You are on page 1of 153

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

WOLKITE UNIVERSITY
COLLEGE OF COMPUTING AND INFORMATICS
DEPARTMENT OF INFORMATION TECHNOLOGY

Four Year Study Program

Bachelor of Science Degree (BSc)


In

Information Technology
Nationally Harmonized Modular Curriculum

October, 2012
1

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Table of Contents
1.

Program Objective ................................................................................................................... 3


1.1 Objectives ............................................................................................................................. 3

2.

Graduate Profile ....................................................................................................................... 4

3.

Attitudes and Values ................................................................................................................ 5

4.

Degree Nomenclature .............................................................................................................. 5

5.

Assessment and Evaluation ..................................................................................................... 5

6.

Assignment of Course Codes .................................................................................................. 6

7.

List of Modules, Courses required .......................................................................................... 6

8.

Course Breakdown .................................................................................................................. 8

9.

Annexes ................................................................................................................................. 10
Module and Course Handbook ................................................................................................. 10

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

1. Program Objective
1.1 Objectives
1.1.1 General Objectives
To produce high quality IT Graduate with entrepreneur and problem solving
mind set. Providing a broad knowledge and skill in information technology
management
Providing students with the necessary skill and knowledge to configure and
maintain ICT infrastructure
Enabling students to develop and integrate information systems
Building students problem solving and critical thinking skills
Enabling students to cope up new technological developments

1.1.2 Specific Objective:


To produce graduates who possess the right combination of knowledge and
practical skills to take care of an organizations technology and infrastructure
needs and peoples that needs it.
To produce professionals that take responsibilities for selecting hardware and
software products appropriate for an organization, integrating those products
with organizational needs and infrastructure
To produce graduates who installing, customizing and maintaining
applications (network installation, network administration, Web site design,
development of multimedia resources, installation of communication
components and oversight of email system ) for the organization.
To produce professionals to work in organizations implementing and
managing automated information systems for different scientific, educational,
commercial and other purposes.
To produce graduates that plan and manage the technology lifecycle by which
an organizations technology is maintained, upgraded and replaced.

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

2. Graduate Profile
The graduates of the program will be able to:
Analyze, identify and define the IT requirements that must be satisfied to
address problems or opportunities faced by organizations or individuals.
Use and apply current technical concepts and practice in the core area of
Information Technology.
Design effective and usable IT-based solutions and integrate them into the
user environment.
Identify and Evaluate current and emerging technologies and assess their
applicability to address the users needs.
Assist in the creation of an effective project plan.
Analyze, adopt and demonstrate IT best practices, standards and their
application.
Demonstrate independent critical thinking and problem solving skills
Collaborate in teams to accomplish a common goal by integrating personal
initiatives
Communicate effectively and efficiently with clients, users and peers both
verbally and in writing, using appropriate terminology.
Analyze the impact of technology on individuals, organizations and society,
including ethical, legal and policy issues;
Demonstrate an understanding of best practices and standards and their
application;
Identify and analyze user needs and take them into account in the selection,
creation, evaluation and administration of computer-based systems.

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

3. Attitudes and Values


The graduates will be inspired:
To have professionalism at the center of their mentality;
To have a positive and responsive attitude towards the value of information
resources and towards their profession (love, dedication, commitment, etc.);
To have good personal confidence in their jobs and professional activities;
To have the sense of co-operation, honesty, loyalty, etc.; and
To be ethical.

4. Degree Nomenclature
English
The Degree of Bachelor of Science in Information Technology
Amharic


5. Assessment and Evaluation
Cognitive Abilities: Cognitive abilities are assessed by a combination of written examinations
and continuous assessment, including marked essays, class tests and computer
programming problems.
Practical Abilities: Practical Abilities are assessed mostly by continuous assessment. Some of
practical abilities are assessed as part of group project module.
Transferable skills: some skills, like the use of software tools and ability to communicate orally
and in written form are directly assessed, in assignments or projects, other skills are not
directly assessed but their effective use will enhance the students overall performance.
Evaluation will be done based on the midterm exam, assignments, laboratory sessions
demonstrations, Project work, and final exam and etc

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

6. Assignment of Course Codes


The course code will have four alphabets and four digit numbers like Itec1011. The four
alphabets code indicates the name of the program with the first alphabet capital letter, For
instance, Itec indicates abbreviation of the program of Information Technology. The four digits
indicates the year of course offering (the first number, 1, indicates the level of the course in
terms of the year; accordingly '1' for 1st year, '2' for 2nd year , 3 for 3rd year and 4 for 4th
year courses); the middle numbers, 01, indicates module code number in the program (example
01, 02, 03, 04, 05, 06, 07, 08, 09, 10), the last number, 1, indicates order of the course within
the module.

7. List of Modules, Courses required


Module
Number
ITec-M-01

Module Name

Courses

Information
Technology Basics

ITec-M-02

Computer Systems

Introduction to Information
Technology
Computer System Application
Computer Organization and
Architecture
Operating Systems

ITec-M-03
ITec-M-04

Computer
Maintenance
Basic
Programming

ITec-M-05

Advanced
Programming

ITec-M-06

System
Development and
Management

ITec-M-07

ITec-M-08

Database Systems

Database and
Information
Management

Computer Maintenance and


Technical Support
Fundamentals of Programming
I
Fundamentals of Programming
II
Data structure and Algorithms
Object Oriented Programming
Event-Driven Programming
Advanced Programming
Structural System Analysis
and Design
Object Oriented System
Analysis and Design
Information Technology
Project Management
Fundamentals of Database
Systems
Advanced Database Systems
Information Storage and
Retrieval
Database Administration

Course
Code
ITec1011

Cr.
Hr
3

Lec

Lab

Tut

HS

EC
TS
5

ITec1012
ITec2021

2
3

0
2

6
0

0
3

0
5

3
5

ITec2022

ITec4031

ITec1041

ITec2042

ITec2051
ITec2052
ITec3053
ITec3054
ITec1061

4
3
4
3
3

3
2
2
2
2

3
3
6
3
0

0
0
0
0
3

8
5
6
5
5

7
5
7
5
5

ITec2062

ITec2063

ITec2071

ITec2072
ITec3081

4
3

2
2

6
3

0
0

6
5

7
5

ITec4083

Undergraduate Information Technology Program National Harmonized Modular Curriculum

ITec-M-09

ITec-M-10

ITec-M-11

ITec-M-12

ITec-M-13
ITec-M-14

ITec-M-15
ITec-M-16

ITec-M-17
ITec-M-18

Web Systems and


Technologies

Computer
Networks

Network design,
configuration and
administration

Integrative
Programming and
Technics
Multimedia and
HCI
Information
Technology and
Society

Knowledge based
Systems
IT Research and
Project

Electricity and
Electronics
Statistics and
Probability

ITec-M-19

Mathematics for IT

ITec-M-20

Business
Management

ITec-M-21

Civics and Logic

ITec-M-22

Communicative
English

2012

Fundamentals of Internet
Programming
Advanced Internet
Programming
E-Commerce
Data Communication and
Computer Networks
Advanced Networking
Introduction to Distributed
Systems
Telecom Technologies
Wireless Networking and
Mobile Computing
System and Network
Administration
Network Design

ITec2091

ITec3092

ITec3093
ITec3101

2
4

2
3

0
3

0
0

4
8

3
7

ITec3102
ITec3103

3
3

2
2

3
3

0
0

5
5

5
5

ITec3104
ITec3105

2
3

2
2

0
3

0
0

4
5

3
5

ITec4111

ITec4112

Network Device and


Configuration
Integrative Programming and
Technics

ITec4113

ITec4121

Multimedia Systems
Human Computer Interaction
Information Assurance and
Security
Social, Professional and Ethics
in Information Technology
Current Topics in Information
Technology (Elective)
Artificial Intelligence
(Elective)
Individual Project

ITec3131
ITec3132
ITec4141

3
2
3

2
2
2

3
0
3

0
0
0

5
4
5

5
3
5

ITec4142

ITec4143

ITec3151

ITec3161

Basic Research Method in IT


Industrial Project I
Industrial Project II
Fundamentals Electricity and
Electronics Device
Introduction to Statistics and
Probability

ITec3162
ITec4163
ITec4164
EEng1171

2
3
3
4

2
0
0
4

0
0
0
0

0
0
0
0

4
10
10
10

3
5
5
7

Stat2181

Applied Mathematics for IT


Discrete Mathematics and
Combinatory
Entrepreneurship and Small
Business Management
Introduction to Management
Civics and Ethical Studies
Logic and Reasoning Skill
Communicative English Skills
Basic Writing Skills

Math1191
Math1192

4
3

4
3

0
0

2
0

8
7

7
5

Mngt4201

Mngt1202
CEEt1211
Phil1212
EnLa1221
EnLa1222

3
3
3
3
3

3
3
3
3
3

0
0
0
0
0

0
0
0
0
0

7
7
7
7
7

5
5
5
5
5

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

8. Course Breakdown
Year I Semester I
Module Code

Course Title

ITec_M_01

Introduction to Information
Technology
Computer Systems Application
Communicative English Skills
Civics and Ethical Studies
Logic and Reasoning Skill
Applied Mathematics for IT

ITec_M_01
ITec_M_22
ITec_M_21
ITec_M_21
ITec_M_19

Course
Code
ITec1011

Cr.Hr

CP

ITec1012
EnLa1221
CEEt1211
Phil1212
Math1191

2
3
3
3
4
18

3
5
5
5
7
30

Course
Code
ITec1041
ITec1192

Cr.Hr

CP

3
3

5
5

EnLa1222
EEng1171

3
4

5
7

ITec1061

Mngt1202

3
19

5
32

Course
Code
ITec2021

Cr.Hr

CP

ITec2042
ITec2062

3
3

5
5

ITec2071
ITec2063

3
3

5
5

Stat2181

18

30

Year I Semester II
Module2
Code
ITec_M_04
ITec_M_19

Course Title

ITec_M_22
ITec_M_17

Basic Writing Skills


Fundamentals Electricity and
Electronics Device
Structural System Analysis and
Design
Introduction to Management

ITec_M_06
ITec_M_20

Fundamentals of Programming I
Discrete Mathematics and
Combinatory

Year II Semester I
Module
Code
ITec_M_02
ITec_M_04
ITec_M_06
ITec_M_07
ITec_M_06
ITec_M_18

Course Title

Computer Organization and


Architecture
Fundamentals of Programming II
Object Oriented System Analysis and
Design
Fundamentals of Database Systems
Information Technology Project
Management
Introduction to Statistics and
Probability

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Year II Semester II
Module
Code
ITec_M_05
ITec_M_05
ITec_M_02
ITec_M_07
ITec_M_09

Course Title

Data structure and Algorithms


Object Oriented Programming
Operating Systems
Advanced Database Systems
Fundamentals of Internet
Programming

Course
Code
ITec2051
ITec2052
ITec2022
ITec2072
ITec2091

Cr.Hr

CP

4
3
4
4
3

7
5
7
7
5

18

31

Cr.Hr

CP

4
3
3
2
3
4

7
5
5
3
5
7

19

32

Cr.Hr

CP

2
2
3
3
2
3

3
3
5
5
3
5

3
3
21

5
5
34

Year III Semester I


Module
Code
ITec_M_05
ITec_M_05
ITec_M_09
ITec_M_09
ITec_M_13
ITec_M_10

Course Title

Event-Driven Programming
Advanced Programming
Advanced Internet Programming
E-Commerce
Multimedia Systems
Data Communication and Computer
Networks

Course
Code
ITec3053
ITec3054
ITec3092
ITec3093
ITec3131
ITec3101

Year III Semester II


Module
Code
ITec_M_13
ITec_M_16
ITec_M_10
ITec_M_10
ITec_M_10
ITec_M_10

ITec_M_08

Course Title

Human Computer Interaction


Individual Project
Advanced Networking
Introduction to Distributed Systems
Telecom Technologies
Wireless Networking and Mobile
Computing
Elective
Information Storage and Retrieval

Course
Code
ITec3132
ITec3161
ITec3102
ITec3103
ITec3104
ITec3105

ITec3081

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Year IV Semester I
Module
Code
ITec_M_08
ITec_M_16
ITec_M_11
ITec_M_03
ITec_M_12
ITec_M_16

Course Title

Course
Code
ITec4082
ITec4163
ITec4112
ITec4031

Cr.Hr

CP

3
3
3
4

5
5
5
7

3
2
20

5
3
33

Course
Code
ITec4164
ITec4111
ITec4201

Cr.Hr

CP

3
3
3

5
5
5

ITec4113
ITec4141
ITec4142

3
3
2

5
5
3

17

29

Database Administration
Industrial Project I
Network Design
Computer Maintenance and Technical
Support
Integrative Programming and Technics ITec4121
ITec4162
Basic Research Method in IT

Year IV Semester II
Module
Code
ITec_M_16
ITec_M_11
ITec_M_20
ITec_M_11
ITec_M_14
ITec_M_14

Course Title

Industrial Project II
System and Network Administration
Entrepreneurship and Small Business
Management
Network Device and Configuration
Information Assurance and Security
Social, Professional and Ethics in
Information Technology

9. Annexes
Module and Course Handbook

Wolkite University
College of Computing and Informatics
Information Technology Program
Module Number
Module Name
Total ECTS of the

ITec_M_01
Information Technology Basics
10

10

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

module

Objective of the
module

The objectives of the module are:

To provide students with the basic knowledge, skills and


applications of IT

To provide students with the understandings of information


technology fundaments, major components and applications

To understand the implications and impacts of information


technology.

Course Code

ITec1011
ITec1012

Courses in the Module


Course Name
Credit Hours
(existing)
Introduction to Information
3
Technology
Computer Applications
2

ECTS (CP)
5
5

Wolkite University
Program

Information Technology

Course Code

ITec1011

Course Title:

Introduction to Information Technology

Degree Program

Information Technology

Module Name

Information Technology Basics

Module No.

ITec_M_01

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
11

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical Home Study

Total

(per week)

10

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

1st year Information Technology Students

Year /Semester

Year: I, Semester: I

Pre-requisites

None

Status of the
Course

Compulsory

Course Outline
Course
Description

The aim of the course is to develop a basic awareness of information and


communication technology. The course will:

Enhance learning and make the learners more productive and


creative

Enable the learners to locate , collect , evaluate , and process


information from a variety of sources

Course
Objectives

Help the learners to solve problems and make informed decisions

At the end of the course, students will be able to:

Explain the major concepts , function and principles of ICT

Explain the computer system

Explain historical development of computers with their


characteristics

Describe data representation techniques and computer


12

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

arithmetic

Define computer networking , its components and applications

Make use of the basic MS office applications

Describe basic concepts in Internet.

Course content

DATE

TOPICS
An overview of IT and data processing

ASSIGNMENT/PROJECT
/READINGS
Complete Guide to IT: pp. 17-49.

(Chapter One)
Week 1

What is IT?

and 2

Components of IT

Functions and application of IT

Data and Information processing

Computers (Chapter Two)

Definition of computers

Week 3

Evolution of computers

and 4

Historical development of

Complete Guide to IT: pp. 50-77.

computers

Types of computers

Computer System (Chapter Three)

Complete Guide to IT: pp. 78-129.

Hardware
o Input

Weeks

o Output

5 and 6

o Processing unit
o Storage
o Memory

Week 7
Week 8

Lab Exam 1

Software

Complete Guide to IT: pp. 78-129.13013

Undergraduate Information Technology Program National Harmonized Modular Curriculum

o System software

2012

155.

o Application software
Week 9

Mid Exam
Data representation and computer

Complete Guide to IT: pp. 155-172.

arithmetic (Chapter Four)


Weeks 10
and 11

Data representations in computers

Coding methods

Number system

Computer arithmetic

Data communication, computer

Complete Guide to IT: pp. 545-626.

networking and Internet (Chapter Five)

Weeks

Data communication

Computer networks
o Types of networks

12 and 13

o Network configuration
o Network topologies
o Network devices and
transmission media

Week 14

Internet

Complete Guide to IT: pp. 627-632,


645 and 707-720

Week 15

Lab Exam 2

Week 16

Final Exam

Methodology

Lecture
For this course two lecture hours are scheduled per week.

Laboratory
In the laboratory session of this course, students are expected to practice MS Windows and
MS DOS.

Lab Exam
14

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Lab exam is given in the lab to be performed individually. Assessment is undergone immediately
for each student.
Assessment methods (should be continuous):
LabExam

100%

Lecture

100%

Reference materials:
RequiredReference books:
1) Williams and Sawyer, Using Information Technology.
2) Dida Midekso, Introduction to Computer Science.
3) Mergia, Complete Guide to Information Technology.

Biblography
4) Laudon and et. al., Inforamtion Technology: Concepts and Issues.
5) Corbitt, Information Technology and its Application.
6) Morley and Parker, Understanding Computers: Today and Tommorow.

Wolkite University
Program

Information Technology

Course Code

ITec1012

Course Title:

Computer applications

Degree Program

Information Technology

Module Name

Information Technology Basics

Module No.

IT_M_01

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
15

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Mobile:

2012

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical Home Study

Total

(per week)

10

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

1st year Information Technology Students

Year /Semester

Year: I, Semester: I

Pre-requisites

None

Status of the
Course

Compulsory

Course Outline
Overview of application packages; word processing; spreadsheet;
presentation Software; Internet, etc.
At the end of the course, the students should be able to:
Explain application software
Make use of word processing software
Operate spreadsheet applications
Prepare effective presentation using presentation software
Manage database using Ms Access
Understand different services provided by the Internet
Browse and use the Internet for information exchange

Course
Description
Course
Objectives

Course Content
Week

Practical Work

Tasks

Reading

CHAPTER ONE: BASICS OF PC AND WINDOWS


Starting and closing computer, Using mouse and
keyboard, Windows concepts, Windows Environment,
The Desktop Elements, Parts of a Window, Changing
Desktop Background and Screen Saver, Starting
programs, Using accessories program, Managing files
and folders, Adjusting Date And Time, Creating
shortcut programs, Managing programs on Start menu,

Attend

Manual

demonstration,
work on
exercises,
forward
16

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Getting help
1

Lab Exam I

CHAPTER TWO: OFFICE APPLICATIONS


MS Office Background
Desktop applications
MS WORD
Introduction To Ms-Word
Ribbons And Chunks
Basic Word Concepts And Text Proofing
Document Formatting
Document Editing
Table Basics
Document Page Setup And Printing
Lab Exam 2
CHAPTER TWO: OFFICE APPLICATIONS
MS EXCEL
Introduction To MS-Excel
Understanding Excels Files
Saving A Workbook
Closing Workbooks
Working With Worksheets
Entering Data
Creating And Editing Formulae andFunctions
Formatting And Proofing
Charts Basics
Printing And Page Setup
Lab Exam 3
CHAPTER TWO: OFFICE APPLICATIONS
MS POWER POINT
Introduction To Ms-Power Point
Creating Presentation
Slide
Design Template
Slide Transition
Custom Animation
Navigation
Slide Show
Printing
CHAPTER TWO: OFFICE APPLICATIONS
MS ACCESS

1
3

1
2

2012

questions

Attend
demonstration,
work on
exercises,
forward
questions

Manual

Attend
demonstration,
work on
exercises,
forward
questions

Manual

Attend
demonstration,
work on
exercises,
forward
questions

Manual

Attend
demonstration,
work on
exercises,
forward
questions

Manual

Lab Exam 4
17

Undergraduate Information Technology Program National Harmonized Modular Curriculum

CHAPTER THREE: INTERNET APPLICATIONS


What Is Internet?
Internet History
Internet Services
Types Of Web Sites
Finding Information On The Web

2012

Attend
demonstration,
work on
exercises,
forward
questions

Manual

TEACHING AND LEARNING METHODS


The mode of the delivery of the course is laboratory or practical activities, questioning and
answering, assignments, individual and /or group works.
ASSESSMENT METHODS
Evaluation will be carried out based on continuous assessment (minimum of 50%) which
assignments, seminar and laboratory works, and mid-exam and/or final examination.
Practical (100%)
Lab exam1 ---------------------------------------------------------------------15%
Lab exam2 ----------------------------------------------------------------------20%
Lab exam3 -----------------------------------------------------------------------25%
Lab exam4 ----------------------------------------------------------------------- 15%
Assignment1 (Given at week 9, due date week 11) ---------------------------15%
Assignment2 (Given at week 14, due date week 16) --------------------------10%
REFERENCE
Manual
Microsoft Windows help and support
Microsoft Office help

Wolkite University
College of Computing and Informatics
Information Technology Program
Module Code

ITec_M_02

Module Name
Total ECTS of the

Computer Systems
12

18

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

module

Objective of the
module

Course Code

Itec2021
Itec2022

At the end of this module students should be able to: Identify Boolean algebra, logic gate and their
relationship
Describe basic digital components of computer like
decoder, encoder, register, counter, multiplexer etc
Describe data representation and basic instruction in a
computer system
Describe control unit and ALU design
Indentify memory and input/output organization in a
basic computer system
Identify BIOS and its setting
Perform disk partitioning and manipulating
Install, use and troubleshoot windows and Linux
operating system
Courses in the Module
Course Name
Credit Hours
ECTS (CP)
(existing)

Computer Organization and


Architecture
Operating Systems

19

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Wolkite University
College of Computing and Informatics
Information Technology Program
Program

Information Technology

Course Code

Itec2021

Course Title:

Computer Organization and Architecture

Degree Program

Information Technology

Module Name

Computer Systems and Maintenance

Module No.

02

Course Chair

TBA
Office location: TBA
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: II, Semester: I

Pre-requisites

Itec1011

Status of the
Course

Compulsory

TBA
2nd year Information Technology Students

20

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course
Description

Course Objective

Course Outline

2012

All students of computing should acquire some understanding and


appreciation of a computer systems functional components, their
characteristics, their performance, and their interactions. Students need to
understand computer architecture in order to structure a program so that it
runs more efficiently on a real machine. The focus of this course is to deal
with Digital logic and digital systems; Machine level representation of
data; Assembly level machine organization; Memory system organization
and architecture; Interfacing and communication; and Functional
organization.
Describe the progression of computer architecture from vacuum
tubes to VLSI.
Demonstrate an understanding of the basic building blocks and
their role in the historical development of computer architecture.
Use mathematical expressions to describe the functions of simple
combinational and sequential circuits.
Design a simple circuit using the fundamental building blocks.
1. Digital logic and digital systems
1.1. Overview and history of computer architecture
1.2. Fundamental building blocks (logic gates, flip-flops, counters,
registers, PLA)
1.3. Logic expressions, minimization, sum of product forms
1.4. Register transfer notation
1.5. Physical considerations (gate delays, fan-in, fan-out)
2. Data Representation
2.1.
2.2.
2.3.
2.4.
2.5.

Bits, bytes, and words


Numeric data representation and number bases
Fixed- and floating-point systems
Signed and twos-complement representations
Representation of nonnumeric data (character codes, graphical
data)
2.6. Representation of records and arrays
3. Assembly level machine organization
3.1.
3.2.
3.3.
3.4.
3.5.
3.6.
3.7.
3.8.

Basic organization of the von Neumann machine


Control unit; instruction fetch, decode, and execution
Instruction sets and types (data manipulation, control, I/O)
Assembly/machine language programming
Instruction formats
Addressing modes
Subroutine call and return mechanisms
I/O and interrupts

4. Memory system organization and architecture


21

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

4.1.
4.2.
4.3.
4.4.
4.5.
4.6.

Storage systems and their technology


Coding, data compression, and data integrity
Memory hierarchy
Main memory organization and operations
Latency, cycle time, bandwidth, and interleaving
Cache memories (address mapping, block size, replacement and
store policy)
4.7. Virtual memory (page table, TLB)
4.8. Fault handling and reliability
5. Interfacing and communication
5.1. I/O fundamentals: handshaking, buffering, programmed I/O,
interrupt-driven I/O
5.2. Interrupt structures: vectored and prioritized, interrupt
acknowledgment
5.3. External storage, physical organization, and drives
5.4. Buses: bus protocols, arbitration, direct-memory access (DMA)
5.5. Introduction to networks
5.6. Multimedia support
5.7. RAID architectures
6. Functional organization
7. Implementation of simple datapaths
8. Control unit: hardwired realization vs. microprogrammed
realization
9. Instruction pipelining
10. Introduction to instruction-level parallelism (ILP)
Methodology
Assessments
Attendance
requirements
Methodology
Attendance
requirements

Lectures supported by tutorials, assignments and Lab exercises


Continuous assessment 60%
Final exam 40%
85% for lecture and 100% for lab
Lectures supported by tutorials, assignments
85% for lecture and 100% for lab
Text Reference
D. A. Patterson and J. L, Hennessy (1996) Computer Architecture:
A Quantitative Approach, 2nd edition. Morgan Kaufmann, Inc.
D.A. Patterson and J.L Hennessy (1991} Computer Organization
and Design: The
Hardware/Software Interface, 2nd edition. Morgan Kaufmann
Publishers
J.D. Carpinelli (2000) Computer Systems Organization and Architecture,
Addison Wesley Pub Co.
A.S. Taneubaum (1998) Structured Computer Organization. Prentice
22

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Hall M.
M. Mario (1992) Computer System Architecture, Prentice Hall
Hemacher: Computer Organization

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

ITec2022

Course Title:

Operating Systems

Degree Program

Information Technology

Module Name

Computer Systems and Maintenance

Module No.

02

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

7
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

14

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: II, Semester: II

Pre-requisites

Itec1011

TBA
2nd Year Information Technology Students

23

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Status of the
Course
Course Objective

Compulsory

Course Outline

Chapter 1: History and overview

2012

The course introduces students to basics of operating system design


principles and components, and their functions. It will also discuss
memory management, processor management, process management and
deadlocks, concurrency control, scheduling and dispatching, device
management, file systems, file management, security and protection, and
system performance evaluation. In addition, students will be introduced
with different operating systems, and they will see their similarities and
differences.
1.1. Indicate some reasons for studying operating systems
1.2. Indicate some important topic areas such as function and design,
concurrency, scheduling, dispatch, memory management, device
management, file systems, security, and protection
1.3. Describe the purpose of an operating system
1.4. Indicate the meaning of an interrupt
1.5. Describe the meaning of concurrency and the reasons for its
importance
1.6. Illustrate the manner in which scheduling and dispatch take place
in a computer through its operating system
1.7. Describe the manner and importance of memory management
1.8. Describe the manner and importance of device management
1.9. Explore some additional resources associated with operating
systems
1.10.
Explain the purpose and role of operating systems in
computer engineering
Chapter 2: Design principles
2.1. Functionality of a typical operating system
2.2. Mechanisms to support client-server models, hand-held devices
2.3. Design issues (efficiency, robustness, flexibility, portability,
security, compatibility)
2.4. Influences of security, networking, multimedia, windows
2.5. Structuring methods (monolithic, layered, modular, microkernel models)
2.6. Abstractions, processes, and resources
2.7. Concepts of application program interfaces (APIs) specific to
operating systems
2.8. Applications needs and the evolution of hardware/software
techniques
2.9. Device organization
2.10.Interrupts: methods and implementations
2.11.Concept of user/system state and protection, transition to kernel
mode
24

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Chapter 3: Design principles


3.1.
3.2.
3.3.
3.4.
3.5.
3.6.
3.7.
3.8.

States and state diagrams


Structures (ready list, process control blocks, and so forth)
Dispatching and context switching
The role of interrupts
Concurrent execution: advantages and disadvantages
The mutual exclusion problem and some solutions
Deadlock: causes, conditions, prevention
Models and mechanisms (semaphores, monitors, condition
variables, rendezvous)
3.9. Producer-consumer problems and synchronization
3.10.Multiprocessor issues (spin-locks, reentrancy)
Chapter 4: Scheduling and dispatch
4.1.
4.2.
4.3.
4.4.

Preemptive and non-preemptive scheduling


Schedulers and policies
Processes and threads
Deadlines and real-time issues

Chapter 5: Memory management


5.1.
5.2.
5.3.
5.4.
5.5.
5.6.
5.7.

Review of physical memory and memory


management hardware
Overlays, swapping, and partitions
Paging and segmentation
Placement and replacement policies
Working sets and thrashing
Caching

Chapter 6: Device management


6.1.
6.2.
6.3.
6.4.
6.5.

Characteristics of serial and parallel devices


Abstracting device differences
Buffering strategies
Direct memory access
Recovery from failures

Chapter 7: Security and protection


7.1.
7.2.
7.3.
7.4.
7.5.
7.6.
7.7.
7.8.

Overview of system security


Policy/mechanism separation
Security methods and devices
Protection, access, and authentication
Models of protection
Memory protection
Encryption
Recovery management

Chapter 8: File systems


8.1 Files: data, metadata, operations, organization, buffering,
25

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

sequential, nonsequential
8.2 Directories: contents and structure
8.3 File systems: partitioning, mount/unmount, and virtual file
systems
8.4 Standard implementation techniques
8.5 Memory-mapped files
8.6 Special-purpose file systems
8.7 Naming, searching, access, backups
Text Reference: Andrew S. Tanenbaum (1992) Modern Operating
Systems. Prentice-Hall International Inc.
Operating Systems, 4th edition by W. Stalling (editor) PrenticeHall 2001
Distributed Systems: Concepts and Design (3rd edition), George
Coulouris, Jean
Dollimore and Tim Kindberg, Addison Wesley Longman, 2000.
Distributed Programming with Java, Qusay H. Mahmoud, Manning
Publications Co., 2000.
Distributed Systems: Principles and Paradigms, Andrew S.
Tanenbaum and Maarten van Steen, Prentice-Hall, 2002.
Software Requirements: UNIX/Linux operation systems
Instructional: Lectures, Laboratory
Methods of Evaluation: Assignment, mid and final exams

Instructional
Methods

The course will be delivered through lectures, discussions, and


Assignment. Students are expected to actively participate in the
discussions.

Assessment
50% continuous assessment
50% final exam

26

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

University Logo
University Name
Information Technology Program
Module Code

ITec_M 03

Module Name
Total ECTS of the
module

Computer Maintenance

Objective of the
module

The objectives of the module are:

To Understand concepts of maintenance and troubleshooting

Choose CPU that matches their motherboard and install it

Choose different cards that match their motherboard and


install them

Install RAM, Cards and other devices

Diagnose computer problems and solve the problems

Upgrade computer system hardware

Install OS and any other application software

Identify and solve computer problems whether software


related or hardware related

Course Code

ITec4031

Understand and identify PC hardware components


Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
4
7
Computer Maintenance and

Technical Support

27

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Wolkite University
College of Computing and Informatics
Program

Information Technology

Course Code

ITec4031

Course Title:

Computer Maintenance and Technical Support

Degree Program

Information Technology

Module Name

Computer Maintenance

Module No.

02

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

7
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

14

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

4th year Information Technology Students

Year /Semester

Year: IV, Semester: I

Pre-requisites

Computer Organization and ArchITECture

Status of the
Course
Course
Description

Compulsory
This course exposes the student to hardware components of computer
system and software from technicians point of view. The course teaches
about CPU types and installation, RAM types and installation, expanding
28

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

computer using cards, troubleshooting computer problems, and installing


OS and application packages. Solving problems related computer system,
whether hardware or software, is what the course deals about.
Course Objective

After completion of this course ,students will be able to :


Understand and identify PC hardware components
Build ,configure ,upgrade ,and maintain a computer
Install operating systems and application software
Providing basic knowledge of preventive maintenance and how to
use windows built-in diagnostic tools.
To have practical experience of troubleshooting PC hardware and
software problems
Understand concepts of maintenance and troubleshooting

Choose CPU that matches their motherboard and install it

Choose different cards that match their motherboard and install


them

Course Outline

Install RAM, Cards and other devices

Diagnose computer problems and solve the problems

Part I Hardware Concepts


1. Basics

General concepts about PC and tech support

Lab procedures and maintenance tools

Static energy and its effect on computers

Safety rules

Preventive maintenance and troubleshooting

1. Computer Cases and the Motherboard

Computer cases

Safety and the computer

System Cover removal and replacement

System board defined

System board evolution


29

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Removing and replacing motherboard

Troubleshooting the motherboard

2012

2. The CPU

History of CPU

Types of CPU

CPU Sockets and slots

Upgrading CPUs

3. Memory

Random Access Memory defined

Physical memory packaging

Types of memory

Read-only Memory and Cache Memory

Identify Memory Problems and upgrading

4. Power Supplies

Power supplies

Types of power supply

Batteries

Troubleshooting the Power Supply

5. Storage Devices

6.

The Floppy Drive

The Hard Drive

The CD-ROM Drive

Bus and Cards

Bus
o Types of Bus
o Expansion Buses

Cards
o The Video Card
o The Sound Card
30

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

o Network card

7.

8.

I/O Connectors

The Serial Port

The Parallel Port

I/O connectors

The Monitor

Introduction to Monitor

Types of Displays

Health and Safety Concerns

Monitor Connections

Troubleshooting the Video System

9. BIOS

Basic Input/Output System

Error messages and solutions

Advanced BIOS Features

10. Printers

Printer Types and Printer Technology

Printer Field Replaceable Units

Printer Maintenance Techniques

Part II Software Concepts


1.

2.

Introductions

History of Operating System

Types of Operating System

Purpose of Operating System

Disk use, Booting and File systems

File systems:
o FAT
o NTFS
31

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

o HPFS

3.

4.

Sectors, Clusters and Fragmentation

Boot sector and other areas of disk

NTLDR, GRUB, LILO and other boot loaders

Registry Editing in Windows

What is Registry

Managing and Editing Registry

Back up registry

OS ArchITECture and Important OS files

ArchITECture of Windows NT

Kernel

Types of Kernel

Important Windows files (NTdetect.com, Boot.ini, NTLDR,


etc)

5.

6.

Installing Hardware, and Software

How to install hardware and drivers

Plug and Play devices

Installing/uninstalling application software

Operating System Installation and Management

Install Windows as single or dual boot

Recover failed Windows OS

Install Linux as Single or dual Boot

Manage user accounts and access rights

Computer security ring

Disable/Enable registry editing, task manager, and


Command Prompt

7.

Use Administrative tools and control Panel

Resource Sharing and Management

File Sharing

Printer Sharing
32

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Server management (e.g. Web server)

Protecting attacks(e.g. Virus)

2012

Lab. Classes:
Computer Disassembly
Disassemble a computer using safe lab procedures and
proper tools.
Computer Assembly
Install the Power Supply
Install the Motherboard
Install the Drives
Install Adapter Cards
Install Internal Cables
Complete the Computer Assembly
Boot the Computer
Operating System
Upgrade Components
Install Windows XP
Windows XP User Accounts and Updates
FAT32 and NTFS
Run Commands
Install Third-Party Software
Restore Point
Windows Backup and Recovery
Assessment Method

Assignment-1 Due20%
Practical ------------------------------------------------------------15%
Mid Exam . 25%

Final Examination 40%


Practical work supportedby projects and assignments

33

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Reference
1.
2.

PC troubleshooting and repair , Stephen J. Bigelows


PC troubleshooting and repair
Stephen J. Bigelows(available at main Library)
3.
A+ a complete guide, third edition.
By David Groth (available in softcopy)
4.
Upgradingand Repairing Microsoft Windows
By Scott Mueller, Brian Knittel (available in softcopy)

University Logo

Wolkite University
College of Computing and Informatics
Information Technology Department
Module Code
Module Name
Total ECTS of the
module

Objective and
competences of the
module

ITec_M_04
Basic Programming
10

This module is designed to:


-

Enable students design, code, debug and document large


programs using procedural programming style.

Course Code

ITec1041
ITec2042

Courses in the Module


Course Name

Fundamentals of Programming I
Fundamentals of Programming II

Credit
ECTS (CP)
Hours
(existing)
3
5
3

34

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Wolkite University
College of Computing and Informatics
Program/Department Information Technology
Course Code

ITec1041

Course Title:

Fundamentals of Programming I

Degree Program

Information Technology

Module Name

Basic Programming

Module No.

ITec_M_04

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits (CP)

Contact Hours (per

Lecture

Tutorial

Lab/Practical Home

week)

Total

Study
2

Lecture days, Hours


and Room:
Tutorial/Lab days
and Hours
Target Group:

1st year Information Technology Students

Year /Semester

Year: I, Semester: II

Pre-requisites

Introduction to Information Technology

Status of the Course

Compulsory

10

Course Outline
Course Description

The course aims to help students gain experience and confidence with
concepts of computer programming that will allow them to solve
35

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Objectives

2012

meaningful problems in a variety of fields. Basic ideas of computer and


software architecture will be covered along with programming concepts
such as flow, logic, data structures, and modularity. The core emphasis
of the course is on the following: 1) Programming Concepts
recognizing and understanding the fundamental constructs present in all
programming languages; 2) Design Methodology Using abstraction
to simplify complex problems into concrete subtasks; 3) Algorithmic
Thinking Defining the process used to glean information from data,
and being able to convince oneself of its correctness; 4) Literate
Programming Writing programs which are clearly structured and can
be read by a human as well as a machine; 5) Methodical and efficient
development of computer programs using step-wise refinement and
incremental testing and debugging
On completion of this course, students should be able to:
-

fully understand the software development life cycle

Discuss the importance of algorithms in the problemsolving process.


Design algorithms for solving simple problems.
Use pseudocode or a programming language to
implement, test, and debug algorithms for solving
simple problems.
Describe strategies that are useful in program
debugging.
Understand and explain the behavior of simple programs
involving the fundamental programming constructs.
Modify and expand short programs that use standard
conditional control structures and functions.
Design, implement, test, and debug a program

Course Content

1. Problem solving using computers


Computer Fundamentals
Programming Languages
Identifying and Analyzing problems
Software Crisis
Software development method (Problem Definition,
Requirement analysis, Design (algorithm, Flow charts,
Pseudo codes), Coding, Testing & Maintenance,
Documentation.
2. Fundamentals of the C/C++ Programming Language
A brief history of C/C++
Procedural and Object-Oriented Programming
C++ and Object-Oriented Programming
The structure of C++ Programs
36

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Compilation process of C++


A simple C++ program
Input/Output in C++
Comments in C++
3. Constants, Variables, data Types and Operators
C++ tokens
Declaring a variable
Naming rules for variables
Basic data types
Assigning values to variables
Constants
Operators and operator precedence
Mathematical operators
Relational operators
Logical operators
Increment and decrement operators
4. Control Flow Statements (Selection and Repetition
Statements)
Selection Statements
If
ifelse
Nested if.else
switch
Repetition statements (loops)
for loop
while loop
do while loop
Nested loops.
5. Introduction to Arrays and Functions
Introduction to arrays
Introduction to functions
Declaring and defining function
Function Prototype
Calling function
Lab Contents:
Compilation process of C++
Displaying message using cout
Declaring and initializing variables with different data
types
Declaring constant identifiers and use in the program
Assigning values to variables
Accepting values from users through cin
Practicing operators and expressions
Practicing control structures (sequential, if, ifelse,
nested if else, switch, for loop, while loop, do while
37

Undergraduate Information Technology Program National Harmonized Modular Curriculum

References

2012

loop and Nested loops)


Arrays and functions

1. Walter Savitch, Problem solving with C++ - The Object of


programming, Menlo Park: Addison-Wesley, 1996.
1. Dietel&Dietel, C How To Program, Third Edition, Prentice
Hall, 2003
2. Robert Lafore, The Waite Groups programming Using Turbo
C++ Techmedia, 1993
3. John R. Hubrard, Fundamentals of Computing with C++,
Shuams Outline, 1997
4. Jess Liberry, An Introduction to C++ 1995
Robert Lafore, The Wait Group Object Oriented programming With
C++ 1994

Teaching Learning
Methods:
Assessment Methods:

Lectures, Laboratory and Tutorials

Continuous Assessments (60%):


- Lab works
- Quizzes
- Assignment
- Tests
- Project

Final exam-40%

38

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Wolkite University
College of Computing and Informatics
Program/Department Information Technology
Course Code

ITec2042

Course Title:

Fundamentals of Programming II

Degree Program

Information Technology

Module Name

Basic Programming

Module No.

ITec_M_04

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits (CP)

Contact Hours (per

Lecture

Tutorial

Lab/Practical Home

week)

Total

Study
2

Lecture days, Hours


and Room:
Tutorial/Lab days
and Hours
Target Group:

1st year Information Technology Students

Year /Semester

Year: II, Semester: I

Pre-requisites

Fundamentals of Programming I

Status of the Course

Compulsory

10

Course Outline
Course Description

This course is designed for people with prior programming experience.


The topics covered in this course are the fundamental concepts behind
programming preparing students to learn advanced programming
39

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Objectives

2012

languages. Topics include basic logic constructs functions, array,


pointers, file systems structures and structured programming
statements.
On completion of this course, students should be able to:
-Solve problems using procedural programming languages
-To know and use C++ programming language
-To know concepts of class in C++
-To get familiar with pointer and its application

Course Content
1.

Array and String

one-dimensional array

multi-dimensional array

working with string

2.

Pointers in C++

3.

Function

4.

Fundamentals of Classes

Data Types

User Created Data Types

Using The Class Concept

Defining a class

public

The Scope Resolution Operator ::

public

Using class Objects Like Built-in Types

Scope

Constructors

Member Initialization Lists

Destructors

Array of Objects

Pointers

The this Pointer

Passing Objects To Functions

and private Access Levels

and private Access Levels (again)

40

Undergraduate Information Technology Program National Harmonized Modular Curriculum

5.

Returning Objects From Functions

static

2012

Class Members

Operator Overloading

Introduction

Rules for Operator Overloading

Rationale for Operator Overloading

Overloading Member Functions

Overloading Non-Member Functions

friend

The copy Constructor

The Assignment Operator

Overloading [ ]

Overloading Increment and Decrement Operators

const

Functions

Objects and References

I/O

6.

7.

The iostream Library

Predefined Streams

operator<<

Overloading << for User-Defined Classes

Overloading >> for User-Defined Classes

Manipulators

Stream States

Formatted I/O

Disk Files

Internal Transmission of Data

Reading & Writing Objects

Advanced Topics

Template Functions

Template Classes

Multiple Inheritance

User-Defined Conversions
41

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Lab Content

References

Data Structures

An Iterator Class

Exceptions

Arrays and string

Pointers

Functions

Classes

constructors

lists

public and private access method

destructor

array of object

passing objects to functions

Overloading increment and decrement operators

I/O and files

User defined classes

Advanced topics

2012

Template and exceptions


2. Walter Savitch, Problem solving with C++ - The Object of
programming, Menlo Park: Addison-Wesley, 1996.
5. Dietel&Dietel, C How To Program, Third Edition, Prentice
Hall, 2003
6. Robert Lafore, The Waite Groups programming Using Turbo
C++ Techmedia, 1993
7. John R. Hubrard, Fundamentals of Computing with C++,
Shuams Outline, 1997
8. Jess Liberry, An Introduction to C++ 1995
Robert Lafore, The Wait Group Object Oriented programming With
C++ 1994

Teaching Learning
Methods:

Lectures, Laboratory and Tutorials


42

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Assessment Methods:

2012

Continuous Assessments (60%):


- Lab works
- Quizzes
- Assignment
- Tests
- Project

Final exam-40%

University Logo

Wolkite University
College of Computing and Informatics
Information Technology Department
Module Code
Module Name
Total ECTS of the
module

Objectiveof the
module

ITec_M_05
Advanced Programming
24

The objectives of the module are:


-

Enable students to analyze variety of problems and


generate appropriate algorithmic solutions and explore the
syntax and semantics programming language fundamentals
Enable students to understand and implement varieties of
algorism analysis and implementation techniques
To enable students in identifying and analyzing classes,
relationship between classes and implement using
programming languages
Enable students to apply Rapid Application Development
and visual programming concepts and tools

Course Code

ITec2051
ITec2052
ITec3053
ITec3054

Courses in the Module


Course Name

Data structure and Algorithms


Object Oriented Programming
Event-Driven Programming
Advanced Programming

Credit
Hours
(existing)
4
3
4
3

ECTS (CP)

7
5
7
5
43

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Wolkite University
College of Computing and Informatics
Program/Depart Information Technology
ment
Course Code

ITec2051

Course Title:

Data structure and Algorithms

Degree Program Information Technology


Module Name

Advanced Programming

Module No.

ITec_M_05

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tuto
r

Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

7
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

14

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

1st year Information Technology Students

Year /Semester

Year: II, Semester: II

Pre-requisites

Fundamentals of Programming II

Status of the
Course

Compulsory

44

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Course Outline
Course
Description

Course
Objectives

The goal of the course is to give a basic understanding of how common


computational problems can be solved efficiently on a computer. In general,
the course teaches students how to write fast and efficient programs and
enables them to analyze the efficiency of their programs.
On completion of this course, students should be able to:
Use dynamic memory management in their programs
Implements linked lists, stacks, queues, trees, and graphs
Write programs that utilize complex data structures (lists,
stacks, trees)
Analyze complexity algorithms
Integrate different modules to solve a single problem
Write fully functional programs that consists of multiple files

Course Content
1. Algorithm analysis concepts
Measuring complexity,
complexity of algorithm
big-oh notation and others
2.
Time complexity of known algorithms
Simple algorithms; Sorting and searching
3. Data structures and applications
Linked lists
Queues
Stacks
Trees
Graphs
4. Advanced sorting and searching algorithms
Shell sort
Quick sort
Heap sort
Merge sort
5. Hashing
Lab Content

o
o
o
o

Function and array revision


Simple searching and sorting algorithm
Linked list, Queue, Stack, Trees
Advanced sorting and searching algorithm

References

Algorithms and Data Structures: The Science of Computing by


Baldwin/Scragg. Charles River Media. 2004.
45

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Teaching
Learning
Methods:
Assessment
Methods:

MichaelT.GoodrichandRobertoTamassia,DataStructuresandAlgorith
msinJavaWiley.
Lectures, Laboratory and Tutorials

Continuous Assessments (60%):


- Lab works
- Quizzes
- Assignment
- Tests
- Project

Final exam-40%

46

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Wolkite University
College of Computing and Informatics
Program/Department Information Technology
Course Code

ITec2052

Course Title:

Object Oriented Programming

Degree Program

Information Technology

Module Name

Advanced Programming

Module No.

ITec_M_05

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits (CP)

Contact Hours (per

Lecture

Tutorial

Lab/Practical Home

week)

Total

Study
3

Lecture days, Hours


and Room:
Tutorial/Lab days
and Hours
Target Group:

2st year Infor0mation Technology Students

Year /Semester

Year: II, Semester: II

Pre-requisites

Fundamentals of Programming II

Status of the Course

Compulsory

14

Course Outline
Course Description

The goal of the course is to give a basic of class; data members


&member functions; friends, static members, overloading; inheritance
&composition; virtual functions; virtual base classes; templates;
47

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Objectives

2012

exception handling; File handling; object-oriented design concepts.


Upon completion of this course, students should be able to:
Create Java technology applications that leverage the objectoriented features of the Java language, such as
encapsulation, inheritance, and polymorphism
Execute and run a Java technology application
Use Java technology data types and expressions
Use Java technology flow control constructs
Use arrays and other data collections
Implement error-handling techniques using exception
handling
Create event-driven GUI using Java technology GUI
components: panels, buttons, labels, text fields, and text
areas
Create multithreaded programs
Create JDBC applications

Course Content
Chapter 1: Introduction
Features of Object-Oriented Programming
Object-Oriented Programming vs. Procedural
programming
Object-Oriented Programming Languages
Chapter 2: Classes and Objects
Defining Classes
Access Control (Private, protected, public)
Attributes and methods
Working with Objects
Storage Allocation
o Static, automatic and dynamic memory
allocation
o newand deleteoperators
o Constructors and Destructors
Inline Functions
Friend Functions
String Class
Chapter 3: Pointers and References
Pointers
o Pointers to objects
o this pointer
References
o Defining references
o Passing references as function arguments
48

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

o Returning by references
Chapter 4: Polymorphism
Function overloading
Operator overloading
Chapter 5: Inheritance
Types of inheritance
Derived Classes
pointers to Derived Classes
Constructors in Derived Classes
Virtual Base Classes
Abstract Classes
Virtual Functions
Early vs. late binding
Nesting Classes
Chapter 6: Input/ Output
Formatting Consol I/O
File I/O
o Sequential access files
o Random access files
Chapter 7: Templates and Exception Handling
Templates
o Class template
o Function template
Exception handling
Lab Content
References

Teaching Learning
Methods:
Assessment Methods:

E.Balagurusamy, Object oriented programming with


C++, Tata Mc. Graw Hill

Gary J Bronson , C++ for Engineers and Scientists


R.J.Mitchell, C++ Object Oriented Programming, SpringerVerlag Book Publishing Company.
Lectures, Laboratory and Tutorials

Continuous Assessments (60%):


- Lab works
- Quizzes
- Assignment
- Tests
49

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

- Project

Final exam-40%

University Name
50

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

School/College/Faculty/Institute
Program/Department Information Technology
Course Code

ITec2052

Course Title:

Advanced Programming

Degree Program

Information Technology

Module Name

Advanced Programming

Module No.

ITec_M_05

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits (CP)

Contact Hours (per

Lecture

Tutorial

Lab/Practical Home

week)

Total

Study
3

Lecture days, Hours


and Room:
Tutorial/Lab days
and Hours
Target Group:

1st year Information Technology Students

Year /Semester

Year: III, Semester: I

14

Pre-requisites
Status of the Course

Compulsory
Course Outline

Course Description

This course covers topics on advanced features of programming in Java


which includes introduction, Applets, Java Beans, Servlet
programming, Java database connectivity (JDBC), Java server
page(JSP) fundamentals and Remote Method invocation. Other major
51

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Objectives

2012

topics in this course include Network Programming, Multithreading,


files and Interfaces.
After completion of this course student will be able:
To know the features of Applets and develop Applet
programs
To have a good understanding of threads programming
To know how to program client/server interaction using
Sockets
To expose with the knowledge of manipulating databases
with JDBC
To know the concept of Servlet and how to handle the get
and post requests
To know the concepts of Java Server Page.

Course Content
Chapter 1: Introduction
Features of Object-Oriented Programming
Object-Oriented Programming vs. Procedural
programming
Object-Oriented Programming Languages
Chapter 2: Classes and Objects
Defining Classes
Access Control (Private, protected, public)
Attributes and methods
Working with Objects
Storage Allocation
o Static, automatic and dynamic memory
allocation
o newand deleteoperators
o Constructors and Destructors
Inline Functions
Friend Functions
String Class
Chapter 3: Pointers and References
Pointers
o Pointers to objects
o this pointer
References
o Defining references
o Passing references as function arguments
o Returning by references
Chapter 4: Polymorphism
52

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Function overloading
Operator overloading
Chapter 5: Inheritance
Types of inheritance
Derived Classes
pointers to Derived Classes
Constructors in Derived Classes
Virtual Base Classes
Abstract Classes
Virtual Functions
Early vs. late binding
Nesting Classes
Chapter 6: Input/ Output
Formatting Consol I/O
File I/O
o Sequential access files
o Random access files
Chapter 7: Templates and Exception Handling
Templates
o Class template
o Function template
Exception handling
Lab Content
References
Teaching Learning
Methods:
Assessment Methods:

Lectures, Laboratory and Tutorials

Continuous Assessments (60%):


- Lab works
- Quizzes
- Assignment
- Tests
- Project

Final exam-40%

53

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

University Logo
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module

Objective of the
module

Course Code

ITec1061
ITec2062
ITec2063

ITec_M06
Systems Development and Management
15

The objectives of the module are:

Demonstrate the structural systems analysis and design concepts


and fact finding techniques and describe the information systems
development life cycles (SDLC)
Demonstrate the object-oriented system analysis and design
concepts, tools, techniques
Enable students understand a range of standards, techniques and
tools developed to support software project management and the
production of high quality software
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Structural Systems Analysis and Design
3
5
Object-Oriented System Analysis and
3
5
Design
Information Technology Project
3
5
Management

University Name

Program

Information Technology

Course Code

Itec1061

Course Title:

Structural System Analysis and Design

Degree Program

Information Technology

Module Name

Systems Development and Management

Module No.

IT_M 06

Course Chair
Office location:
54

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Mobile:

2012

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical Home Study

Total

(per week)

10

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

1st Year Information Technology Students

Year /Semester

Year: I, Semester: II

Pre-requisites

None

Status of the
Course

Compulsory

Course
Description

This course will explore the Systems theory; systems thinking; organization

and management; information systems concepts; types of information


systems; roles in IS development; IS development life cycle; information
systems development methodologies; approaches to IS development;
Structured systems analysis and design concepts; Structured analysis; fact
finding techniques; analysis tools and techniques for requirements
structuring. Individual and/or team project involving reports and walkthrough in systems analysis and general design is also a major component
of this course using CASE tools.
Course

General objectives of the course:


55

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Objectives

At the end of the course students will be able to:


Understand the various information system concepts and system
development methodologies

Demonstrate the systems analysis and design concepts

And fact finding techniques


Describe the information systems development life cycles (SDLC)

List alternatives to the systems development life cycle

Demonstrate knowledge of project management terms and


techniques

Course Content
Content
Brief Introduction about the course
Chapter 1. Foundations for systems
development
1.1 Systems development environment
1.2

2012

Date
Week 1

Reference book
Course guide book

Week 2
Week 3
Week 4

Hoffer J. A.,George J.F. and


Valacich J.S. 5th Ed
PP 3-28 and 47-81

Managing the information systems


project

Chapter 2. Systems Panning and Section


2.1 Identifying and selecting Systems
Development projects

Week 5
Week 6

Hoffer J. A.,George J.F. and


Valacich J.S. 5th Ed
PP 100-129

2.2 Initiating and Planning Systems


Development projects
3.1 Structuring System Process
Requirements

Week 7

3.2 Structuring system Logic Requirements

Week 8

Hoffer J. A.,George J.F. and


Valacich J.S. 5th Ed
PP 206-238
Hoffer J. A.,George J.F. and
Valacich J.S. 5th Ed
PP 252-281

Mid Exam
3.3 Structuring System data Requirements

Week 9

Hoffer J. A.,George J.F. and


Valacich J.S. 5th Ed
PP 283-342

56

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Week 10
Week 11

Chapter 4:System design


1.3 Designing databases
1.4

Designing the human interface

Chapter 5: Systems implementation and Week 12


Week 13
Week 14

Maintenance
5.1 System implementation

2012

Hoffer J. A.,George J.F. and


Valacich J.S. 5th Ed
PP 344-387

Hoffer J. A.,George J.F. and


Valacich J.S. 5th Ed
P 520
P560

5.2 Systems Maintaining information


systems
The course project presentation

Week 15

Final Exam

As per schedule of
the School

Methodology
The course will be delivered in lectures (with a participatory approach) - students are encouraged
to ask questions and also they are encouraged to answer whenever questions are raised), present
their assignments in the class and actively participate in the tutorial program.
Assessment Method (continuous):

Lecture 100%

Tutorial

100%

References:

Hoffer J.,George J. ,Valacich J. . (2008). Modern Systems Analysis and Design. 5th
Edition. Pearson Education,Inc.
References :
Jeffery, Whitten et al. 2001. System Analysis and Design Methods , 5th ed. McGraw Hill
Irwin.
Elmasri et al (2004). Fundamentals of Database Systems, 4thed, Pearson education

University Name

Program

Information Technology

Course Code

ITec2062

Course Title:

Object-oriented System Analysis and Design


57

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Degree Program

Information Technology

Module Name

Systems Development and Management

Module No.

06

2012

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical Home Study

Total

(per week)

10

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

2nd Year Information Technology Students

Year /Semester

Year: II, Semester: I

Pre-requisites
Status of the
Course

Compulsory

Course
Description

This course will explore the

Introduction to Object Technology; Principles of

Modeling, Principles of Object Orientation; systems development using the object


technology; Modeling; principles of modeling; requirements gathering and
modeling using use case; techniques of modeling static and dynamic aspects of
systems; finding classes and objects; Interaction Diagrams - sequence and
collaboration diagrams; Class Diagrams; object diagram; activity diagram;
Statechart diagrams; component diagram; deployment diagram. Individual and/or
team project involving reports and walk-through in systems analysis and design is

58

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

also a major component of this course using CASE tools.

Course
Objectives

At the end of the course students will be able to:

Understand the object technology and modeling principles.

Know the techniques of modeling aspects of systems

Analyze user requirements using UML of OO techniques.

Make a detailed design using UML of OO techniques.

Course Content
Content
Brief Introduction about the course

Period
Week 1

Reference book
Course guide book

1.1
OO concepts from structured point of view
o Abstraction, Encapsulation and information
hiding
o inheritance
o Association
o Aggregation
o Collaboration
o Persistence
o Coupling
o Cohesion
o polymorphism
o Interfaces
o components
o Patterns
Chapter 2: Object Orientation the new software paradigm
2.1. The potential benefits of object orientation
2.2. The potential drawbacks of object orientation
2.3. Object standards
2.4. The object orientation software process

Week 2
Week 3
Week 4

Object Primer Scott Ambler


2nd Edition
Pp 133-180

Week 5
Week 6

Object Primer Scott Ambler


2nd Edition
pp 9-30

Chapter 3: Gathering user requirements

Week 7
Week 9

Object Primer Scott Ambler


2nd Edition
pp 31-108

Chapter 1: Understanding the Basics :Object oriented concepts

3.1. Putting together requirements gathering team


3.2. Fundamental requirements gathering techniques
3.3. Essential Use Case Modeling
3.4. Essential User Interface Prototyping
3.5. Domain modeling with class responsibility collaborator
(CRC) cards
3.6. Developing a supplementary Specification
3.7. Identifying Change Cases

59

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

validation Techniques
4.1. Testing Early and Often
4.2. Use Case Scenario Testing

Week 10

Object Primer Scott Ambler


2nd Edition
Pp109 -132

Chapter 5: Determining What to Build: OO Analysis


5.1. System Use Case Modeling
5.2. Sequence Diagrams: From Use Cases to Classes
5.3. Conceptual Modeling :Class diagrams
5.4. Activity diagramming
5.5. User interface prototyping Evolving your
supplementary specification
5.6. Applying Analysis patterns Effectively
5.7. User Documentation
5.8. Organizing your models with packages
Chapter 6 : Determining How to Build Your System: OO Design
6.1. Layering your models :Class Type Architecture
6.2. Class Modeling
6.3. Applying Design Patterns Effectively
6.4. State chart modeling
6.5. Collaboration Modeling
6.6. Component Modeling
6.7. Deployment Modeling
6.8. Rational Persistence Modeling
6.9. User Interface Design
Chapter 7: Object Oriented Testing

Week 11
Week 12

Object Primer Scott Ambler


2nd Edition
Pp 181-248

Week 13

Object Primer Scott Ambler


2nd Edition
Pp 249-346

Week 14

Object Primer Scott Ambler


2nd Edition
Pp 403-426
Object Primer Scott Ambler
2nd Edition
Pp 427-437

Chapter 4:Ensuring Your Requirements Are correct: Requirement

Chapter 8 : Software process

Project Presentation

Week 15
Week 16

Methodology
The course will be delivered in lectures (with a participatory approach) - students are encouraged to ask
questions and also they are encouraged to answer whenever questions are raised), present their
assignments in the class and actively participate in the tutorial program.
Assessment Method (continuous):

Lecture 100%
Tutorial 100%

Text book

Ambler, S. W. (2001).The Object primer: The Application Developers Guideto Object


Orientation and the UML Second edition .New York. Cambridge University Press
60

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

References

Booch G., (2000).Object oriented analysis and design with applications, Second Edition,
Pearson Education,Inc.
Hoffer J.,George J. ,Valacich J. . (2008). Modern Systems Analalysis and Design. 5th
Edition. Pearson Education.
Subburaj R. (2003).Object Oriented with C++ ANSI/ISO Standard.Vikas Publishing
House PVT LTD.
Priestley M. (2003).Practical Object oriented Design with UML. second Edition
McGraw-Hill Education.
University Name

Program

Information Technology

Course Code

ITec2063

Course Title:

Information Technology Project Management

Degree Program

Information Technology

Module Name

Systems Development and Management

Module No.

06

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical Home Study

Total

(per week)

10

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
61

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Target Group:

2nd Year Information Technology Students

Year /Semester

Year: II, Semester: I

2012

Pre-requisites
Status of the
Course

Compulsory
Course Outline

Course
Description

This course will introduce the area of Information Technology project


management, presenting basic techniques and approaches and aiming to
develop a critical awareness of the challenges and shortcomings of the area.
IT Project Management is an important area of study since most non-trivial
software development efforts will be make use of some type of project
management approach in an aim to manage the development process in
such a way that the software meets its requirements and is on-time and
within budget.

Course
Objectives

At the end of the course students will be able to:

Course Content

Understand the issues involved in IT project management and the


factors that affect software quality;
Familiar with a range of standards, techniques and tools developed to
support IT project management and the production of high quality
software;
Develop IT project plans, supporting software quality plans and risk
management plans.
Capable of actively participating or successfully managing a software
development project by applying project management concepts
Demonstrate knowledge of project management terms and techniques

Lecture Topics

Reading/
Assignments

62

Undergraduate Information Technology Program National Harmonized Modular Curriculum

1) Introduction to IT Project Management


1.1. Importance of IT project management
1.1.1 What is a project?
1.1.2 Problems with IS Projects
1.1.3 What is Project Management?
1.2. Stages of Project
1.2.1. The Feasibility Study
1.2.1.1 The Cost-benefit Analysis
1.2.2. Planning
1.2.3. Project Execution
1.2.4 Project and Product Life Cycles
1.3. The Stakeholder of a Project
1.3.1 All parties of a project
1.3.2 The Role of Project Manager
1.4. Project Management Framework
1.5. Software Tools for Project Management

2) Project Planning
2.1. Integration Management
2.1.1 What is Integration Management
2.1.2. Project Plan Development
2.1.3. Plan Execution
2.2 Scope Management
2.2.1 What is Scope Management?
2.2.2 Methods for Selecting Projects
2.2.3 Project Charter
2.2.4 Scope Statement
2.2.5 Work Breakdown Structure
2.3 Stepwise Project Planning
2.3.1 Overview of Project Planning
2.3.2 Main Steps in Project Planning

3) Project Scheduling
3.1 Time Management
3.1.1. Importance of Project Schedules
3.1.2. Schedules and Activities
3.1.3. Sequencing and Scheduling Activity
3.2. Project Network Diagrams

2012

R1 pp 4-11
R1 pp 12-28
R1 pp29-38
R1 pp39-50

R1 pp51-64

Reading:
R1 pp65-82

Reading:
R1 pp83-94

Mid Exam
4) Project Cost Management
4.1. Importance and Principles of Project Cost
Management
4.2. Resource Planning
4.3. Cost Estimating
4.4. Cost Budgeting
4.5 Cost Control

Reading:
R1 pp95-106

63

Undergraduate Information Technology Program National Harmonized Modular Curriculum

5) Project Quality Management


5.1 Quality of IT Projects
5.2 Stages of IT Quality Management
5.2.1 Quality Planning
5.2.2 Quality Assurance
5.2.3 Quality Control
5.3 Quality Standards
5.4
Tools and Techniques For Quality Control

6) Project Human Resources Management


6.1. What is Project Human Resources Management?
6.2 Managing People
6.3. Organizational Planning
6.4. Issues in Project Staff Acquisition and Team
Development

7) Project Communication Management


7.1. Communications Planning
7.2. Information Distribution
7.3. Performance Reporting
7.4. Administrative Closure
7.5. Suggestions for Improving Project communications

8) Project Risk Management


8.1. The Importance of Project Risk Management
8.2. Common Sources of Risk in IS projects
8.3. Risk Identification
8.4. Risk Quantification
8.5. Risk Response Development and Control

9) Project Procurrent Management


9.1. Importance of Project Procurrent Management
9.2. Procurrent Planning
9.3. Sollicitation
9.4. Source Selection
9.5. Contract Administration

2012

Reading:
R1 pp107-116

Reading:
R1 pp117-126

Reading:
R1 pp127-146

Reading:
R1 pp147-160

Reading:
R1 pp1-30

9.6. Contract Close-out

10) Project Management Process Groups


10.1 Introduction to Project Management Process
Groups
10.2. Project Initiation
10.3. Project Planning
10.4. Project Executing
10.5. Project Controlling and Configuration
Management
10.6. Project Closing

Reading:
R1 pp 4-11
R1 pp 12-28

R1 pp29-38
64

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Methodology
Three lecture hours are scheduled per week for this course. These hours are fully used to lecture
the course. Students will be asked to read certain topics on their own before a class discussion.
As part of this courses assignment the class will be divided into groups. At the end of the
course, each group in the class is supposed to do assignments and present it in class.The delivery
of the project is subjected to deadline. No extensions will normally be granted for the deadline.
There will be midterm exam for this course. Final examination will be given on the dates
specified by the University. The examinations will focus on understanding and applying the
concepts taught in class and in tutorial sessions of the course. The following topic deals with the
details of the assessment methods of the course.

Assessment Methods (Continuous)

Lecture 100%
Tutorial 100%

Reference books

A Guide to the Project Management Body of Knowledge, Project Management Institute,


Pennsylvania, USA (2000)
Information Technology Project Management Kathy Schwalbe, International Student Edition,
THOMSON Course Technology, 2003
Basics of Software Project Management, NIIT, Prentice-Hall India, 2004
Software Project Management in Practice, PankajJalote, Pearson Education, 2002
Software Project Management, A Concise Study, S.A.Kelkar, Revised Edition, Prentice-Hall
India, 2003

University Logo
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module

Objective of the
module

ITec_M07
Database Systems
12

The objectives of the module are:

Develop an understanding of the different database models


Understand the basic principles of database design systems using
65

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Code

ITec2071
ITec2072

different database models


Design and create databases, tables, views, triggers and indices.
Write SQL queries and database programs
Design a distributed database system in homogenous and
heterogeneous environments
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Fundamentals of Database Systems
3
5
Advanced Database Systems
4
7
University Name

Program

Information Technology

Course Code

ITec2071

Course Title:

Fundamentals of database Systems

Degree Program

Information Technology

Module Name

Data and Information Management

Module No.

ITec_M07

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

Lecture

(per week)

Tutorial

Lab/Practical

Home Study

Total

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
66

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Target Group:

2nd Year Information Technology Students

Year /Semester

Year: II, Semester: I

Pre-requisites

ITec1011

Status of the
Course
Course Outline

Compulsory

Content

2012

Week

Chapter 1: Introduction

Introduction to database system

File based verses Database approach

Characteristics of the Database Approach

Users and actors of Database system

week 1 and week 2

Chapter 2: Database System Architecture

Data Models, Schema and Instances

DBMS Architecture and Data Independence

Database Language and Interface

The Database System Environment

week 3 and week 4

Classification of DBMS

Chapter 3: Database Modeling

The high-level conceptual model

Entity types and Sets, Attributes and Keys

Relationships, Associations, Roles and Structural Constraints

E/R Diagram naming conventions, and Design issues

Mapping ER-models to relational tables

Chapter 4: Enhanced Entity Relationship and Object modeling

Subclass, Super-class and Inheritance

Specialization and Generalization

Constraints and Characteristics of Specialization and

week 5 and week 6

week 7

67

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Generalization

Chapter 5: Functional Dependency and Normalization

Purpose of Normalization

Information redundancy and update anomalies

Functional Dependency

Normalization

week 8 and week 9

Chapter 6: |The Relational Data Model and the Relational Algebra

The Relational Model Concepts

The Relational Constraints and Relational Database Schemas

The Relational Operations

Chapter 7: Record Storage and Primary File Organization

Introduction

Operations on Files

Files of Unordered Records (Heap Files)

Files of Ordered Records (Sorted Files)

Hashing Techniques

week 10 and week


11

week 12, 13, and


week 14

Index Structure for Files

Types of Single level Ordered Index

Dynamic Multilevel indexes using B-Trees and B+ Trees

Indexes on Multiple Indexes

Chapter 8: Structured Query Language(SQL)

Data Definition Language

Data Manipulation Language

Basic SQL Queries

Views

week 15 and week


16

Lab Content:
68

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

The lab should be given using the current DBMS technology


Create database
Create table, primary key, foreign key, relationship, etc
Create view
Retrieve Data
Using aggregate functions
Formatting data, Etc

Methodology
The course will be delivered in lectures (with a participatory approach with particular attention to
encourage students in asking questions and answering), present their assignment and actively
participate in the lab session.
Assessment Method (Should be continuous):
Lecture 100%
Lab 100%

University Name

Program

Information Technology

Course Code

ITec2072

Course Title:

Advanced Database Management

Degree Program

Information Technology

Module Name

Data and Information Management

Module No.

ITec_M07

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
69

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Mobile:

2012

; e-mail:

Content
Brief Introduction about the course

Week
Week 1

Reference book
Course guide book

Consultation Hours:
ECTS Credits
(CP)
Contact Hours
(per week)

6
Lecture
2

Tutorial
0

Lab/Practical Home Study


6

Total

14

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

2nd year Information Technology Students

Year /Semester

Year: II, Semester: II

Pre-requisites

ITec2071

Status of the
Course

Compulsory

Course
Description

This course covers file organizations, storage management, query optimization,


transaction management, recovery, and concurrency control, database
authorization and security. Additional topics include distributed databases, mobile
databases, and integration may also be covered. A major component of the course
is a database implementation project using current database languages and
systems.

Course
Objectives

At the end of this course the students will be able to:


Understand the database query processing and optimization
Know the basics of transaction management
Understand database security
Use different recovery methods when there is a database failure
Design a distributed database system in homogenous and
heterogeneous environments

Course Content

70

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Chapter 1: Query processing and Optimization


Translating SQL Queries into Relational Algebra
Basic Algorithms for Executing Query Operations
Using Heuristic in Query Optimization
Using Selectivity and Cost Estimates in Query
Optimization
Semantic Query Optimization
Chapter 2: Database Security and
Authorization
Introduction to DB Security Issues
Discretionary Access Control Based on Granting
/Revoking of Privileges
Mandatory Access Control for Multilevel Security
Statistical DB Security
Chapter 3: Transaction Processing Concepts
Introduction
Transaction and System Concepts
Properties of Transaction
Schedules and Recoverability
Serializability of Schedules
Transaction Support in SQL

2012

Week 2,3 and


4

Elmasri and Navathe


pp 512- 534

Week 5 and 6

Elmasri and Navathe


pp 616-626

Week 7 and 8

Elmasri and Navathe


pp 551 -562

Week 10,11
and 12

Elmasri and Navathe


pp 575-592

Week 13 and
14

Elmasri and Navathe


pp 597-610

Week 15 and
16

Elmasri and Navathe


pp 657-674

Week 9 Mid Term Examination


Chapter 4: Concurrency Control Techniques
Locking Techniques for Concurrency Control
Concurrency Control Based ON Timestamp Ordering
Multiversion Concurrency Control Techniques
Validation (Optimistic) Concurrency Control Technique
Granularity of Data Items and Multiple Granularity
Locking
Using Locks for Concurrency Control in Indexes
Chapter 5: Database Recovery Techniques
Recovery Concepts
Recovery Concepts Based on Deferred Update
Recovery Concepts Based on Immediate Update
Shadow Paging
The ARIES Recovery Algorithm
Recovery in Multidatabase Systems
Chapter 6: Distributed Database System
Distributed Database Concepts
Data Fragmentation, Replication, and Allocation
Techniques for Distributed database Design
Types of Distributed Database Systems
Query Processing in Distributed Databases
An over view of Client- Server Architecture and its
Relationship to Distributed database

Chapter 7: Spatial /multimedia/mobile databases


Spatial data model spatial queries- multimedia data sourcesmobile databases-data processing
71

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Chapter - Seven.: Web- based databases


Databases on www-providing access to databases web
integration-Open problems with web databases
Chapter Nine: Data Warehousing
Introduction, Data Warehouse, Multidimensional
Data Model, Data Warehouse
Architecture,
Implementation, Further Development, Data Warehousing to
Data Mining

Lab Content:

The lab should be given using the current DBMS technology


Function
Trigger
Security
Transaction
Stored Procedure
Spatial Database
Replication

Methodology
The course will be delivered in a participatory approach with particular attention to encourage
students in asking questions, present their assignment and actively participate in the lab.
Assessment Method (should be continuous):
Lecture 100%
Lab
100%
Text Book
Elmasri et al (2004). Fundamentals of Database Systems, 4thed, Pearson education
References
1 Thomas M. Connolly and Carolyn E.Begg. (2004). A step by step approach to building
databases, 2nded.Pearson Education Limited.
2 Ramon A ,etal. Shaums outlines, fundamentals of relational databases
72

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

3 David M. Kroenke. (1998). Database processing, 6th ed. Prentice Hall


4 Van der Lans (2006). Introduction to SQL, Mastering the relational database language.
3rd ed. London, Addis Wesley
5 Silbershatz A. Korth H andSundarshan (2006). Database System concepts, 5th ed. Boston,
McGraw Hill
6 RamaKrishman(1998). Database Management Systems. Boston McGraw Hill
7 Namdagopalan (2003). Database Management Systems with oracle and vb.Gandhinagar,
Appa Book house.
8 Date, .J (1981). An Introduction to Database systems. 3rd ed. Vol. 1. New Delhi. Narosa
publishing House

University Logo
University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module

Objective of the
module

IT_M 08

Database and Information Management


13

The objectives of the module are:

To acquaint students with the various indexing, matching,


organizing and evaluating strategies developed for information
retrieval (IR) systems

Understand spatial database

Manage and administer database


Courses in the Module

Course Code

ITec3081
ITec4082
ITec4083

Course Name

Information Storage and Retrieval


Spatial Database Systems
Database Administration

Credit
ECTS (CP)
Hours
(existing)
3
5
2
3
3
5
73

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Name

Program

Information Technology

Course Code

ITec3081

Course Title:

Introduction to Information Storage and Retrieval

Degree Program

Information Technology

Module Name

Database and Information Management

Module No.

ITec_M08

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

3rd year Information Technology Students

Year /Semester

Year: III, Semester: II

Pre-requisites
Status of the
Course
Course
Description

Compulsory
This course will uncover introductory concepts of Information Storage and
Retrieval; automatic text operation including automatic indexing; data and file
structure for information retrieval; retrieval models; evaluation of information
retrieval systems and techniques for enhancing retrieval effectiveness; query
languages, query operations, string manipulation and search algorithms; Current

74

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Issues in IR etc.

Course Objective

At the end of the course students will be able to:

Understand the various


processes

Know the retrieval model and evaluation of Information Retrieval


Systems

Understand the processes of information storage and retrieval

Design ,develop and evaluate information retrieval models

Understand evaluation issues in IR

Understand current issues in IR

Information Retrieval Systems and

Introduction to ISR (Chapter One)

IR and IR systems

Data versus information retrieval

IR and the retrieval process

Basic structure of an IR system

Text/Document Operations and Automatic Indexing (Chapter Two)

Course Outline

Index term selection (Luhns selection and Zipfs law in IR)

Document pre-processing (Lexical analysis, Stop word Elimination,


stemming)

Term extraction (Term weighting and similarity measures)

Indexing Structures (Chapter Three)

Inverted files

Tries, Suffix Trees and Suffix Arrays

Signature files

IR Models (Chapter Four)

Introduction of IR Models

Boolean model

Vector space mode

75

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Probabilistic model
Mid Exam

Retrieval Evaluation (Chapter Five)

Evaluation of IR systems

Relevance judgment

Performance measures (Recall, Precision, etc.)

Query Languages (Chapter Six)

Keyword-based queries

Pattern matching

Structural queries

Query Operations (Chapter Seven)

Relevance feedback

Query expansion

Current Issues in IR (Chapter Eight)

Research in IR (Multimedia Retrieval, Web Retrieval, Question


answering. etc.)

Lab:
Using Python or Perl or any language demonstrate on tokenization, stemming, lexical analysis,
etc
Methodology
For this course three lecture hours and three tutorial hours are scheduled per week. Students are
expected to read topics in advance. Participation in class and discussion is anticipated from the
students.
Assessment method (Continuous):
Lecture 100%
Lab

100%

Text Book
76

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Ricardo A. Baeza-Yates, Berthier Ribeiro-Neto, Modern Information Retrieval, ACM Press,


1999.

OtherReference Books:

Salton, G. and McGill, M. J. Introduction to Modern Information Retrieval, McGraw-Hill


Co., 1983.

Robert R. Korfhage, Information Storage and Retrieval, John Wiley and Sons, 1997.

C. J. Van Rijsbergen. Information retrieval. London: Butterworths, 1979.(available at:


http://www.dcs.gla.ac.uk/~iain/keith/)

Information Retrieval: Data Structures and Algorithms by W. B. Frakes and R. Baeza-Yates


(Eds.) (Prentice-Hall) 1992, ISBN 0-13-463837-9.

Sprck Jones, K. and Willett, P. (eds.). Readings in information retrieval. San Francisco:
Morgan Kaufmann, 1997.

Department of Information Technology


Course Code
Course Title
Degree Program
Module
Module coordinator
Lecturer
ECTS Credits
Contact Hours (per
semester)

ITec4083
Database Administration
B. Sc. in Information Technology
TBA
TBA
5
Lecture

Lab

Tutorial proj present Evaluat Home


ect ation
ion
study
2
3
0
5
After completing this course the students will be able to
know:
Know general structure of database servers
Install and configure a database server

Course Objectives to be
Acquired

Describe need for security of servers


Maintain tables of the database
Create and manage database users
Secure the server
Perform backup and recovery of the server
Perform query optimization

77

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

This course is designed to give students the knowledge and skills


needed to maintain successful and efficient day-to-day
operations of databases and services. Administrators will gain
practical experience in setting up, administering, optimizing and
troubleshooting databases. They will gain an understanding of
the archITECture of a database. They will be able to ensure the
integrity and availability of a company's data within the database
environment.

Course contents:
Database ArchITECture
Installing and Configuring a database server
Starting, Stopping a database server
Security-Related Configuration
Database Creation
Course
Description/Course
Contents

Client Programs for DBA Work


Locking
Storage Engines
Table Maintenance
The Information Schema Database
Backup and Recovery
Stored Procedures
User Management
Securing the Server
Optimizing Queries
Optimizing Schemas
Optimizing the Server
Interpreting Error Messages
Optimizing the Environment

78

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Lab classes:

. Installing Database Server

SQL Server components

File particulars

The code

Installation

SQL Server security

Creating and configuring database roles

Creating and configuring logins

Creating and configuring users

SQL Server access

Creating a SQL Server database

Create database

Alter database

SQL Server advanced concepts

Locking

Isolation

SQL Server Lock management

Information schema database

Schema Definition

Assertion

Domains

Views

Stored procedures

Create stored procedures

Alter Stored procedures

Dropping Stored procedures

Query optimization and query processing

Error management

SQLCODE and SQLSTATE


79

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Pre-requisites
Semester
Status of Course
Teaching &Learning
Methods

2012

SQL statement codes

Year IV, Semester I


Compulsory
Lectures ,Lab, tutorial
85% during lecture and 100% in Lab

Attendance
Assessment
(Continuous)

Lecture 100%
Lab
100%
Oracle DBA Made SimpleOracle database administration
techniques Mike Ault
MySQL Database AdministrationSams PublishingPaul

References

Dubois

University Logo
University Name
Information Technology Program
Module Code
Module Name
Total ECTS of the
module

Objective of the
module

Itec_M 09

Web Systems and Technologies


13

The objectives of the module are:


To provide students with a working knowledge of Internet
terminology and services including e-mail, WWW browsing, search
engines, ftp, file compression, and other services using a variety of
software packages. Provides instruction for basic server
administration tasks related to Internet Service provision.
Learning Outcome:
To Obtain Capability to develop static and dynamic websites.

To achieve skills to Create Server/client side scripts,


commercial and scientific programs, Design the network
80

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

security enhancing applications.

An ability to analyze a web based problem, and identify and


define the requirements appropriate to its solution

An ability to design, implement, and evaluate a web based


program to meet desired needs
An ability to use current techniques, skills, and tools
necessary for internet programming
To possess skills to do Web Server programming, Develop
E-commerce Implementations.

Courses in the Module


Course Name

Course Code

Fundamentals of Internet
Programming
Advanced Internet Programming

ITec2091
ITec3092
ITec3093

E-Commerce

Credit
ECTS (CP)
Hours
(existing)
3
5
3
2

5
3

University Name
School/College/Faculty/Institute
Program

Information Technology

Course Code

ITec2091

Course Title:

Fundamentals of Internet Programming

Degree Program

Information Technology

Module Name

Web Systems and Technologies

Module No.

09

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:
81

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

2nd Year Information Technology Students

Year /Semester

Year: II, Semester: II

Pre-requisites

Fundamental of programming I

COURSE DESCRIPTION

Overview of Internet and World Wide Web Technology: Client-server architecture: Web server and security.
HTTP Protocol; Web page design and development; information architecture and visualization; static and
dynamic pages, client side programming using hypertext and scripting languages (HTML, JavaScript); serverside programming (PHP and Java); web-based database application development.Advanced Web applications
and Web service development. In general this course addresses issues like: What is the basic architecture of the
Internet? How does it really work? What is client-server architecture? What are the standards and protocols
used in the communication? How do we develop web applications? What are client side and server side
scripting paradigms? How to handle database communication, sessions and cookies? What are the available
technologies and frameworks?

OBJECTIVES OF THE COURSE

After completing this course the student shall be able to

To understand web protocols , Design and development of static and dynamic pages

To develop an understanding of the technology and protocols underlying World Wide Web.

To become familiar with the common tools and techniques for developing Web-based
applications, both client-side and server-side.

To develop a working knowledge of HTML, JavaScript, PHP, JSP and Servlets as languages for
developing Web applications.

To become familiar with web-based database application development.

Use CSS on web pages

82

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Note:-Lecture notes will be uploaded to this course group website http://groups.google.com/group/IntEng. To join
this group you need to have a Google mail account so that you can download, use mail group and forum. And also
all the laboratory sessions exercises will be posted on the above link.

SCHEDULE OF LECTURE TOPICS AND READINGS

Topic/chapter

Lab
Session

Reading/assignments

Week

Internet Technologies and Protocols

LAB1

- Ref 7, pages 23 176


http://en.wikipedia.org/wiki/World_Wide
_Web

1. Overview of the Internet


2. World Wide Web
3. Client-server architecture

http://net.tutsplus.com/tutorials/htmlcss-techniques/20-html-forms-bestpractices-for-beginners/

4. How the Web works?


5. Hypertext Transfer Protocol (HTTP

http://www.lib.berkeley.edu/TeachingLib/
Guides/Internet/Evaluate.html

1.0/HTTP 1.1/secure HTTP)

6. Other Web protocols (FTP, SMTP,


...)

http://net.tutsplus.com/articles/general/su
ggestions-for-creating-step-by-step-webdevelopment-tutorials-for-nettuts/

7. Web content validation


8. Website evaluation

- Ref 7, pages 223 376

(readability, layout, coloring, trust)

- Reading assignment1 on port numbers


and their description.
-evaluating one of or website as per the
lesson learned.

HTML

1. General concepts of Web design


2. Basics of HTML
3. HTML tags and their attributes

LAB2

- Ref 1, pages 89 245


http://www.htmlgoodies.com/primers/htm
l/article.php/3478131
http://csciwww.etsu.edu/tarnoff/ntes1710.
html

4. Text formatting with HTML and


background changing

83

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

5. HTML frames implementations,


pros and cons

6. Tables in HTML
7. Forms in HTML
3

Style Sheets

LAB3

o http://www.w3.org/TR/REChtml40/present/styles.html#h-14.4.1

1. Adding style to HTML

o http://www.w3.org/TR/CSS2/aural.h

2. types of CSS styles (Inline,

tml

Embedded, and External


Style Sheets)

Assignment 1

3. Cascading style sheets


4. Media-dependent cascades
(Aural, screen, and print style
sheets)

JavaScript

LAB4

- Ref 2, pages 29 -79


http://homepage.ntlworld.com/kayseycarv
ey/index.html

1. Introduction
2. Language Format
3. data types and primitives
4. Hello world in JavaScript

1. Java script code/commands

LAB5

-Ref 2, pages 81 128

LAB6

http://en.wikipedia.org/wiki/Document_O
bject_Model

2. Functions in JavaScript
3. Assigns function to event
4. Sessions and cookies using
JavaScript
6

Using JavaScript on HTML forms

1. Form methods and properties


2. the DOM model(Window,
Document, forms and elements )

Assignment 2 upgrade
assignment using java script

the

first

3. Events (onsubmit() ..)


4. Interacting with form elements
84

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Server-side programming Introduction to


server-side programming and server-side
programming languages

LAB 7

2012

- Ref 3, pages 10 55
- Reading assignment 2 advantages of
server siding scripting

-web servers, execution engines, and


their installation

Basics of PHP

PHP Pros and Cons

Setting up your environment

(Directory structure, Error handling and


Debugging)

8
9

10

11

Midterm Examination, from all topics HTML and JavaScript


Elements of PHP

PHP variables and arrays

Control flow

Patterns for processing HTML


forms

Understanding $_GET, $_POST,


$_SESSION and other PHP superarrays

Dynamically generating HTML

Functions and String Manipulation

built-in functions

User-defined functions

Arranging function in separate


'include' files: code libraries.

String manipulation

File uploading and downloading

More about debugging and error


handling

PHP and MySQL

LAB 9

- Ref 3, pages 57-78


- delivery of reading assignment from
the previous week

LAB 10

- Ref 3, pages 79 104


-Ref 3, pages 105 128

- Submit assignment 2
- Assignment 3

LAB 11

-Ref 3, pages 129 155

85

Undergraduate Information Technology Program National Harmonized Modular Curriculum

12

PHP's customized MySQL


functions

Creating the database schema

Connecting to the database

Inserting and Updating data

Sessions and Cookies in PHP

2012

-Ref 3, pages 241 263


-Ref 3, pages 265 283

LAB 12

o http://www.nerdparadise.com/te

What is a session?

Dependencies on the php.ini file

Understanding PHP session


variables

Create a PHP session variable

Register and modify PHP session


variables

o http://devzone.zend.com/article/

Putting PHP session IDs in pages

o http://php.about.com/od/advanc

Good Practice with sessions and


PHP

edphp/ss/php_sessions.htm

Cookie properties

Setting a cookie in PHP

ch/coding/php/beginners9/

o http://www.learnphptutorial.com/Sessions.cfm

o http://www.tizag.com/phpT/php
sessions.php
646

10 Retrieving PHP cookies

13

Content Management Systems (CMSs)


and their applications.

LAB 13

Currently available Commercial


and open source CMSs.

http://cms-softwarereview.toptenreviews.com/

http://blog.webdistortion.com/2
008/05/17/13-free-cms-optionsfor-web-design-professionals/

http://net.tutsplus.com/tutorials/
other/intro-to-drupal-build-asimple-cms/
Assignment 4

14

Introduction to Advanced Topics on Web


Engineering

No Lab

- To be covered by a Guest Lecturer

Assignment
presentatio

86

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Web services

Semantic Web

RSS and ATOM

Captcha

workflow Languages

2012

Lab Contents:
o Using internet
o Cascading style sheet
o Creating table, special
character, links, lists
o Using html tags, xml tags
o Designing webpage,
multimedia integrated with
flash and adobe
15

Students Assignment presentation

16

Final Exam

READING ASSIGNMENTS

1. Reading Assignment 1: We will be discussing some of the basic network communication port numbers.
You have to read about and summarize the other port numbers and present your work in class. You need
to submit a printed copy of your summary.
Due date: 3rd week
2. Reading Assignment 2: Read about the different types of server side scripting languages and analyze
their advantages and disadvantages. You have to submit a printed copy of your analysis.
Due date: 6th week
3. Assignment 3: CGI is one of the most common server side scripting paradigms. In this assignment you
need to write a detailed summary of CGI: what it is, how it works, and what languages are used in CGI. In
addition, discuss add-on and plug-ins. You are required to submit a printed copy and present your work in
class.
Due date: 9th week

87

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

8. Course/Group project: Due date: 15th week

SUMMARY OF COURSE ASSIGNMENTS, TEST AND EXAM:


Assignments 35%
Midterm examination ... 20%
Final examination ..45%
Project and Lab Exercise 100%

Reference:
1.

HTML, Black Book, by Holzner

2.

JavaScript Bible 6th edition by Danny Goodman and Michael Morrison

3.

PHP and MySQL Web development by Luke Welling and Laura Thomson

4.

JavaScript for the World Wide Web by Tom Negrino and Dori Smith

5.

PHP5 and MySQL Bible by Tim Converse and Joyce Park with Clark Morgan

6.

The Internet and Its Protocols : A Comparative Approach (The Morgan Kaufmann Series in
Networking) by Adrian Farrel

7.

Computer Networking with Internet Protocols and Technology by William Stallings

University Name
School/College/Faculty/Institute
Program

Information Technology

Course Code

ITec3092

Course Title:

Advanced Internet Programming

Degree Program

Information Technology

Module Name

Web Systems and Technologies

Module No.

09

Course Chair

88

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)

Contact Hours
(per week)

Lecture

Tutorial

Lab/Practical

Home Study

Total

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

3rd Year Information Technology Students

Year /Semester

Year: III, Semester: I

Pre-requisites
Status of the
Course

ITec3091

Compulsory

COURSE DESCRIPTION

This course is a continuation of Internet Programming. It deals with web application development
using an enterprise application framework focusing on server side scripting. Topics overed include an
introduction to basic syntax, the development environment, state management, eb controls, connecting
web page to database, Web Services, security and design web page for E-commerce.

OBJECTIVES OF THE COURSE

89

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

After completing this course the student shall be able to

Understand server side scripting

Develop web-based applications

Create Forms on Websites

Connect WebPages to databases

Design web page for e-commerce

TENTATIVE SCHEDULE OF LECTURE TOPICS AND READINGS

Topic/chapter

Lab
Session

Reading/assignments

Week

Unit 1: Server Side Scripting LAB 1


Basics

Ref 4, pages 2 8

1.1.

http://www.w3schools.com/web/web_scrip
ting.asp

1.2.

http://www.w3schools.com/php/php_synta
x.asp

Introduction to serverside scripting


Server-side scripting
languages

1.3.

http://www.ozzu.com/programmingforum/brief-comparison-server-sidescripting-langauges-t90248.html

Use Basic Syntax

1.4.

Send Data to the Web


Browser

Ref 1, pages 6-31

1.5. Write Comments


2

Ref 2, pages 11-13


LAB 2

1.6.

Utilize Variables

1.7.

Manipulate Strings

1.8.

Manipulate Numbers

1.9.

Work with constants

Ref 5, pages recipe 1.1-recipe 3.17


http://www.w3schools.com/php/php_varia
bles.asp
http://www.w3schools.com/php/php_string
.asp

90

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Unit 2: HTML Forms and Server


Side Scripting

LAB 3

2012

Assignment 1
Ref 2, pages 44-55

2.1. Use Conditionals and


Operators

Ref 5, pages recipe 9.1-recipe 9.18

2.2. Validate Form Data

Ref 1, pages 34-54

2.3. Send Values to a Script


Manually

http://www.w3schools.com/php/php_forms
.asp

2.4. Work with Forms and


arrays of data

http://www.w3schools.com/php/php_get.as
p

2.5. Use For and While Loops

http://www.w3schools.com/php/php_post.a
sp

2.7. Create a Simple Form


using PHP

LAB 4

Ref 1, pages 55-88

LAB 5

Ref 2, pages 105-128

2.8. Use Get or Post

2.9. Receive Data from a Form in


PHP

Ref 5, pages recipe 22.1-recipe 9.10

2.10. Introduction to regular


expressions

Unit 3: Files and Directories

LAB 6

Ref 5, pages recipe 23.1-recipe 23.22

3.1. Write to Files


3.2. Read from Files

Ref 5, pages recipe 24.1-recipe 23.13

3.3. Create Directories

3.4. Upload Files


3.5. Rename and Delete Files
and Directories

LAB 7

http://www.w3schools.com/php/php_file_u
pload.asp
http://www.w3schools.com/php/func_files
ystem_delete.asp

Mid Exam

91

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Unit 4: Connecting to Databases

LAB 8

4.1. Connect to an existing


Database

Ref 5, pages recipe 10.1-recipe 10.16

4.3. Retrieve Data from a


Database
4.4. Modify Existing Data

LAB 9

4.5. Remove Existing Data

Unit 5: Cookies and Sessions


5.1. Describe the stateless
model

LAB
10

LAB
11

5.5. Create and Read data


from Cookies

5.7. Maintain session data


using Cookies
5.8. Add Parameters to a
Cookie

http://www.tizag.com/phpT/phpsessions.ph
p
http://www.tizag.com/phpT/phpcookies.ph
p

5.6. Destroy a session

13

Ref 5, pages recipe 8.1-recipe 8.18

http://www.w3schools.com/php/php_cooki
es.asp

5.3. Create and Read data


from sessions
5.4. Putting PHP session
IDs in pages

Ref 2, pages 479-494

http://www.w3schools.com/php/php_sessio
ns.asp

5.2. Explain the concepts of


maintaining state
with sessions

12

http://www.w3schools.com/php/php_mysql
_intro.asp
Ref 5, pages recipe 10.1-recipe 10.16

4.6. Data base security


using server side
scripting

11

Assignment 2

http://www.w3schools.com/php/php_mysql
_intro.asp

4.2. Send Data to a


Database

10

2012

LAB
12

Ref 8, pages 375-387

Ref 8, pages 356-373

5.9. Delete a Cookie

92

Undergraduate Information Technology Program National Harmonized Modular Curriculum

14

Unit 6: Introduction to CMS

6.1.

Overview of
Content Management
Systems (CMS) Using
Joomla

LAB
13

2012

Ref 6, pages 17-305


Ref 7, pages 11-146
http://www.joomla.org/

6.2.

Installation of
Joomla

6.3.

The Joomla
elements

15

6.4.

Joomla! Back-end

6.5.

Joomla! Front end

6.6.

Joomla! Templates

LAB
14

Ref 6, pages 17-305


Ref 7, pages 11-146
http://www.joomla.org/

Lab Contents:
o Client side scripting
Cascading
style sheet
Java script
Dynamic
HTML

o Server side program


Configuring
web server
Get way
PHP

o Database driven website


PHP and MY
SQL server
Generate
dynamic
content

o Advanced internet
programming
Java applet

93

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Java server
page

16

Final Exam

Assignments Highlight

Assign Assignment Descriptions


No

Submission Points
Date
in %

Number of
allowed
members in
a Group

This assignment will be about putting


what you have learned about PHP into
practice.

5 students

In this assignment, you are required to


develop a real word online application.
Select any organization and try to
develop an application using the
standards of software engineering.
Therefore, you need to submit proposal,
requirement
analysis
and
design
documents. After the implementation of
the system, you must submit the
documentation. This is a group project
that requires active participation of all
group members. You are obliged to
present what you have done to the class.

5 students

94

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

READING ASSIGNMENTS
1. Reading Assignment 1: Read about the different types of server side scripting languages and
analyze their advantages and disadvantages. You have to submit a printed copy of your analysis.
Due date:3rd week
2. Assignment 2: CGI is one of the most common server side scripting paradigms. In this
assignment you need to write a detailed summary of CGI: what it is, how it works, and what
languages are used in CGI. You are required to submit a printed copy and present your work in
class.
Due date: 9th week

3. Course/Group project: Due date: 15th week

SUMMARY OF COURSE ASSIGNMENTS, TEST AND EXAM:


Assignments .35%
Midterm examination . 20%
Final examination ....45%
Attendance: you are obliged to attend at least 80% of the lecture and Lab class to sit for final
exam.
Final Examination: Time and Date Set by the Office of the Registrar
Reference
1. PHP AND MYSQL FOR DYNAMIC WEB SITES by Larry Ullman
2. PHP and MySQL Web development by Luke Welling and Laura Thomson
3. PHP5 and MySQL Bible by Tim Converse and Joyce Park with Clark Morgan
4. Web Server Programming by Neil Gray
5. PHP Cookbook, 2nd Edition By David Sklar, Adam Trachtenberg
6. Beginning joomla by Dan Rahmel
7. Joomla for Dummies by Steven Holzner and Nancy Conner
8. SAMs Teach yourself PHP in 24 hours

95

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Name
School/College/Faculty/Institute
Program

Information Technology

Course Code

ITec3093

Course Title:

E-Commerce

Degree Program

Information Technology

Module Name

Web Systems and Technologies

Module No.

09

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

3rd year Information Technology Students

Year /Semester

Year: III, Semester: II

Pre-requisites

Itec3062

Status of the
Course
Course
Description

Compulsory
E-commerce is one of the fast growing areas of computer and network
96

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

applications. Although E-commerce systems can be built using different


functional components, there is a set of concepts, principles, and
technologies that are important in developing reliable E-commerce
systems. The purpose of this course is to introduce and overview such
concepts, principles, and technologies. This course will cover several
topics, including architectures of e-commerce systems, Internet and the
Web infrastructure, e-commerce software components and programming
tools, scalability, security, and payment systems.
Course Objective

Course Content

To study the fundamental concepts and basic technologies needed in the


development of an electronic commerce system. This course will help to
understand the possibilities and limitations of electronic commerce
systems.
Overview of e-commerce

e-commerce and describe how it differs from e-business

the unique features of e-commerce technology and discuss their


business significance

Overview of e-commerce

Traditional vs Electronic commerce

the major types of e-commerce

Successes in E-commerce

the major academic disciplines contributing to e-commerce


research

The E-commerce Business Models

The key components of e-commerce business models.

The major B2C business models.

Major B2B business models.

Business models in other emerging areas of e-commerce.

major e-commerce enablers

how e-commerce affects key business concepts and strategies

97

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

E-commerce software building blocks

key e-commerce technology concepts behind the Internet

E-commerce and Business strategies

E-commerce and client server computing

current structure of the Internet

Web based E-commerce architecture

Ecommerce Security and Cryptography

e-commerce crime and security problems

The key dimensions of e-commerce security

The tension between security and other values

key security threats in the e-commerce environment

Ecommerce Security and Cryptography(2)

various forms of encryption technology help protect the security


of messages sent over the Internet

tools to establish secure Internet communications channels

tools used to protect networks, servers, and clients


Appreciate the importance of policies, procedures, and laws in
creating security

Electronic Commerce: Legal, Ethical,and Tax Issues

The Legal Environment of Electronic Commerce

Use and Protection of Intellectual Property in Online Business

Electronic Commerce: Legal, Ethical,and Tax Issues(2)

Online Crime, Terrorism, and Warfare

Ethical Issues

98

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Assignment presentation
Frauds, Scams and Financial Euphoria

Straightforward dishonesty

System weaknesses

Unreal Maths

Inside trading and market manipulation

Institutional fraud

Countermeasures

Online Auctions, Virtual Communities, and Web Portals

Auction Overview

Online Auctions and Related Businesses

Virtual Communities and Web Portals

Electronic Commerce Software

Web Hosting Alternatives

Basic Functions of Electronic Commerce Software

Electronic Commerce Software for Small and Midsize Companies

Electronic Commerce Software for Midsize to Large Businesses

Web Site Development Tools

Assessment Methods
Midterm examination ... 40%
Final examination ..60%
Project+ Assignment + Lab Exercises.100%
Reference
Electronic Commerce, Gary P. Schneider and James T. Perry, Course Technology, 2007, 7th
Edition.

99

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

University Logo
University Name
Information Technology Program
Module Code
Module Name
Total ECTS of the
module

Objective of the
module

Course Code

Itec3101
Itec3102
Itec3103
Itec3104
Itec3105

Itec_M 10
Computer networks
25

At the end of this module, the student should be able to :-

Understand data transmission and transmission media,


protocol, and the concept of layering.
Recognize the importance of networking standards, and their
regulatory committees.
Describe the seven layers of the OSI model.
Compare and contrast the OSI model with the TCP/IP model.
Analyze how the foundations manifest themselves in
different ways depending on real-world constraints.
Understand the implications of new technologies.
Compare and contrast the advantage of wireless networking
with fixed media.
Understand the worldwide communications by wireless
communication
Construct wireless LANS Work with cellular devices
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
4
7
Data Communication and

Computer Networks
Advanced Networking
Introduction to Distributed
Systems
Telecom Technologies
Wireless Networking and Mobile
Computing

3
3

5
5

2
3

3
5

100

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Program

University Logo
University Name
Information Technology Program
Information Technology

Course Code

Itec3101

Course Title:

Data Communication and Computer Networks

Degree Program

Information Technology

Module Name

Computer Networks

Module No.

10

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

7
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

14

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: III, Semester: I

Pre-requisites

Itec3101

Status of the
Course
Course Outline

Compulsory

TBA
3rd Year Information Technology Students

Chapter 1: History and overview


1.1 Indicate some reasons for studying networks
101

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

1.2 Highlight some people that influenced or contributed to the area of


networks
1.3 Indicate some important topic areas such as network architectures and
protocols, network types (LAN, WAN, MAN, and wireless), data
security, data integrity, and network performance
1.4 Describe some of the hardware and software components of networks
1.5 Describe the operation of some network devices such as repeaters,
bridges, switches, routers, and gateways
1.6 Indicate some network topologies such as mesh, star, tree, bus, and
ring
1.7 Describe the purpose of network protocols
1.8 Mention some popular protocols
Chapter 2: Data Communications
2.1 Data transmission
2.2 Concepts and Terminology
2.3 Analog and Digital Data Transmission
2.4 Transmission Impairments
2.5 Transmission media
2.6 Guided Transmission Media
2.7 Wireless Transmission
Chapter 3: Communications network architecture
3.1.
Network line configuration (point-to-point, multipoint)
3.2.

Networking and internetworking devices: Repeaters,


bridges, switches, routers, gateways

3.3.

Network Topologies (mesh, star, tree, bus, ring)

3.4.

Connection-oriented and connectionless services

Chapter 4: Communications network protocols


4.1 Network protocol
4.2 Overview of the TCP/IP Protocol suites
4.3 Network Standards and standardization bodies
Chapter 5: Local and wide area networks
5.1. LAN topologies (bus, ring, star)
5.2. LAN technologies (Ethernet, token Ring, Gigabit Ethernet)
5.3 Large networks and wide areas
Chapter 6: Client-server computing
6.1. Web technologies: Server-side programs; Socket programs;
Server sockets; Client sockets; multithreading concepts;
Chapter 7: Data security and integrity
7.1 Fundamentals of secure networks; cryptography
7.2 Encryption and privacy
7.3 Authentication protocols
7.4 Firewalls
7.5 Virtual private networks
102

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

7.6 Transport layer security


8. Lab Description
Cabling and crimping, Peer to Peer Networking, Sharing Files, Sharing
Printers, Client Server Networking, Steps for Creating a home or small
office Network, Student Exercise, Installation, Server Roles, Setting up a
DNS Server, Configuring TCP/IP
Text and Reference: Computer Networking. Kurose and Ross. Addison
Wesley, latest edition
Software Requirements: Network Operating systems, Simulators, etc
Prerequisite
Status
Methodology
Assessments
Attendance
requirements

Itec 1011
Compulsory
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab

Program

University Logo
University Name
Information Technology Program
Information Technology

Course Code

Itec3102

Course Title:

Advanced Networking

Degree Program

Information Technology

Module Name

Computer Networks

Module No.

10

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:
103

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: III, Semester: II

Status of the
Course
Course
Description

Compulsory

Course Objective

The objectives of this course are to enable students to:


Understand the different uses of computer networks
Identify the network software and hardware components
Understand the network reference models
Differentiate between guided and unguided transmission media
Identify the different mechanisms used to detect and correct errors at
the data link layer
Understand and mention the different mechanisms of flow control at
the data link layer
Understand the Channel Allocation Problem
Understand Multiple Access Protocols
Compare and contrast Ethernet, Wireless LANs, Broadband
Wireless, and Bluetooth
Understand Data Link Layer Switching
Understand Network Layer Design Issues
Understand and identify different Routing Algorithms, Congestion
Control Algorithms
Understand Quality of Service, Internetworking
Compare and contrast TCP and UDP

Course Outline

TBA
3rd year Information Technology Students

Overview of computer networks, seven-layer architecture, TCP/IP suite of


protocols, etc. network hardware, network software, examples,
standardization, guided transmission media, wireless transmission, data
link layer design issues, error detection and correction, elementary data
link protocols, sliding window protocols, the channel Allocation problem,
multiple access protocols, Ethernet, wireless LANs, broadband LANs, blue
tooth, data link layer switching, the network layer design issues, Routing
Algorithms, QoS, Congestion control algorithms

1. Basics of computer Network


a. Introduction
104

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

b.
c.
d.
e.

Prerequisite
Status
Methodology
Assessments

Hardware and software


Topology
Types of networks
Transmission media
Wired and Wireless
f. OSI and TCP/IP protocol suite
2. Application layer
a. DNS Domain Name System
b. Electronic Mail
c. WWW- the World Wide Web
d. File Transfer Protocol
e. Host Configuration Protocol (DHCP)
f. Multimedia
3. Transport layer
a. The Transport Service
b. Elements of Transport Protocols
c. A Simple Transport Protocol
d. The Internet Transport Protocols: UDP
e. The Internet Transport Protocols: TCP
f. Congestion and flow-control
g. Performance and Reliability
4. Internet Layer
a. Introduction
b. Network Layer Design Issues
c. Routing Algorithms
d. Congestion Control Algorithms
e. Quality of Service
f. Internetworking
5. Network Access Layer
a. Ethernet
b. Address Resolution Protocol (ARP)
c. Frame Relay
d. Asynchronous Transfer Mode
e. Peer-to-Peer Networks
f. High-Speed LANs
6. Physical Layer
a. The Theoretical Basis for Data Communication
b. Guided Transmission Media
c. Wireless Transmission
d. Communication Satellites
e. Switching
Itec3101
Compulsory
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
105

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Attendance
requirements

2012

85% for lecture and 100% for lab


Textbook:
1. Computer Networking: A top down approach, 4th/5th edition,
James F. Kurose and Keith W. Ross
References:
2. Computer Networks: A systems approach, 4th ed, Larry L.
Peterson and Bruce S. Davie
3. Computer Networks: principles, technologies and protocols for
network design, Natalia Olifer, Victor Olifer.
4. Computer Networks, 4th Edition, Andrew S. Tanenbaum
5. W. R. Stevens. TCP/IP Illustrated, Volume 3: The protocols, Addison
Wesley
6. R. Handel, M. N. Huber, and S. Schroeder. ATM Networks: Concepts,
Protocols, Applications, Addison Wesley, 1998. Networks: Concepts,
Protocols, Applications, Addison Wesley, 1998.

7. W. Stallings. Cryptography and Network Security: Principles and


Practice, 2nd Edition, Prentice Hall

106

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec3103

Course Title:

Introduction to Distributed System

Degree Program

Information Technology

Module Name

Computer Networks

Module No.

10

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: III, Semester: II

Pre-requisites

Itec3101

Status of the
Course
Course
description

Compulsory

TBA
3rd Year Information Technology Students

This course covers the foundations of distributed systems including models


of computing, logical clocks and synchronization, consensus, distributed
indexing, concurrency, consistency, failures, reliability and security. We
will examine popular applications of distributed computing; analyze how
the foundations manifest themselves in different ways depending on real107

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

world constraints. Such applications include distributed file systems, peerto-peer systems, distributed transactions, and web services.
Course objective

At the end of the course the students should be able to:


understand the importance of distributed computing
Differentiate the uni-scalar machines with that of high-end parallel
systems

Course Outline

Introduction to Distributed Systems:

Issues and Architectures; Characterization of Distributed


Systems; Networking, internetworking and interposes
communication.

Naming and Threads: Naming and name services; Remote


Invocation, Processes and threads;

Models of Distributed Computing: Performance, Replication,


Virtualization, Scalability; Synchronous network model and
leader election; Asynchronous shared memory model, fairness, and
mutual exclusion ; Data-Centric Consistency Models; Multicore
architectures and benchmarks;

Methodology
Assessments
Attendance
requirements

Client-Centric Consistency Models

Lectures supported by tutorials, assignments and Lab exercises


Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
Textbook:
1. TBA
References:
2.TBA

108

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec3104

Course Title:

Telecom Technologies

Degree Program

Information Technology

Module Name

Computer Networks

Module No.

10

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

3
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: III, Semester: II

Pre-requisites

Itec3101

Status of the
Course
Course
Description

Compulsory

TBA
3th year Information Technology Students

This course is designed to introduce students to different


telecommunications technologies. It emphasizes on the techniques,
equipments and protocols involved in today's digital telecommunications
field. The course briefly describes both the theoretical and applicative
109

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Objective

Course Outline

Methodology
Assessments
Attendance
requirements

2012

aspects regarding the transmission of information, the analog, digital and


system standards of telecommunications. The Public Switched Telephone
Network (PSTN) and Public Land Mobile Network (PLMN) are described
briefly. The topics covered are Telecommunications, data transmission,
analog channels, digital channels, fixed and mobile switching, signaling
protocols, GSM, and GPRS.
After completing this course students will be able to:
Describe the basic telecom principles
Describe analog and digital channels
Understand physical communication media
Define different mobile communication standards
Identify different telecommunication
Introduction: General Considerations; General Model of a
Telecommunication Channel; Analog Telecommunication Channels;
Digital Telecommunication Channels; Open Systems Interconnection
(OSI) Model; Physical Media of Communication
Mobile Digital Telecommunications: Introduction; GSM Standard;
GPRS Standard; Advanced Mobile Telecommunication Standards:
EDGE, UMTS
Fixed Digital Telecommunications: Public Switched Telephone
Network (PSTN); Alcatel 1000 E 10 Commutation Center; Integrated
Services Digital Network (ISDN); Intelligent Telecommunication
Networks
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
TBA

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec3105

Course Title:

Wireless Networking

Degree Program

Information Technology

Module Name

Computer Networks
110

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Module No.

10

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

3th Year Information Technology Students

Year /Semester

Year: III, Semester: II

Pre-requisites

Itec 3101

Status of the
Course
Course
Description

Compulsory
Under this course, students will cover issues related to wireless
Communications, Principles of wireless communications, Modes of
wireless communication, Sea and Air Transceivers, Handheld Radio
Transceivers, Shortwave Transceivers, Cellular Radio Telephones
,Satellite Communications
Radio Modems
Wireless Communications and Transceiversan Overview
Non-Complex Signal Processing in a Low-IF Receiver
A Reconfigurable Baseband Chain for 3G Wireless Receivers
Field-Programmable and Reconfigurable Analogue and Mixed-Signal
Arrays
A Low-Power,Low-Voltage Bluetooth Channel Filter Using Class AB
CMOS Tran conductors
Design and Automatic Tuning of Integrated Continuous-Time Filters
Low-Voltage Integrated RF CMOS Modules and Frontend for 5 GHz and
Beyond
111

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Objective

Course Outline

2012

Design of Integrated CMOS Power Amplifiers for Wireless Transceivers


Parasitic-Aware RF IC Design and Optimisation
Testing of RF, Analogue and Mixed-Signal Circuits for
Communicationsan Embedded
Students will be able to
Compare and contrast the advantage of wireless networking with fixed
media.
Understand the world wide communications by wireless
communication
secure equipment and premises remotely
Contract wireless LANS
Work with cellular devices
Chapter One
1. WIRELESS COMMUNICATIONS FOR VOICE AND DATA
1.1.1. wireless techniques
1.1.2. a strategy for worldwide voice communications
1.1.3. cellular voice
1.1.4. wireless radio
1.1.5. wireless pbx systems
1.1.6. satellite voice services
1.2. wireless considerations for a data communications strategy
1.2.1. cdpd as a wireless option
1.2.2. specialized mobile radio
1.2.3. commercial mobile data communications services
1.2.4. satellite data wireless lans
1.3. wireless communication as an alternative to fixed media
1.3.1. the wireless cost advantage
1.3.2. vendor support for wireless solutions
1.3.3. outlook for wireless applications
1.3.4. mobile communications systems
1.4. safe mobile computing
1.4.1. introduction
1.5. determining if an organization is at risk
1.5.1. power protection
1.5.2. computer viruses
1.5.3. security programs
1.5.4. general backups
1.5.5. external drives
1.5.6. data recovery centers
1.5.7. backing up pdas
1.5.8. data transfers
1.6. physical security: locks and cases
1.6.1. cellular phone safety
1.6.2. securing equipment and premises remotely
1.6.3. practices for safe computing
1.6.4. cataloging equipment: the specifics
112

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

1.6.5. hardware and software setups


1.6.6. security setups
1.6.7. the orientation session
2. DEVELOPING A COST-EFFECTIVE STRATEGY FOR
WIRELESS COMMUNICATIONS
2.1.1. wireless network technologies and service providers
2.1.2. circuit- switched networks
2.1.3. packet data networks
2.2. choosing an architecture and access method
2.2.1. continuous-connection architectures
2.2.2. e-mail based systems
2.2.3. agent-based messaging systems
2.2.4. hosing wireless applications
2.2.5. wireless e-mail and fax systems
2.2.6. remote access and file synchronization utilities
2.2.7. single-transaction based applications
2.2.8. mobile enterprise applications
2.2.9. choosing wireless products
2.2.10. systems for communications management
3. SECURITY OF WIRELESS LOCAL AREA NETWORKS
3.1.1. introduction
3.1.2. an overview of costs and benefits
3.1.3. interoperability
3.1.4. performance
3.1.5. configuration
3.1.6. industry applications
3.1.7. security concerns
3.1.8. physical configuration
3.1.9. types of transmission
3.1.10. service availability
3.1.11. signal availability
3.1.12. circuit availability
3.1.13. equipment availability
3.1.14. wireless network controls
3.1.15. protective security mechanisms
3.1.16. protection of mobile computing assets
3.1.17. keeping pace with change
3.1.18. determining the value of information
3.1.19. computer security principles
3.1.20. protecting the mobile office
3.1.21. computer theft
3.1.22. theft of information
3.1.23. malicious code
3.1.24. eavesdropping
3.1.25. setting security policy
4. AN EMERGING MOBILE (CELLULAR) NETWORK SERVICE
4.1. introduction
113

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

4.2.
4.3.
4.4.
4.5.
4.6.
4.7.
4.8.
4.9.

cdpd fundamentals
underlying technologies
applications for cdpd
emerging class of remote users
service pricing
benefits to mobile users
equipment requirements
network architecture and protocols
4.9.1. mobile data-intermediate systems
4.9.2. mobile database systems
4.9.3. mobile-end systems
4.9.4. mobility management
4.9.5. mobile network registration protocol
4.9.6. mobile network location protocol
4.9.7. information protection
4.9.8. cdpd network backbone
4.9.9. mobile-end systems protocols
4.9.10. transparent operation
4.9.11. sending data from a mobile unit
4.9.12. registration procedure
4.9.13. sending data to a mobile unit
4.9.14. Is there a mass market for cdpd?
5. MOBILE USER SECURITY
5.1. availability
5.2. scheduling considerations
5.3. physical considerations
5.4. notebook connectivity
5.5. telephone communications tools
5.6. continuity
5.7. creating mobile backup
5.8. loss of computing resources
5.9. integrity
5.10. software considerations
5.11. confidentiality
5.12. mobile employee information security recommendations
5.13. software considerations
new technology considerations
Methodology
Assessments
Attendance
requirements

Lectures supported by tutorials, assignments and Lab exercises


Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
TBA
114

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

University Logo
University Name
Information Technology Program
Module Code
Module Name
Total ECTS of the
module

Objective of the
module

Itec_M 11

Network design, configuration and administration


15

At the end of this module students should be able to: Install and configure network operating system
Identify basic client server architecture
Configure web service, FTP service, active directory
Perform user and group administration tasks
Administer and secure servers
Design computer network for enterprise
Deploy small to medium size networks
Develop practical skill for network design in heterogynous
Discover Foundry network devices

Course Code

Itec4111
Itec4112
Itec4113

Advanced knowledge on network device configuration


Create and configure VLANs
Monitor changes to Foundry network devices
Store and retrieve network events
Configure router
Configure and manage switch
Implement and configure network protocols

Mangling network
Courses in the Module
Course Name

System and Network


Administration
Network Design
Network Device and
Configuration

Credit
ECTS (CP)
Hours
(existing)

3
3

5
5

115

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec4111

Course Title:

System and Network Administration

Degree Program

Information Technology

Module Name

Computer Networks

Module No.

11

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: IV, Semester: II

Pre-requisites

Itec3101

Status of the
Course

Compulsory

TBA
4th Year Information Technology Students

Course outline
Unit One
1. Introduction & Background
116

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

1.1. Computer Systems & Network overview


1.2. Philosophy of System Administration
Unit Two
2. Windows Network Concepts
2.1. Workgroups
2.2. Server Domain
2.3. Domain Controllers
2.4. LDAP & Windows Active Directory
Unit Three
3. User Administration Concepts & Mechanisms
3.1.1. Users and capabilities
3.1.2. Policy Tools & Roaming Profiles
3.1.3. Advanced Concepts I
3.1.3.1.
The Registry
3.1.4. Automating Administrative Tasks - Windows Host
Scripting
3.2. Advanced Concepts II
3.2.1. Routing and NAT
3.2.2. Proxies and Gateways
Unit Four
4. Resource Monitoring & Management I
4.1.1. Stand-alone systems (Memory, Disk Use, CPU Use)
4.1.2. Monitoring Tools
4.1.3. Routine Resource Maintenance
4.2. Resource Monitoring & Management II
4.2.1. Bandwidth
4.2.2. File & Mail Servers
4.2.3. Network Printers
4.3. Remote Administration
4.4. Performance
4.4.1. RAID
4.4.2. SCSI
Unit Five
5. Security
5.1. Introduction
5.2. Linux Systems and Network Concepts
5.3. Linux Resource Monitoring & Management
5.3.1. Monitoring Tools
5.3.2. Network Bandwidth and Processing Power
5.3.3. Managing Storage
5.4. Linux User Administration
5.5. Linux Service/Server Administration
5.5.1. Supporting a Windows Network - through SAMBA
117

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

5.5.2. Mail Server

Methodology
Assessments
Attendance
requirements

Methodology
Assessments
Attendance
requirements

Lectures supported by tutorials, assignments and Lab exercises


Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
TBA
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
Text and References
Computer Networks, 3rd edition, by Andrew Tanenbaum, Prentice Hall.
An Engineering Approach to Computer Networks, S. Keshav.
High Performance Communication Networks, Jean Walrand, Pravin .
Internetworking Multimedia, Jon Crowcroft, Mark Handley and Ian
Wakeman.
Software
Windows server 2011 operating System, Solaris
Operating System, Cisco IOS simulator,

118

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec4112

Course Title:

Network design

Degree Program

Information Technology

Module Name

Network design, configuration and administration

Module No.

11

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

TBA

Year /Semester

Year: IV, Semester: I

Pre-requisites

Itec3101

Status of the
Course

Compulsory

TBA
4th Year Information Technology Students

Course outline
1. Applying a Methodology to Network Design
119

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

2. Structuring and Modularizing the Network


3. Designing Basic Campus and Data Center Networks
4. Designing Remote Connectivity
5. Designing IP Addressing and selecting Routing Protocols
6. Evaluating Security Solutions for the Network
7. Identifying Voice Networking Considerations
8. Identifying Wireless Networking Considerations

Lab contents:

Design basic campus network

Design remote network connectivity

Design IP addressing network

Design wireless network

Reference
Network design reference manual (NDRM)- 6th edition
Top down network design(2nd edition) Cisco press

120

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

121

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec4113

Course Title:

Network device configuration

Degree Program

Information Technology

Network design, configuration and administration

Module Name
Module No.

11

Course Chair

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor

TBA
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

4th Year Information Technology Students

Year /Semester

Year: IV, Semester: II

Pre-requisites

Itec 3101

Status of the
Course
Course Objective

Compulsory
After completion of this course student will be able to:
Discover Foundry network devices
Advanced knowledge on network device configuration
Create and configure VLANs

122

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Monitor changes to Foundry network devices


Store and retrieve network events
Configure router
Configure and manage switch
Implement and configure network protocols

Mangling network
Course outline
1. Device Configuration
Configuration Wizard.
View VLANs by device and port.
Automatic Discovery and Configuration Manager.
Wireless Mobility configuration menu
Device Schedules
VPN Policy Manager
Element Manager.
CLI Configuration Manager.
2. Router and Switch
Basic configuration
Passwords
Wildcard masks
Access Control Lists
Remote access
Logging with syslog usage
Miscellaneous
3. Routers
Router basic configuration
Static routing
Dynamic routing
Routing protocols matrix
RIP
IGRP
EIGRP
OSPF
DHCP
NAT and PAT
PPP
Frame Relay
Router on the stick
4. Switches
Switch basic configuration
CAM table
Port security
123

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

VLANs
STP
VTP
Inter VLAN communication
Miscellaneous

Labs

RS0 - Router and Switch basic configuration


S01 - Switch basic configuration
S02 - Switch VLAN configuration
R01 - Static routing
R02 - RIP v.1
R03 - RIP v.2
R11 - PAT and DHCP
R12 - PAT, DHCP and DHCP Relay
R13 - NAT/PAT and DHCP
R14 - PPP
R15 - ACL
R16 - Frame Relay
RS01 - DHCP and VLANs

Mix 01
Methodology
Assessments
Attendance
requirements
Methodology
Assessments
Attendance
requirements

Lectures supported by tutorials, assignments and Lab exercises


Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
Lectures supported by tutorials, assignments and Lab exercises
Continuous assessment 50%
Final exam 50%
85% for lecture and 100% for lab
References:
Rufi, Oppenheimer, Woodward and Brady, Network Fundamentals,
CCNA Exploration Labs and Study Guide, CISCO Press, 2008.
Dye, McDonald and Riufi, Network Fundamentals, CCNA Exploration
Companion Guide, CISCO Press, 2007.
Top-Down Network Design (2nd Edition) By Priscilla Oppenheimer.
Published by Cisco Press. Published: May 27, 2004.
Christina J. Hogan. The Practice of System and Network Administration,
Addison-Wesley Professional, 2001.
124

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module

Objective of the
module

Course Code

ITec4121

ITec_|M 12
Integrative Programming and technologies
5

The objectives of the module are:


Describe and contrast the different types of architectures for
integrating systems.
Define the role of DCOM, CORBA, and RMI in distributed
processing.
Describe how web services are used to integrate disparate
applications in an organization.
Create valid WSDL, SOAP and UDDI XML documents to define a
web service. Write, debug, and test a web service. Deploy the web
service to middleware and invoke the web service from an application
across the network.
Design, develop and test a socket program that communicates
between two different services using both TCP/IP sockets and
Datagram sockets.
Describe the role of the WSDL, SOAP, and UDDI architectures in
creating and using web services.
Describe the role of socket programming in communicating between
systems.
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Integrative Programming and
5
Technologies
3
University Name
School of Computing and Electrical Engineering

Program

Information Technology

Course Code

ITec4121

Course Title:

Integrative Programming and Technologies


125

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Degree Program

Information Technology

Module Name

Integrative Programming and Technology

Module No.

ITec_M 12

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

4th year Information Technology Students

Year /Semester

Year: IV, Semester: I

Pre-requisites
Status of the
Course
Course
Description

Compulsory

Course Objective

At the end of this course students will be able to


Describe and contrast the different types of architectures for integrating
systems.
Define the role of DCOM, CORBA, and RMI in distributed
processing.

This course looks at systems integration with focus on communication


mechanisms and data standardization. Students learn how to choose their
communication approach by considering platform, data structure
similarity/dissimilarity as well as client requirements. They will learn how
to represent structure and how to transport data using XML and XML
related technologies and protocols. Standardization of XML documents for
the purpose of data exchange is stressed.

126

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Describe how web services are used to integrate disparate applications


in an organization.
Create valid WSDL, SOAP and UDDI XML documents to define a
web service. Write, debug, and test a web service. Deploy the web
service to middleware and invoke the web service from an application
across the network.
Design, develop and test a socket program that communicates between
two different services using both TCP/IP sockets and Datagram
sockets.
Describe the role of the WSDL, SOAP, and UDDI architectures in
creating and using web services.
Describe the role of socket programming in communicating between
systems.
Course Outline

Assessment
(Continuous)
References:

Module Code
Module Name
Total ECTS of the
module
Objective of the
module

Intersystem Communications: Architectures for integrating systems;


DCOM, CORBA, and RMI; Web Services and Middleware; Network
programming; Message and queuing services; Low level data
communications
Data Mapping and Exchange: Metadata; Data representation and
encoding; XML, DTD, XML schemas; Parsing XML documents; XSL,
XSLT and XPath
Integrative Coding: Design Patterns; Interfaces; Inheritance
Miscellaneous Issues: Adopt and Adapt vs. make; Versioning and
version control
Lecture 100%
Lab
100%

University Logo
University Name
Information Technology Program
Itec_M 13

Multimedia and Human Computer Interaction


8
The objectives of the module are:

Enable students understand fundamental concepts of


multimedia

Enable students know applicable areas of multimedia


127

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

systems

Enable students understand design and code multimedia


systems

Students enable to understand different human computer


interaction systems

Courses in the Module


Course Name

Course Code

Multimedia Systems
Human Computer Interaction

Itec3131
Itec3132

Credit
ECTS (CP)
Hours
(existing)
3
5
2
3

Program

University Logo
University Name
Information Technology Program
Information Technology

Course Code

Itec3131

Course Title:

Multimedia Systems

Degree Program

Information Technology

Module Name

Multimedia and human computer interaction

Module No.

13

Course Chair
Office location:
Mobile:

; e-mail:
128

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

3rd year Information Technology Students

Year /Semester

Year: III, Semester: I

Pre-requisites

Itec2051

Status of the
Course
Course
Description

Compulsory

Course Objective

Course Outline

Multimedia technologies; multimedia storage models and structures; data


models and interfaces; multimedia information systems; video/audio
networking; media synchronization; image computing and information
assimilation; conferencing paradigms and structured interaction support.
At the end of the course, students should:
Understand the basic concepts of multimedia
Understand where and how to use multimedia systems
Design different kinds of multimedia systems
Write different kinds of code that are used in Multimedia
Applications/perform multimedia functions
Chapter One
Introduction
1.1 What is Multimedia?
1.2 History of Multimedia
1.3 Multimedia and Hypermedia
1.4 Multimedia and World Wide Web
Chapter Two
Multimedia Authoring and Tools
2.1 What is Multimedia Authoring?
2.2 Some Useful Editing and Authoring Tools
2.3 Authoring Paradigms
Chapter Three
Data Representations
129

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

3.1 Graphics/Image Data Representation


3.2 Digital audio and MIDI
3.3 Popular File Formats
Chapter Four
Image and Video
4.1 Color Science
4.2 Colour Models in Images 4.3 Colour Models in Video
Chapter Five
Fundamental Concepts in Video 5.1 Types
of Video Signals
5.2 Analogue Video
5.3 Digital Video
5.4 Different TV standards
Chapter Six
Basics of Digital Audio
6.1 Digitization of Sound
6.2 Quantization and Transmission of Audio
Chapter Seven
Lossless Compression Algorithms
7.1 Introduction
7.2 Basics of Information Theory
7.3 Run-Length Coding
7.4 Variable-Length Coding (VLC)
7.5 Dictionary Based Coding
7.6 Huffman Coding
7.7 Arithmetic Coding
7.8 Lossless Image Compression
Chapter Eight
Loss Compression Algorithms
8.1 Introduction
8.2 Distortion Measures
8.3 The Rate Distortion Theory
8.4 Quantization
8.5 Transform Coding
Chapter Nine
Image Compression Standards
the JPEG Standard
Chapter Ten
Basic Video Compression Techniques
1 Introduction to Video Compression
2 Video Compression Based on Motion Compensation
Chapter Eleven
MPEG Video and Audio Coding
1. Video Compression
130

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

2 MPEG Audio Compressions


Lab content
Macromedia Author ware Basics:
The Author ware window; toolbars; shortcut; authoring; piece;
icon; linking; image; video; sound;
Analyzing a completed Piece:
Navigating through completed piece sound, picture and
video; adding sound and picture in a completed piece
Creating a new project File using Knowledge objects:
steps to create a new project file using knowledge objects
Adding a knowledge objects to a file:
Exercise steps of adding knowledge objects to a file
Setting up icon properties, presentation windows
Saving, opening and Running a piece
Creating a title page
Create text using the toolbox
Adding Graphic Background and different buttons
Adding Sounds and Movie
Grouping Icons in to a map Icon
Creating Menu with hotspots
Inserting Map icons
Creating A master Framework
Editing an External RTF File
Creating A quiz using Knowledge objects
Using Quiz Knowledge Object
Video and Audio Editing; Using multimedia applications;
scripting
Assessment
References:

Programming Assignments=15% ,Project work= 20 % ; Lab Exam =25%


; written Final examination= 40%
1) Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, Prentice
Hall, 2004.
2) Richard Brice, Multimedia and Virtual Reality Engineering, Newnes,
1997
3) Jon Crowcroft, Mark Handley, Ian Wakeman; Internetworking
Multimedia,
Morgan Kaufmann Publishers, San Francisco, California, 1999

131

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

4) Doug Sahlin, Flash 5 Virtual Classroom, McGraw-Hill, 2001, California

Program

University Logo
University Name
Information Technology Program
Information Technology

Course Code

Itec3132

Course Title:

Human-Computer Interaction

Degree Program

Information Technology

Module Name

Advanced Information Technology Issues

Module No.

13

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

10

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

3rd year Information Technology Students

Year /Semester

Year: III, Semester: II

Pre-requisites

Itec3053

Status of the

Compulsory
132

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course
Course
Description

Course Objective

2012

A key component to the discipline of Information Technology is the


understanding and the advocacy of the user in the development of IT
applications and systems. IT graduates must develop a mind-set that
recognizes the importance of users and organizational contexts. They must
employ user-centered methodologies in the development, evaluation, and
deployment of IT applications and systems. This requires graduates to
develop knowledge of HCI, including but not limited to such areas as user
and task analysis, human factors, ergonomics, accessibility standards, and
cognitive psychology.
At the end of the course students will be able to:
o Describe the relationship between the cognitive principles and their
application to interfaces and products.
o Explain the conceptual terms for analyzing human interaction with
products such as affordance, conceptual model, and feedback.
o Analyze different user populations with regard to their abilities and
characteristics for using both software and hardware products.
o Describe the connection between the development of a user
interface and the users knowledge of an application domain.
o List several of the emerging alternative I/O devices for computers
Chapter One: Introduction
o Definition
o Historical background
Chapter Two: Human in HCI
o Information input/output
o Memory

Course Outline

o Reasoning, problem solving, skill and error


o Emotion
o Individual difference
Chapter Three: Computer in HCI
o Input device
o Output device
o Virtual reality
133

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

o Physical interaction
o Paper
o Memory
o Processing
Chapter Four: Interaction
o Introduction
o Models of interaction
o Ergonomics
o Interaction styles
o The context of the interactions
o Paradigms
o Introduction
o Paradigms for interaction.
Mid Exam
Chapter Five: Interaction Design and HCI in the Software Process
o Interaction Design
o Introduction
o What is design?
o User focus
o Scenarios
o Navigation design
o Screen design and layout
o Interaction and prototyping
o HCI in the Software Process
o Introduction
o The software lifecycle
o Usability engineering
o Interactive design and prototyping
o Design rationale
134

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Chapter Six: Design Rules and Implementation support


o Design Rules
o Introduction
o Principles to support usability
o Standards
o Guidelines
o Golden rules and heuristics
o HCI patterns
o Implementation Support
o Introduction
o Elements of windowing systems
o Programming the application
o User interface management systems
Chapter Seven: Evaluation Techniques and Universal Design
o Evaluation Techniques
o What is evaluation?
o Goals of evaluation
o Choosing an evaluation method
o Universal Design
o Introduction
o Universal design principles
o Multi-modal interaction
o Designing for diversity
Chapter Eight: User Support
o Introduction
o Requirements of user support
o Approaches to user support
o Adaptive help systems
o Designing user support systems
135

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Methodology
For this course three lecture hours are scheduled per week. Students are expected to read topics
in advance. Participation in class discussion is anticipated from the students.
Assignment
Assignment is given in group. Each member of the group should participate in doing the
assignment. Direct copy has no value. Analyzing, digesting the topic under consideration and
forwarding your own view points are expected from students.
Assessment methods:
Assignment

15%

Mid Exam

35%

Quiz

5%

Final Exam

45%

Text Book:
1. Dix, A., Finlay, J., Abowd, G. and Beale, R. (1997). Human-computer interaction.
Other Reference Books:
1. Baecker, R. M. and Buxton, W. A. S. (1987). Readings in Human-Computer Interaction:
A Multidisciplinary Approach.
2. Baecker, R., Grudin, J., Buxton, W., and Greenberg, S. (1995). Readings in Human
Computer Interaction.
3. Helander, M. (1988).Handbook of Human-Computer Interaction.
4. Lewis and Reiman (1993). Task Centered User Interface Design.
5. Norman, D. A. (1988). The Design of Everyday Things, Basic Books, NY.
6. Preece, J. et al (1994). Human Computer Interaction.
7. Nielsen, J. (1993). Usability Engineering.
8. Shneiderman, B. (1997). Designing the User Interface.

Module Code
Module Name
Total ECTS of the
module

University Logo
University Name
Information Technology Program
Itec_M 14

Information Technology and Society


15
136

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Objective of the
module

Course Code

Itec4141
Itec4142
Itec4143

2012

The objectives of the module are:

Identify threats, Risks and Vulnerabilities


Data Security Policies/Admin Security
Information Systems Security concepts
Designing secure systems
Describe what professional ethics is

Describe professional communication

Describe the legal issues in computing

Describe the social context of computing

Describe the responsibilities of IT professionals

Courses in the Module


Course Name

Information Assurance and


Security
Social, Professional and Ethics in
Information Technology
Current Topics in Information
Technology (Elective)

Credit
ECTS (CP)
Hours
(existing)
4
7
3

137
University Logo
University Name
Information Technology Program

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Program

Information Technology

Course Code

Itec4141

Course Title:

Information Assurance and Security

Degree Program

Information Technology

Module Name

Information Technology and Society

Module No.

14

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

Tutorial

Lab/Practical

Home Study

Total

(per week)

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

4th Year Information Technology Students

Year /Semester

Year: IV, Semester: II

Pre-requisites

Itec 2022, Itec 3102

Status of the
Course
Course
Description

Compulsory
This course covers theory and practice of Information system security.
Students will learn the principles of information security, security
architectures and models, aspects and methods of information security
such as physical security control, operations security, access control,
security threats, risks, vulnerabilities, Data security Policies/Admin,
138

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Security Procedural Control, Designing secure systems, Cryptographysymmetric and asymmetric. Students will also learn how to plan and
manage security, security policies, business continuity plans, disaster
recovery plans, and social and legal issues of information security.
Course Objective

At the end of this course the students will be able to know


Threats, Risks and Vulnerabilities
Data Security Policies/Admin. Security
Information Systems Security concepts
Designing secure systems

Course Content

Chapter one
Course Introduction
1.1. Enterprise Security
1.2. Cyber defense
1.2.1. Enterprise Security within an Enterprise Architecture
Context
Chapter Two
2. Brief Overview of Commercial Issues
2.1. Cryptography
2.2. Web Services Security
2.3. Convergence
2.3.1. Communications and Information
2.3.2. Wired/Wireless PKI (Public Key Infrastructure)
2.3.3. Windows Vista Security: Internet: Protocol versions 4/6
2.3.4. Implementing Enterprise Security Architecture (ESA)
2.3.5. Intrusion Detection System/Prevention (IDS/IPS):
Overview
Chapter three
3. Network Firewall Security
3.1. Definitions and Terminology
3.2. Internet Security Architecture
3.3. IPv6 Security Considerations
139

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

3.4. Host Security (authentication and authorization techniques)


Chapter four
4. Review of Shared Key Cryptography and Hash Functions
4.1. Basic Public Key Cryptography (DH, RSA, CAs, PKI)
4.2. Introduction to the TCP/IP Stack
4.3. Network Security (ports and protocols)
4.4. Firewalls and Firewall Rules
Chapter Five
5. Application Security (vulnerabilities of programming/scripting
languages)
5.1. Malicious Code (virii, worms, malware)
5.2. Securing Services (shells, e-mail, web servers)
5.3. Identifying Vulnerabilities (tools and techniques)
Assessment/Evaluation
Programming Assignments=15%, Project work= 20 %; Lab Exam =25%; written Final
examination= 40%

University Logo
University Name
Information Technology Program
Program

Information Technology

Course Code

Itec4142

Course Title:

Social, Professional and Ethical issues in Information Technology

Degree Program

Information Technology

Module Name

Information Technology and Society

140

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Module No.

2012

14

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
ECTS Credits
(CP)
Contact Hours

5
Lecture

(per week)

Tutorial

Lab/Practical Home Study

Total
8

Lecture days,
Hours and
Room:
Tutorial/Lab
days and Hours
Target Group:

4th year Information Technology Students

Year /Semester

Year: IV, Semester: II

Pre-requisites

Itec1011

Status of the
Course

Compulsory

Course
Description

In addition to technical skills, an IT professional must understand the social


and professional context of information technology and computing, and
adhere to ethical codes of conduct. This knowledge area covers the
historical, social, professional, ethical and legal aspects of computing. It
identifies how teamwork is integrated throughout IT and how IT supports
an organization and society.

Course
Objectives

After completing this course students will be able to:

Describe what professional ethics is

Describe professional communication

Describe the legal issues in computing


141

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Describe the social context of computing

Describe the responsibilities of IT professionals

2012

Course content

Week

Lecture Topics

Reading/
Assignments

Part 1 - Morality, Ethics, Justice, Rights:

1-3

4-8

9-12

1.1 What is "Critical Analysis"?


1.2 What are "Ethics" and "Morality"?
1.3 Moralities, Values, and Needs
1.4 Mill's Liberty Presumption
1.5 Discussion of Mill's "On Liberty"
1.6 Liberty-limiting principles
1.7 Comparative Justice and Distributive Justice
1.9 The Nature, Kinds, and Grounds of Rights
1.10 Human Rights, Derivative Moral Rights.
1.11 Kant's Ethical Formalism and Rawls Social Justice Ethics

Part 2 - Creativity: employer and employee rights in IT Matters


2.1.
Development of software: who owns the intellectual
property (IP)?
2.2.
Development of hardware: who owns the intellectual
property (IP)?
2.3.
What are "reasonable limitations" on IP ownership by an
employee?
2.4.
The Nature Of Digital Reliability And Failure:
2.5.
Representing and communicating risk from software and
hardware: who is responsible?
2.6.
From medical software to "Star Wars" and the complexity
of computer systems; origins of the Computer Professionals for
Social Responsibility; what is "reasonable reliability in complex
systems.
2.7.
"Goofing off": who owns the "Easter eggs"? Why are they
tolerated?
Part 3: Civil issues and criminality in computing Unethical
and Illegal Activities:
3.1.
Theft of source code, misrepresentation of authorship /
ownership
3.2.
Misrepresentation of performance, reliability and risk
3.3.
Theft of operating software (license avoidance, illegal
duplication)
3.4.
Denial of access (Microsoft versus Netscape)
3.5.
Illegal entry methods (exploiting weakness in
communication programs)
3.6.
Denial of service attacks
3.7.
Misrepresentation of identification
3.8.
Cyberterrorism: the origins and development of viruses and
malware. Types of internet disruption. Defenses

Reading:
TB1 pp 4-11
TB2 pp 12-28

TB 1 pp29-38

Reading:
TB1 pp 4-11
TB2 pp 12-28

Reading:
TB1 pp 4-11
TB1 pp 1228

142

Undergraduate Information Technology Program National Harmonized Modular Curriculum

3.9.

13-16

Websites, e-commerce and data: rights to access and to


privacy, data banks, the growth of the electronic porn industry
(what's on my hard drive?)
Part 4: Commentary on Legal Frameworks and Enforcement:
4.1.
Federal Legislation: Privacy Act, Charter of Rights and
Freedoms, Copyright Act, Amendments to Copyright Act to
incorporate electronic retransmissions, Industrial Design Act,
Integrated Circuit Topography Act, Personal Information
Protection and Electronic Documents Act, Protection of
children and other vulnerable persons and amendments to the
Canada Evidence Act (2002-2003) and the Criminal Code of
Canada
4.2.
Ontario Legislation: Electronic Commerce Act
4.3.
The Guardians: RCMP Commercial Crime: Computer
Investigations and Support Section, International and other
nations' efforts. Impersonation, tracking: do the ends justify the
means? Standards for the examination of evidence: Law
Enforcement Computer Evidence Suite. Is self policing and
self-protection possible or even desirable? e.g P3P (Platform for
Privacy Preferences)

2012

Reading:
TB1 pp 4-11
TB1 pp 12-28

Methodology
Three lecture hours are scheduled per week for this course. These hours are fully used to lecture
new materials. Students may be asked to read certain topics on their own before a class
discussion.
As part of this courses assignment the class will be divided into groups. At the end of the
course, each group in the class is supposed to do assignments and present it in class. The delivery
of the project is subjected to deadline. No extensions will normally be granted for the deadline.
There will be midterm exam for this course. Final examination will be given on the dates
specified by the University. The examinations will focus on understanding and applying the
concepts taught in class and in tutorial sessions of the course.

Assessment Methods
Your final mark will be calculated as follows:
Evaluation (100%):

30 % Midterm exam
10% Assignments
60% Written final examination

Reference books

1. The Handbook of Information and Computer Ethics: Kenneth Einar Hemma and
Herman T.Tavani, New Jersey, USA (2008)
2. Professional Issues in Information Technology: Frank Bott, The British Computer
Society, UK (2005)
3. Ethical and Social Issues in Information Systems: 2005
143

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Program
Course Code
Course Title:
Degree Program
Module Name
Module No.
Course Chair

2012

University Logo
University Name
Information Technology Program
Information Technology
Itec4143
Current Topics in Information Technology
Information Technology
Information Technology and Society
14
Office location:
Mobile:
Consultation Hours:

; e-mail:

Instructor/Tutor

ECTS Credits
(CP)
Contact Hours
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:
Year /Semester
Pre-requisites
Status of the
Course

Office location:
Mobile:
; e-mail:
Consultation Hours:
5
Lecture
2

Tutorial
3

Lab/Practical
-

Home Study
5

Total
10

4th year Information Technology students


IV/II
Elective

The content of the course is based on the current issues selected by the instructor.

University Name
Institute of Technology
144

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Information Technology Program


Module Number
Module Name
Total ECTS of the
module

Objective of the
module

ITec_M15
Knowledge Base Systems
5

The objectives of the module are:

Explain basic concepts of artificial intelligence

Enable students to understand reasoning, knowledge


representation and learning techniques of artificial intelligence.
Courses in the Module

Course Code

ITec3151

Course Name

Introduction to Artificial Intelligence

Credit
ECTS (CP)
Hours
(existing)
3
5

University Name
Program
Course Code
Course Title:
Degree Program
Module Name
Module No.
Course Chair

School of Computing and Electrical Engineering


Information Technology
ITec3151
Introduction to Artificial Intelligence
Information Technology
ITec_M 15
10
Office location:
Mobile:
Consultation Hours:

; e-mail:

Instructor/Tutor

ECTS Credits
(CP)
Contact Hours
(per week)
Lecture days,
Hours and Room:
Tutorial/Lab days

Office location:
Mobile:
; e-mail:
Consultation Hours:
5
Lecture
2

Tutorial
0

Lab/Practical
3

Home Study
5

Total
10

145

Undergraduate Information Technology Program National Harmonized Modular Curriculum

and Hours
Target Group:
Year /Semester
Pre-requisites
Status of the
Course

2012

3rd year Information Technology Students


III year, II semester
Elective

Course description
The purpose of this course is to give students an understanding of Artificial Intelligence
methodologies, techniques, tools and results. Students will use at least one AI-language [Lisp,
Prolog]. Students will learn the theoretical and conceptual components of this discipline and firm
up their understanding by using AI and Expert System tools in laboratory sessions, projects and
home assignments
Course Objective:
At the end of this course the students will be able to:
Understand reasoning, knowledge representation and learning techniques of artificial
intelligence
Evaluate the strengths and weaknesses of these techniques and their applicability to
different tasks
Assess the role of AI in gaining insight into intelligence and perception
know classical examples of artificial intelligence

know characteristics of programs that can be considered "intelligent"

understand the use of heuristics in search problems and games

know a variety of ways to represent and retrieve knowledge and information

know the fundamentals of artificial intelligence programming techniques in a


modern programming language
consider ideas and issues associated with social technical, and ethical uses of machines
that involve artificial intelligence
Content

CHAPTER 1:
1. Introduction to AI
1.1. Objectives/Goals of AI
1.2. What is AI?
1.3. Approaches to AI making computer:
1.3.1. Think like a human ( Thinking
humanly)
1.3.2. Act like a human (Acting humanly)
1.3.3. Think rationally (Thinking rationally)
1.3.4. Act rationally (Acting rationally)
1.4. The Foundations of AI
1.5. Bits of History and the State of the Art

Week
week 1 and 2

Reference book
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.

146

Undergraduate Information Technology Program National Harmonized Modular Curriculum

CHAPTER 2:
2. Intelligent Agents
2.1. Introduction
2.2. Agents and Environments
2.3. Acting of Intelligent Agents (Rationality)
2.4. Structure of Intelligent Agents
2.5. Agent Types
2.5.1. Simple reflex agent
2.5.2. Model-based reflex agent
2.5.3. Goal-based agent
2.5.4. Utility-based agent
2.5.5. Learning agent
2.6. Important Concepts and Terms
CHAPTER 3:
3. Solving Problems by Searching and
Constraint Satisfaction Problem
3.1. Problem Solving by Searching
3.2. Problem Solving Agents
3.3. Problem Formulation
3.4. Search Strategies
3.5. Avoiding Repeated States
3.6. Constraint Satisfaction Search
3.7. Games as Search Problems
CHAPTER 4:
4. Knowledge and Reasoning
4.1. Logical Agents
4.2. Propositional Logic
4.3. Predicate (First-Order)Logic
4.4. Inference in First-Order Logic
4.5. Knowledge Representation
4.6. Knowledge-based Systems
5. Uncertain Knowledge and Reasoning (optional)
5.1. Quantifying Uncertainty
5.2. Probabilistic Reasoning
5.3. Probabilistic Reasoning over Time
5.4. Making Simple Decisions
5.5. Making Complex Decisions
Chapter 5:
6. Learning
6.1. Learning from Examples/Observation
6.2. Knowledge in Learning
6.3. Learning Probabilistic Models
6.4. Neural Networks

weeks 3 and 4

Weeks 5,6,7 and


8

Weeks 9 and 10

weeks 11 and 12

Weeks 13 and 14

2012

Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.

Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.

Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.

Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.
Russell, S. and P.
147

Undergraduate Information Technology Program National Harmonized Modular Curriculum

7. Communicating, Perceiving, and Acting


7.1. Natural Language Processing
7.2. Natural Language for Communication
7.3. Perception
7.4. Robotics

weeks 15 and 16

2012
Norvig (1995)
Artificial
Intelligence: A
Modern Approach
Prentice-Hall.

Methodology
The course will be delivered in lectures (with a participatory approach with particular attention to
encourage students in asking questions and answering), present their assignment and actively
participate in the lab session.
Assessment Method (Continuous):

Lecture 100%
Lab
100%
Text Book
Russell, S. and P. Norvig (1995) Artificial Intelligence: A Modern Approach Prentice-Hall.
References
1. Luger, G. (2002) Artificial Intelligence, 4th ed. Addison-Wesley.
2.Bratko, Ivan (1990) PROLOG Programming for Artificial Intelligence, 2nd ed.
Addison-Wesley, 1990
3.Winston, P.H. (1992) Artificial Intelligence Addison-Wesley.
4.Ginsberg, M.L. (1993) Essentials of Artificial Intelligence. Morgan Kaufman.
Software Requirement: PROLOG, LISP and PYTHON

University Name
Institute of Technology
Information Technology Program
Module Number
Module Name
Total ECTS of the
module

Objective of the
module

ITec_M 16
Information Technology Research and Project
16

The objectives of the module are:

Enable students to understand fundamental concepts and


principles of writing research papers
Enable students to apply their prior knowledge in identifying real
world problems, analyze, design, implement, test and deploy IT
projects
Enable students to identify recent research topics in IT, prepare
148

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Code

ITec3161
ITec4162
ITec4163
ITec4164

2012

and present seminars on such issues


Enable students to understand the basic skills of preparing and
presenting IT seminars
Courses in the Module
Course Name
Credit
ECTS (CP)
Hours
(existing)
Individual Project
2
3
Basic Research Methods in Information
Technology
2
3
Industrial Project I
3
5
Industrial Project II
3
5
University Name
School of Computing and Electrical Engineering

Program

Information Technology

Course Code

ITec4162

Course Title:

Basic Research Methods in Information Technology

Degree Program

Information Technology

Module Name

Information Technology Research and Project

Module No.

ITec_M 16

Course Chair
Office location:
Mobile:

; e-mail:

Consultation Hours:
Instructor/Tutor
Office location:
Mobile:

; e-mail:

Consultation Hours:
149

2012

Undergraduate Information Technology Program National Harmonized Modular Curriculum

ECTS Credits
(CP)

Contact Hours
(per week)

Lecture

Tutorial

Lab/Practical

Home Study

Total

Lecture days,
Hours and Room:
Tutorial/Lab days
and Hours
Target Group:

4th year Information Technology Students

Year /Semester

Year: IV, Semester: I

Pre-requisites

None

Status of the
Course

Compulsory

150

Undergraduate Information Technology Program National Harmonized Modular Curriculum

Course Outline
Course
Description

2012

This course concerns us with the topic of research. It attempts to define


what research is, why we do research, and the various methods that
researchers use to investigate problems.
It is designed as an under-graduate introduction to research methodology.
Students are assumed to be familiar with statistics (such as mean, standard
deviation, percentiles, and other such terms). The course provides a
framework for conceptualizing research and is meant to underpin the
research project for the final year as well as for the projects delivered for
each subject.

Course Objective

At the end of this course, students will be able to understand:


The terminologies used by professional researchers employing
scientific thinking.

How to formulate a solid research hypothesis (research question).

the basic stages of research design

types of proposals and the contents of each

the issues covered in research ethics

the relationships that exist between variables in research design


and the steps for evaluating those relationships

Content

Lesson weeks

Reference book

Brief Introduction about the Course

1st Week

Course guide book

2nd,3rd week

-Donald H. (PP 349)

Chapter 1. THE NATURE AND SCOPE OF RESEARCH


What is research?
Research and theory
The Scientific approach

-McBurney,(pp1722)

Stages of the research process

-Marczyketal (pp1932)

Components of a Research Proposal

-Kothari (pp.1-24)

Writing a Research Proposal

151

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Project will be given


Chapter 2: FORMULATION OF THE RESEARCH
PROBLEM

Cooper, Donald
4th and 5th week

Selection of a general topic

G. Marczyk

Literature review and the exploratory study

etal (pp 34-37)

Specification of objectives and hypotheses

-Kothari (pp.24-29)

Concepts and variables

Project Proposal Submission to the Instructor

Assignment I will be given to students

Chapter 3: The Research Process

6th week

Major Steps in the Research process


Chapter 4: The Research Design
Research Design

Sing (pp.62-88)
7th, 8th and 9th
week

Sampling Methods

-Cooper, Donald
(pp306-326 and pp.
356-387)
-Kothari (pp.31-121
and pp.152-180)

Measurement
Measurement scales

-Sing (pp.88-121)

Instrument Design
Mid Exam

-Cooper, Donald

Chapter 5: Analysis and Presentation of Data


Data presentation and description
Exploring, displaying , and examining data
Hypothesis testing
Measures of association
Report witting : Presenting insights and findings;
Written and oral reports

10th , 11th and


12th week

(Pp 437-570)
-Sing (pp.122-270)
- Kothari (pp.122151 and pp. 184360)

Presentation of Assignments by students in Class will start


(a random group may be asked to Presentation)

152

Undergraduate Information Technology Program National Harmonized Modular Curriculum

2012

Chapter 6: Current Research Topics in IS

13th week

-The Internet

Chapter 7: Ethics in Research

14th week

Donald H. (pp.319340)

Project Presentation

15th -16th Week

------

Final Examination
Methodology
The course will be delivered with lecture, accompanied by active student participation (asking
questions, discussing on the raised questions, presenting the assignments).
Assessment Method (Continuous):
Summary of course assignment, test and exam

Assignment ..... .. 10%

Mid exam . 30%

Project ...... 20%

Final exam 40 %

Total .. 100%

References
1. Cooper, Donald (2006). Business research methods, 9th Ed, McGraw-Hill
2. G. Marczyk, D. Demattoe, D. Festinger(2005). Essentials of research methodology and
design. John Wiley and Sons, Inc.
3. Donald H. McBurney(1998). Research methods, 4th Redbooks/Cole Publishing Company.
University of Pittsburgh.
4. Kothari, C.R. (2004), Research Methodology: Methods and Techniques, Second
edition(Available in Soft Copy)
5. Sing, K. (2007), QUANTITATIVE SOCIAL RESEARCH METHODS, Sage Publications

153

You might also like