data Representations
129
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
3.1 Graphics/Image Data Representation
3.2 Digital audio and MIDI
3.3 Popular File Formats
Chapter Four
Image and Video
4.1 Color Science
4.2 Colour Models in Images 4.3 Colour Models in Video
Chapter Five
Fundamental Concepts in Video 5.1 Types
of Video Signals
5.2 Analogue Video
5.3 Digital Video
5.4 Different TV standards
Chapter Six
Basics of Digital Audio
6.1 Digitization of Sound
6.2 Quantization and Transmission of Audio
Chapter Seven
Lossless Compression Algorithms
7.1 Introduction
7.2 Basics of Information Theory
7.3 Run-Length Coding
7.4 Variable-Length Coding (VLC)
7.5 Dictionary Based Coding
7.6 Huffman Coding
7.7 Arithmetic Coding
7.8 Lossless Image Compression
Chapter Eight
Loss Compression Algorithms
8.1 Introduction
8.2 Distortion Measures
8.3 The Rate Distortion Theory
8.4 Quantization
8.5 Transform Coding
Chapter Nine
Image Compression Standards
the JPEG Standard
Chapter Ten
Basic Video Compression Techniques
1 Introduction to Video Compression
2 Video Compression Based on Motion Compensation
Chapter Eleven
MPEG Video and Audio Coding
1. Video Compression
130
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
2 MPEG Audio Compressions
Lab content
Macromedia Author ware Basics:
The Author ware window; toolbars; shortcut; authoring; piece;
icon; linking; image; video; sound;
Analyzing a completed Piece:
Navigating through completed piece sound, picture and
video; adding sound and picture in a completed piece
Creating a new project File using Knowledge objects:
steps to create a new project file using knowledge objects
Adding a knowledge objects to a file:
Exercise steps of adding knowledge objects to a file
Setting up icon properties, presentation windows
Saving, opening and Running a piece
Creating a title page
Create text using the toolbox
Adding Graphic Background and different buttons
Adding Sounds and Movie
Grouping Icons in to a map Icon
Creating Menu with hotspots
Inserting Map icons
Creating A master Framework
Editing an External RTF File
Creating A quiz using Knowledge objects
Using Quiz Knowledge Object
Video and Audio Editing; Using multimedia applications;
scripting
Assessment
References:
Programming Assignments=15% ,Project work= 20 % ; Lab Exam =25%
; written Final examination= 40%
1) Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, Prentice
Hall, 2004.
2) Richard Brice, Multimedia and Virtual Reality Engineering, Newnes,
1997
3) Jon Crowcroft, Mark Handley, Ian Wakeman; Internetworking
Multimedia,
Morgan Kaufmann Publishers, San Francisco, California, 1999
131
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
4) Doug Sahlin, Flash 5 Virtual Classroom, McGraw-Hill, 2001, California
Program
University Logo
University Name
Information Technology Program
Information Technology
Course Code
Itec3132
Course Title:
Human-Computer Interaction
Degree Program
Information Technology
Module Name
Advanced Information Technology Issues
Module No.
13
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
10
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
3rd year Information Technology Students
Year /Semester
Year: III, Semester: II
Pre-requisites
Itec3053
Status of the
Compulsory
132
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course
Course
Description
Course Objective
2012
A key component to the discipline of Information Technology is the
understanding and the advocacy of the user in the development of IT
applications and systems. IT graduates must develop a mind-set that
recognizes the importance of users and organizational contexts. They must
employ user-centered methodologies in the development, evaluation, and
deployment of IT applications and systems. This requires graduates to
develop knowledge of HCI, including but not limited to such areas as user
and task analysis, human factors, ergonomics, accessibility standards, and
cognitive psychology.
At the end of the course students will be able to:
o Describe the relationship between the cognitive principles and their
application to interfaces and products.
o Explain the conceptual terms for analyzing human interaction with
products such as affordance, conceptual model, and feedback.
o Analyze different user populations with regard to their abilities and
characteristics for using both software and hardware products.
o Describe the connection between the development of a user
interface and the users knowledge of an application domain.
o List several of the emerging alternative I/O devices for computers
Chapter One: Introduction
o Definition
o Historical background
Chapter Two: Human in HCI
o Information input/output
o Memory
Course Outline
o Reasoning, problem solving, skill and error
o Emotion
o Individual difference
Chapter Three: Computer in HCI
o Input device
o Output device
o Virtual reality
133
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
o Physical interaction
o Paper
o Memory
o Processing
Chapter Four: Interaction
o Introduction
o Models of interaction
o Ergonomics
o Interaction styles
o The context of the interactions
o Paradigms
o Introduction
o Paradigms for interaction.
Mid Exam
Chapter Five: Interaction Design and HCI in the Software Process
o Interaction Design
o Introduction
o What is design?
o User focus
o Scenarios
o Navigation design
o Screen design and layout
o Interaction and prototyping
o HCI in the Software Process
o Introduction
o The software lifecycle
o Usability engineering
o Interactive design and prototyping
o Design rationale
134
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Chapter Six: Design Rules and Implementation support
o Design Rules
o Introduction
o Principles to support usability
o Standards
o Guidelines
o Golden rules and heuristics
o HCI patterns
o Implementation Support
o Introduction
o Elements of windowing systems
o Programming the application
o User interface management systems
Chapter Seven: Evaluation Techniques and Universal Design
o Evaluation Techniques
o What is evaluation?
o Goals of evaluation
o Choosing an evaluation method
o Universal Design
o Introduction
o Universal design principles
o Multi-modal interaction
o Designing for diversity
Chapter Eight: User Support
o Introduction
o Requirements of user support
o Approaches to user support
o Adaptive help systems
o Designing user support systems
135
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Methodology
For this course three lecture hours are scheduled per week. Students are expected to read topics
in advance. Participation in class discussion is anticipated from the students.
Assignment
Assignment is given in group. Each member of the group should participate in doing the
assignment. Direct copy has no value. Analyzing, digesting the topic under consideration and
forwarding your own view points are expected from students.
Assessment methods:
Assignment
15%
Mid Exam
35%
Quiz
5%
Final Exam
45%
Text Book:
1. Dix, A., Finlay, J., Abowd, G. and Beale, R. (1997). Human-computer interaction.
Other Reference Books:
1. Baecker, R. M. and Buxton, W. A. S. (1987). Readings in Human-Computer Interaction:
A Multidisciplinary Approach.
2. Baecker, R., Grudin, J., Buxton, W., and Greenberg, S. (1995). Readings in Human
Computer Interaction.
3. Helander, M. (1988).Handbook of Human-Computer Interaction.
4. Lewis and Reiman (1993). Task Centered User Interface Design.
5. Norman, D. A. (1988). The Design of Everyday Things, Basic Books, NY.
6. Preece, J. et al (1994). Human Computer Interaction.
7. Nielsen, J. (1993). Usability Engineering.
8. Shneiderman, B. (1997). Designing the User Interface.
Module Code
Module Name
Total ECTS of the
module
University Logo
University Name
Information Technology Program
Itec_M 14
Information Technology and Society
15
136
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Objective of the
module
Course Code
Itec4141
Itec4142
Itec4143
2012
The objectives of the module are:
Identify threats, Risks and Vulnerabilities
Data Security Policies/Admin Security
Information Systems Security concepts
Designing secure systems
Describe what professional ethics is
Describe professional communication
Describe the legal issues in computing
Describe the social context of computing
Describe the responsibilities of IT professionals
Courses in the Module
Course Name
Information Assurance and
Security
Social, Professional and Ethics in
Information Technology
Current Topics in Information
Technology (Elective)
Credit
ECTS (CP)
Hours
(existing)
4
7
3
137
University Logo
University Name
Information Technology Program
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Program
Information Technology
Course Code
Itec4141
Course Title:
Information Assurance and Security
Degree Program
Information Technology
Module Name
Information Technology and Society
Module No.
14
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
Tutorial
Lab/Practical
Home Study
Total
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
4th Year Information Technology Students
Year /Semester
Year: IV, Semester: II
Pre-requisites
Itec 2022, Itec 3102
Status of the
Course
Course
Description
Compulsory
This course covers theory and practice of Information system security.
Students will learn the principles of information security, security
architectures and models, aspects and methods of information security
such as physical security control, operations security, access control,
security threats, risks, vulnerabilities, Data security Policies/Admin,
138
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Security Procedural Control, Designing secure systems, Cryptographysymmetric and asymmetric. Students will also learn how to plan and
manage security, security policies, business continuity plans, disaster
recovery plans, and social and legal issues of information security.
Course Objective
At the end of this course the students will be able to know
Threats, Risks and Vulnerabilities
Data Security Policies/Admin. Security
Information Systems Security concepts
Designing secure systems
Course Content
Chapter one
Course Introduction
1.1. Enterprise Security
1.2. Cyber defense
1.2.1. Enterprise Security within an Enterprise Architecture
Context
Chapter Two
2. Brief Overview of Commercial Issues
2.1. Cryptography
2.2. Web Services Security
2.3. Convergence
2.3.1. Communications and Information
2.3.2. Wired/Wireless PKI (Public Key Infrastructure)
2.3.3. Windows Vista Security: Internet: Protocol versions 4/6
2.3.4. Implementing Enterprise Security Architecture (ESA)
2.3.5. Intrusion Detection System/Prevention (IDS/IPS):
Overview
Chapter three
3. Network Firewall Security
3.1. Definitions and Terminology
3.2. Internet Security Architecture
3.3. IPv6 Security Considerations
139
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
3.4. Host Security (authentication and authorization techniques)
Chapter four
4. Review of Shared Key Cryptography and Hash Functions
4.1. Basic Public Key Cryptography (DH, RSA, CAs, PKI)
4.2. Introduction to the TCP/IP Stack
4.3. Network Security (ports and protocols)
4.4. Firewalls and Firewall Rules
Chapter Five
5. Application Security (vulnerabilities of programming/scripting
languages)
5.1. Malicious Code (virii, worms, malware)
5.2. Securing Services (shells, e-mail, web servers)
5.3. Identifying Vulnerabilities (tools and techniques)
Assessment/Evaluation
Programming Assignments=15%, Project work= 20 %; Lab Exam =25%; written Final
examination= 40%
University Logo
University Name
Information Technology Program
Program
Information Technology
Course Code
Itec4142
Course Title:
Social, Professional and Ethical issues in Information Technology
Degree Program
Information Technology
Module Name
Information Technology and Society
140
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Module No.
2012
14
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
ECTS Credits
(CP)
Contact Hours
5
Lecture
(per week)
Tutorial
Lab/Practical Home Study
Total
8
Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:
4th year Information Technology Students
Year /Semester
Year: IV, Semester: II
Pre-requisites
Itec1011
Status of the
Course
Compulsory
Course
Description
In addition to technical skills, an IT professional must understand the social
and professional context of information technology and computing, and
adhere to ethical codes of conduct. This knowledge area covers the
historical, social, professional, ethical and legal aspects of computing. It
identifies how teamwork is integrated throughout IT and how IT supports
an organization and society.
Course
Objectives
After completing this course students will be able to:
Describe what professional ethics is
Describe professional communication
Describe the legal issues in computing
141
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Describe the social context of computing
Describe the responsibilities of IT professionals
2012
Course content
Week
Lecture Topics
Reading/
Assignments
Part 1 - Morality, Ethics, Justice, Rights:
1-3
4-8
9-12
1.1 What is "Critical Analysis"?
1.2 What are "Ethics" and "Morality"?
1.3 Moralities, Values, and Needs
1.4 Mill's Liberty Presumption
1.5 Discussion of Mill's "On Liberty"
1.6 Liberty-limiting principles
1.7 Comparative Justice and Distributive Justice
1.9 The Nature, Kinds, and Grounds of Rights
1.10 Human Rights, Derivative Moral Rights.
1.11 Kant's Ethical Formalism and Rawls Social Justice Ethics
Part 2 - Creativity: employer and employee rights in IT Matters
2.1.
Development of software: who owns the intellectual
property (IP)?
2.2.
Development of hardware: who owns the intellectual
property (IP)?
2.3.
What are "reasonable limitations" on IP ownership by an
employee?
2.4.
The Nature Of Digital Reliability And Failure:
2.5.
Representing and communicating risk from software and
hardware: who is responsible?
2.6.
From medical software to "Star Wars" and the complexity
of computer systems; origins of the Computer Professionals for
Social Responsibility; what is "reasonable reliability in complex
systems.
2.7.
"Goofing off": who owns the "Easter eggs"? Why are they
tolerated?
Part 3: Civil issues and criminality in computing Unethical
and Illegal Activities:
3.1.
Theft of source code, misrepresentation of authorship /
ownership
3.2.
Misrepresentation of performance, reliability and risk
3.3.
Theft of operating software (license avoidance, illegal
duplication)
3.4.
Denial of access (Microsoft versus Netscape)
3.5.
Illegal entry methods (exploiting weakness in
communication programs)
3.6.
Denial of service attacks
3.7.
Misrepresentation of identification
3.8.
Cyberterrorism: the origins and development of viruses and
malware. Types of internet disruption. Defenses
Reading:
TB1 pp 4-11
TB2 pp 12-28
TB 1 pp29-38
Reading:
TB1 pp 4-11
TB2 pp 12-28
Reading:
TB1 pp 4-11
TB1 pp 1228
142
Undergraduate Information Technology Program National Harmonized Modular Curriculum
3.9.
13-16
Websites, e-commerce and data: rights to access and to
privacy, data banks, the growth of the electronic porn industry
(what's on my hard drive?)
Part 4: Commentary on Legal Frameworks and Enforcement:
4.1.
Federal Legislation: Privacy Act, Charter of Rights and
Freedoms, Copyright Act, Amendments to Copyright Act to
incorporate electronic retransmissions, Industrial Design Act,
Integrated Circuit Topography Act, Personal Information
Protection and Electronic Documents Act, Protection of
children and other vulnerable persons and amendments to the
Canada Evidence Act (2002-2003) and the Criminal Code of
Canada
4.2.
Ontario Legislation: Electronic Commerce Act
4.3.
The Guardians: RCMP Commercial Crime: Computer
Investigations and Support Section, International and other
nations' efforts. Impersonation, tracking: do the ends justify the
means? Standards for the examination of evidence: Law
Enforcement Computer Evidence Suite. Is self policing and
self-protection possible or even desirable? e.g P3P (Platform for
Privacy Preferences)
2012
Reading:
TB1 pp 4-11
TB1 pp 12-28
Methodology
Three lecture hours are scheduled per week for this course. These hours are fully used to lecture
new materials. Students may be asked to read certain topics on their own before a class
discussion.
As part of this courses assignment the class will be divided into groups. At the end of the
course, each group in the class is supposed to do assignments and present it in class. The delivery
of the project is subjected to deadline. No extensions will normally be granted for the deadline.
There will be midterm exam for this course. Final examination will be given on the dates
specified by the University. The examinations will focus on understanding and applying the
concepts taught in class and in tutorial sessions of the course.
Assessment Methods
Your final mark will be calculated as follows:
Evaluation (100%):
30 % Midterm exam
10% Assignments
60% Written final examination
Reference books
1. The Handbook of Information and Computer Ethics: Kenneth Einar Hemma and
Herman T.Tavani, New Jersey, USA (2008)
2. Professional Issues in Information Technology: Frank Bott, The British Computer
Society, UK (2005)
3. Ethical and Social Issues in Information Systems: 2005
143
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Program
Course Code
Course Title:
Degree Program
Module Name
Module No.
Course Chair
2012
University Logo
University Name
Information Technology Program
Information Technology
Itec4143
Current Topics in Information Technology
Information Technology
Information Technology and Society
14
Office location:
Mobile:
Consultation Hours:
; e-mail:
Instructor/Tutor
ECTS Credits
(CP)
Contact Hours
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
Year /Semester
Pre-requisites
Status of the
Course
Office location:
Mobile:
; e-mail:
Consultation Hours:
5
Lecture
2
Tutorial
3
Lab/Practical
-
Home Study
5
Total
10
4th year Information Technology students
IV/II
Elective
The content of the course is based on the current issues selected by the instructor.
University Name
Institute of Technology
144
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Information Technology Program
Module Number
Module Name
Total ECTS of the
module
Objective of the
module
ITec_M15
Knowledge Base Systems
5
The objectives of the module are:
Explain basic concepts of artificial intelligence
Enable students to understand reasoning, knowledge
representation and learning techniques of artificial intelligence.
Courses in the Module
Course Code
ITec3151
Course Name
Introduction to Artificial Intelligence
Credit
ECTS (CP)
Hours
(existing)
3
5
University Name
Program
Course Code
Course Title:
Degree Program
Module Name
Module No.
Course Chair
School of Computing and Electrical Engineering
Information Technology
ITec3151
Introduction to Artificial Intelligence
Information Technology
ITec_M 15
10
Office location:
Mobile:
Consultation Hours:
; e-mail:
Instructor/Tutor
ECTS Credits
(CP)
Contact Hours
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
Office location:
Mobile:
; e-mail:
Consultation Hours:
5
Lecture
2
Tutorial
0
Lab/Practical
3
Home Study
5
Total
10
145
Undergraduate Information Technology Program National Harmonized Modular Curriculum
and Hours
Target Group:
Year /Semester
Pre-requisites
Status of the
Course
2012
3rd year Information Technology Students
III year, II semester
Elective
Course description
The purpose of this course is to give students an understanding of Artificial Intelligence
methodologies, techniques, tools and results. Students will use at least one AI-language [Lisp,
Prolog]. Students will learn the theoretical and conceptual components of this discipline and firm
up their understanding by using AI and Expert System tools in laboratory sessions, projects and
home assignments
Course Objective:
At the end of this course the students will be able to:
Understand reasoning, knowledge representation and learning techniques of artificial
intelligence
Evaluate the strengths and weaknesses of these techniques and their applicability to
different tasks
Assess the role of AI in gaining insight into intelligence and perception
know classical examples of artificial intelligence
know characteristics of programs that can be considered "intelligent"
understand the use of heuristics in search problems and games
know a variety of ways to represent and retrieve knowledge and information
know the fundamentals of artificial intelligence programming techniques in a
modern programming language
consider ideas and issues associated with social technical, and ethical uses of machines
that involve artificial intelligence
Content
CHAPTER 1:
1. Introduction to AI
1.1. Objectives/Goals of AI
1.2. What is AI?
1.3. Approaches to AI making computer:
1.3.1. Think like a human ( Thinking
humanly)
1.3.2. Act like a human (Acting humanly)
1.3.3. Think rationally (Thinking rationally)
1.3.4. Act rationally (Acting rationally)
1.4. The Foundations of AI
1.5. Bits of History and the State of the Art
Week
week 1 and 2
Reference book
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
146
Undergraduate Information Technology Program National Harmonized Modular Curriculum
CHAPTER 2:
2. Intelligent Agents
2.1. Introduction
2.2. Agents and Environments
2.3. Acting of Intelligent Agents (Rationality)
2.4. Structure of Intelligent Agents
2.5. Agent Types
2.5.1. Simple reflex agent
2.5.2. Model-based reflex agent
2.5.3. Goal-based agent
2.5.4. Utility-based agent
2.5.5. Learning agent
2.6. Important Concepts and Terms
CHAPTER 3:
3. Solving Problems by Searching and
Constraint Satisfaction Problem
3.1. Problem Solving by Searching
3.2. Problem Solving Agents
3.3. Problem Formulation
3.4. Search Strategies
3.5. Avoiding Repeated States
3.6. Constraint Satisfaction Search
3.7. Games as Search Problems
CHAPTER 4:
4. Knowledge and Reasoning
4.1. Logical Agents
4.2. Propositional Logic
4.3. Predicate (First-Order)Logic
4.4. Inference in First-Order Logic
4.5. Knowledge Representation
4.6. Knowledge-based Systems
5. Uncertain Knowledge and Reasoning (optional)
5.1. Quantifying Uncertainty
5.2. Probabilistic Reasoning
5.3. Probabilistic Reasoning over Time
5.4. Making Simple Decisions
5.5. Making Complex Decisions
Chapter 5:
6. Learning
6.1. Learning from Examples/Observation
6.2. Knowledge in Learning
6.3. Learning Probabilistic Models
6.4. Neural Networks
weeks 3 and 4
Weeks 5,6,7 and
8
Weeks 9 and 10
weeks 11 and 12
Weeks 13 and 14
2012
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
147
Undergraduate Information Technology Program National Harmonized Modular Curriculum
7. Communicating, Perceiving, and Acting
7.1. Natural Language Processing
7.2. Natural Language for Communication
7.3. Perception
7.4. Robotics
weeks 15 and 16
2012
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Methodology
The course will be delivered in lectures (with a participatory approach with particular attention to
encourage students in asking questions and answering), present their assignment and actively
participate in the lab session.
Assessment Method (Continuous):
Lecture 100%
Lab
100%
Text Book
Russell, S. and P. Norvig (1995) Artificial Intelligence: A Modern Approach Prentice-Hall.
References
1. Luger, G. (2002) Artificial Intelligence, 4th ed. Addison-Wesley.
2.Bratko, Ivan (1990) PROLOG Programming for Artificial Intelligence, 2nd ed.
Addison-Wesley, 1990
3.Winston, P.H. (1992) Artificial Intelligence Addison-Wesley.
4.Ginsberg, M.L. (1993) Essentials of Artificial Intelligence. Morgan Kaufman.
Software Requirement: PROLOG, LISP and PYTHON
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module
Objective of the
module
ITec_M 16
Information Technology Research and Project
16
The objectives of the module are:
Enable students to understand fundamental concepts and
principles of writing research papers
Enable students to apply their prior knowledge in identifying real
world problems, analyze, design, implement, test and deploy IT
projects
Enable students to identify recent research topics in IT, prepare
148
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Code
ITec3161
ITec4162
ITec4163
ITec4164
2012
and present seminars on such issues
Enable students to understand the basic skills of preparing and
presenting IT seminars
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Individual Project
2
3
Basic Research Methods in Information
Technology
2
3
Industrial Project I
3
5
Industrial Project II
3
5
University Name
School of Computing and Electrical Engineering
Program
Information Technology
Course Code
ITec4162
Course Title:
Basic Research Methods in Information Technology
Degree Program
Information Technology
Module Name
Information Technology Research and Project
Module No.
ITec_M 16
Course Chair
Office location:
Mobile:
; e-mail:
Consultation Hours:
Instructor/Tutor
Office location:
Mobile:
; e-mail:
Consultation Hours:
149
2012
Undergraduate Information Technology Program National Harmonized Modular Curriculum
ECTS Credits
(CP)
Contact Hours
(per week)
Lecture
Tutorial
Lab/Practical
Home Study
Total
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
4th year Information Technology Students
Year /Semester
Year: IV, Semester: I
Pre-requisites
None
Status of the
Course
Compulsory
150
Undergraduate Information Technology Program National Harmonized Modular Curriculum
Course Outline
Course
Description
2012
This course concerns us with the topic of research. It attempts to define
what research is, why we do research, and the various methods that
researchers use to investigate problems.
It is designed as an under-graduate introduction to research methodology.
Students are assumed to be familiar with statistics (such as mean, standard
deviation, percentiles, and other such terms). The course provides a
framework for conceptualizing research and is meant to underpin the
research project for the final year as well as for the projects delivered for
each subject.
Course Objective
At the end of this course, students will be able to understand:
The terminologies used by professional researchers employing
scientific thinking.
How to formulate a solid research hypothesis (research question).
the basic stages of research design
types of proposals and the contents of each
the issues covered in research ethics
the relationships that exist between variables in research design
and the steps for evaluating those relationships
Content
Lesson weeks
Reference book
Brief Introduction about the Course
1st Week
Course guide book
2nd,3rd week
-Donald H. (PP 349)
Chapter 1. THE NATURE AND SCOPE OF RESEARCH
What is research?
Research and theory
The Scientific approach
-McBurney,(pp1722)
Stages of the research process
-Marczyketal (pp1932)
Components of a Research Proposal
-Kothari (pp.1-24)
Writing a Research Proposal
151
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Project will be given
Chapter 2: FORMULATION OF THE RESEARCH
PROBLEM
Cooper, Donald
4th and 5th week
Selection of a general topic
G. Marczyk
Literature review and the exploratory study
etal (pp 34-37)
Specification of objectives and hypotheses
-Kothari (pp.24-29)
Concepts and variables
Project Proposal Submission to the Instructor
Assignment I will be given to students
Chapter 3: The Research Process
6th week
Major Steps in the Research process
Chapter 4: The Research Design
Research Design
Sing (pp.62-88)
7th, 8th and 9th
week
Sampling Methods
-Cooper, Donald
(pp306-326 and pp.
356-387)
-Kothari (pp.31-121
and pp.152-180)
Measurement
Measurement scales
-Sing (pp.88-121)
Instrument Design
Mid Exam
-Cooper, Donald
Chapter 5: Analysis and Presentation of Data
Data presentation and description
Exploring, displaying , and examining data
Hypothesis testing
Measures of association
Report witting : Presenting insights and findings;
Written and oral reports
10th , 11th and
12th week
(Pp 437-570)
-Sing (pp.122-270)
- Kothari (pp.122151 and pp. 184360)
Presentation of Assignments by students in Class will start
(a random group may be asked to Presentation)
152
Undergraduate Information Technology Program National Harmonized Modular Curriculum
2012
Chapter 6: Current Research Topics in IS
13th week
-The Internet
Chapter 7: Ethics in Research
14th week
Donald H. (pp.319340)
Project Presentation
15th -16th Week
------
Final Examination
Methodology
The course will be delivered with lecture, accompanied by active student participation (asking
questions, discussing on the raised questions, presenting the assignments).
Assessment Method (Continuous):
Summary of course assignment, test and exam
Assignment ..... .. 10%
Mid exam . 30%
Project ...... 20%
Final exam 40 %
Total .. 100%
References
1. Cooper, Donald (2006). Business research methods, 9th Ed, McGraw-Hill
2. G. Marczyk, D. Demattoe, D. Festinger(2005). Essentials of research methodology and
design. John Wiley and Sons, Inc.
3. Donald H. McBurney(1998). Research methods, 4th Redbooks/Cole Publishing Company.
University of Pittsburgh.
4. Kothari, C.R. (2004), Research Methodology: Methods and Techniques, Second
edition(Available in Soft Copy)
5. Sing, K. (2007), QUANTITATIVE SOCIAL RESEARCH METHODS, Sage Publications
153