Académique Documents
Professionnel Documents
Culture Documents
ICT DEPARTMENT
2011
NTA LEVEL 4
CURRICULUM INFORMATION REPORT FOR BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT) 1.0 BACKGROUND INFORMATION 2.0 MODULE CODING 3.0 GRADING SYSTEM 4.0 AWARDS 5.0 AWARDS CLASSIFICATION 6.0 SUMMARY FRAMEWORK 7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUE AND ASSESSMENT CRITERIA 8.0 PROGRAM STRUCTURE 9.0 NACTE STANDARDS AND RELATED OUTCOMES 10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS 11.0 BENCHMARKING OF ASSESSMENT CRITERIA 12.0 MODULES DESCRIPTION BTCIT 411 BTCIT 412 BTCIT 413 BTCIT 414 BTCIT 415 BTCIT 421 PC Fundamentals Introduction to Computer Networking Introduction to Communication Skills Basic Mathematics Office Automation Introduction to Programming 29 30 31 32 34 3 14 22 28 28 11 9 9 4 5 6 6 7 7
Introduction to Entrepreneurship Web Design Basics Introduction to Computer Maintenance Basic Database 38 39
36 37
1.0
BACKGROUND INFORMATION The philosophy behind the development of competence modular curricula is to comply with the Nations Vision and Mission, whic h require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.
Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.
The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.
The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization.
The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year. 5
1.0
BACKGROUND INFORMATION The philosophy behind the development of competence modular curricula is to comply with the Nations Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.
Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.
The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.
The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization. 6
The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year.
2.0
MODULE CODING The coding of modules follows logical sequence as in the following example for BTCIT 411
BTCIT
The first digit for the NTA level, in this case Basic Certificate which is level Four.
The second digit stands for semester, i.e for semester one
The last digit stands for the order of the module in the semester. Module are arranged serially the highest number, depending upon the number for modules in the semester.
3.0
GRADING SYSTEM The grading of assessment results in conformity with the NACTE grading system as follows. NTA Level 4 Grade A B C F I Definition Excellence Good Average Failure Incomplete Score 80-100 65-79 50-64 0-49
4.0
AWARDS The awards shall be made to students who satisfy the following conditions. (a) Have completed modules for the award. (b) Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. (c) GPA shall be computed from cumulative scores earned by students using NACTE guideline.
5.0
AWARDS CLASSIFICATION: Awards Classification for NTA Level 4 Class of Award First Class Second Pass Cumulative GPA 3.5 to 4.0 3.0 to 3.4 2.0 to 2.9
6.0
SUMMARY FRAMEWORK 9
4.1 4.2
BASIC TECHNICIAN CERTIFICATE IN ICT This qualification is intended for persons who will assist in performing routine operational activities with IT equipment and accessories: troubleshoot computer hardware and configure basis network; Install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers; under close supervision. Furthermore more they will assist IT users and solve their own day-to-day IT related challenges. 4 The holder of this qualification will assist in performing routine operational activities in IT troubleshoot computer hardware and configure basic network; install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers. 120 120 Form four with at least three passes including mathematics June 2011
4.3 4.4
MINIMUM OVERALL CREDITS MINIMUM CREDIT AT THIS LEVEL MINIMUM ENTRY QUALIFICATIONS DATE OF DEVELOPMENT
10
7.0
S/N PLO 1
PRINCIPAL LEARNING OUTCOMES Trouble shoot computer hardware and configure basis network Install computer hardware and Software and maintain computers Design the web and implement relational database
CREDIT VALUES 24
ASSESSMENT CRITERIA 1.1 Computer hardware is properly trouble shot, and network properly configured. 2.1 Computer hardware and software are properly installed 2.2 Computers are properly maintained
PLO 2
12
PLO 3
24
3.1 The web is correctly designed 3.2 The web is clearly coded, evaluated and maintained 3.3 Relational database is properly implemented
PLO 4
12
4.1 Ms word, excel are properly entered and formatted 4.2 Ms Power Point is properly applied
PLO 5
12
5.1 Simple programs are properly prepared and tested by applying basic VB concepts. 6.1 Principles of communication are properly applied 6.2 Entrepreneurship principles are properly applied
PLO 6
36
Total credit
120
8.0
11
S/N CODE 1. 2. 3. 4. 5. BTCIT 411 BTCIT 412 BTCIT 413 BTCIT 414 BTCIT 415
NAME OF MODULE PC Fundamentals Introduction to Computer Networking Introduction to Communication Basic Mathematics Office Automation
CREDITS 12 12 12 12 12 60
SEMESTER II S/N CODE 1. 2. 3. 4. 5. BTCIT 421 BTCIT 422 BTCIT 423 BTCIT 424 BTCIT 425 NAME OF MODULE Introduction to Programming Introduction to Entrepreneurship Web Design Basics Introduction to Computer Maintenance Basic Database CREDITS 12 12 12 12 12 60
12
9.0 NACTE STANDARDS AND RELATED OUTCOMES PRINCIPAL LEARNING ENABLING OUTCOMES OUTCOMES PLO 1 Troubleshoot computer hardware and configure basic network 1.1 Troubleshoot computer hardware
SUB-ENABLING OUTCOMES
PLO 2
2.1.1 Identify different parts of hardware 2.1.2 Describe the functions of different parts of computer software 2.1.3 Connect various parts of computer hardware.
2.3.1 Make back-ups 2.3.2 Clean hardware 2.3.3 Defragment files 2.3.4 Protect surging and viruses
PLO 3
Design the web, describe database concepts and implement the relational database design.
3.1.1 Describe the web and related basic terms 3.1.2 Identify the characteristics and parts of the web.
13
3.2.1 Identify the requirements for design and contents of the web 3.2.2 Identify the classes and types of the web
3.3.1 Plan and design the web 3.3.2 Code the web 3.3.3 Evaluate and maintain the web
3.4 Describe database concepts, Applications, data models, schemas and instances
3.4.1 Describe basic database concepts and applications 3.4.2 Describe data models and schemas
3.5 Describe storage organizations concepts and identify database languages and interfaces.
3.5.1 Describe storage organization concepts. 3.5.2 Identify database, languages and identify interfaces. 3.6.1 Implement relational database design 3.6.2 Implement data modelling using ER models 4.1.1 Describe word processing and a word processor 4.1.2 Start ms word 4.1.3 Enter and format text 4.2.1 Describe spread sheets 4.1.2 Start ms excel 4.3.3 Enter and format a spread sheet 14
4.3.4 4.3.1 4.3.2 4.3.3 5.1.1 5.1.2 5.1.3 5.2.1 5.2.2 5.2.3 5.3.1 5.3.2 5.4.1 5.4.2 5.4.3 5.4.4 6.1.1 6.1.2 6.1.3 6.1.4 6.2.1 6.2.2 6.2.3 6.2.4 6.3.1 6.3.2
Apply formulae and functions Describe power point Start ms power point Enter and format slides Describe the structure of VB Apply basic concepts of VB Describe the code writing structures Identify various variables Identify constants Identify various data types Apply functions Apply sub-functions Describing objects Work with objects Create objects Relate objects to each other Apply communication concepts, processes and skills Take and make notes Make oral presentations Apply reading and writing skills Solve simple operations Work out ratios and conversion expressions Solve fractions and algebraic expressions Apply Business mathematics in real world Describe entrepreneurship Describe basic entrepreneurship issues
15
10.0
SUB-ENABLING OUTCOME
1.1.1
1.1.2
1.2.1
Track network resources and add hardware to existing network Identify different parts of hardware
2.1.1
2.1.2
2.1.3
Describe hardware fault List possible sources of hardware faults Describe methods of detecting faults List different ways of correcting faults Describe contents of hardware fault Report hardware faults Describe network resources List network resources Add required hardware to the network Identify different parts of hardware Describe input devices Describe the CPU Describe Output devices Describe External storage devices Describe Communication devices List functions of Input devices List functions of the CPU List functions of External storage devices List functions of Communication devices Identify various parts of hardware Connect together power supply, CPU, screen, keyboard and mouse Test the system
The functions of different parts of computer hardware are clearly described Various parts computer hardware are correctly connected
16
17
2.2.1
2.2.2
2.3.1
Make back-ups
Describe software Describe system software Describe application software Identify major classes of application software Explain advantages and disadvantages of the two types of application software. Explain the preconditions of installing software Installs software Customize software installation package Configure software restrictions Enforce properties Identify reasons for making back-ups Identify what is to be backed up Explain storage media to be applied Describe back methods (Manual versus Automatic)
2.3.2
Clean hardware
2.3.3
Defragment files
Identify various hardware that need cleaning Identify tools needed for hardware cleaning Clean mouse Clean keyboard Clean Screen Describe Fragment and Defragmentation Identify types of causes of fragmentation Preventing and eliminating
18
fragmentation
3.1.1 Describe the web and related basis terms 3.1.2 Identify the characteristics and parts of the web 3.2.1 Identify requirement for design and contents of the web 3.2.2 Identify the classes and types of the web
3.3.3 Evaluate and maintain the web 3.4.1 Apply Database concepts
Describe surging Protect surging Describe viruses Protect viruses Describe we List types of the web Describe the web terms Identify the characteristics of the web Identify the parts of the web Describe the contents of the web page Identify the requirement for design List contents of the web Describe the contents of the web page Describe the class of the web site Describe the types of the web site Identify the restrictions in web design Plan the web Design the web Review the design web Code the web program Test the web Review the web Evaluate the web Monitor the web Maintain the web Describe Management Information System
The web and related basic terms are clearly described The characteristics and parts of the web are clearly identified Requirement for the design and contents of the web are clearly identified The classes and types of the web are clearly described.
The web properly planned and designed The web is correctly coded
Class assignments and exercises Class assignments and exercises Class assignments and exercises Class assignments
Questions and solutions Questions and solutions. Questions and solutions Questions and 19
The web is properly evaluated and maintained Database concepts and applications are correctly
Identify the advantages of Management Information System List data models Describe data models Describe schemas
3.5.1 Apply and implement storage organisation concept 3.5.2 Identify database language and interfaces
Describe data flow diagrams Implement data storage structure Evaluated storage structures Identify database language and interfaces Describe database language Describe the interfaces Describe the design process Identify the steps of the database design process Describe the steps of the design process Describe Entity Relationship Describe attributes Implement Relationships Describe the word processor Describe word processing Identify the features of a word processor Start Ms word Load documents Close Ms word
Data storage organisation concepts are properly applied Database language and interfaces are clearly identified Relational database is properly designed
3.6.2 Implement data modelling using ER models 4.1.1 Describe word processing and a word processor
Data modelling is properly implemented using ER model Word processing and processor are clearly described Ms word is properly started
Enter text Format text Save the document Describe a spread sheet List the features of a speared sheet List advantages of excel Start Ms Excel Load Ms excel documents Close the spread sheet
Text is properly entered and formatted Ms excel is clearly described Ms excel is properly started
Class assignments and exercises Class assignments and exercises Class assignments and exercises
4.2.3 Enter and format a spread sheet 4.2.4 Apply formulae, and function 4.3.1 Describe power point
Enter data Format the spread sheet Save the spread sheet Apply formulae Apply functions Apply charts Describe power point Identify various aspects of power point Exit Ms Power Point Start Ms power point Load power point documents List advantages of Power point Enter slides Add and delete slides Format slides Explain basic of VB List basic terminologies of VB Explain basic terminologies in VB
Ms excel is properly entered and formatted Formulae and functions are properly applied Ms Power point is clearly described
Class assignments and exercises Class assignments and exercises Class assignments and exercises
Ms Power point is properly started. Slides are properly entered and formatted The structure of VB is clearly described
Class assignments and exercises Class assignments and exercises Class assignments and exercises
21
Identify the structure of VB Star VB Configure environment options Identify code modules Apply the code editor Apply decision structures (If Then, If.Then Else, Select Case) Apply Loop structures (Do Loop Apply Loop structure (ForNext, For each ..Next) Identify various variables Describe various variables Apply various variables
5.2.2
Identify constants
5.2.3
5.3.1
5.3.2
Apply sub-functions
5.4.1
Describe objects
Identify various constants Describe various constants Apply various constants Identify data types Describe various data types Apply various data types Describe a function Create a sub-function Passing data to a function Describe a sub-function Create a sub-function Passing data to a sub-function Describe objects Identify the source of Objects Differentiate between Objects and Classes
Constants are clearly identified Various data types are clearly identified Functions are properly applied Sub-function are properly applied Objects are clearly described
Class assignments and exercises Class assignments and exercises Class assignments and exercises Class assignments and exercises Class assignments and exercises
Questions and solutions Questions and solutions Questions and solutions Questions and solutions Questions and solutions
22
5.4.2
5.4.3
Create objects
5.4.4
Relate objects to each other Apply communication concepts, process and skills Take and make notes
6.1.1
Controlling Objects with their Properties Setting property values Apply Methods in Codes Apply object variables Declare object variables Assign object variables List types of objects Apply forms as objects Pass objects to procedures Describe Object Hierarchies Use a collection of Objects Make Objects communicate Identify correct tenses Write grammatical correct sentences Identify the voices (passive/active) Write simple sentences Copy different passages Summarise simple passages Read passage Respond to questions and answers verbally Makes short presentations
Objects are properly related to each other Communication concepts, process and skills are properly applied Notes are properly taken and made Oral presentations are properly made
6.1.2
6.1.3
6.1.4
6.2.1
Apply reading and writing Read selected passages Write letters skills Prepare e-mails Solve simple operations Perform fundamental arithmetic operations Calculate fractions and mixed numbers Calculate percentages
Reading and writing skills are properly applied Simple operations are correctly solved
23
6.2.2
Work out ratio and conversion problems Solve fractions and algebraic expressions
6.2.3
6.2.4
Apply business mathematics in real world problems Describe entrepreneurship Describe basic entrepreneurship issues
6.3.1
6.3.2
6.3.3
6.3.4
Run and operate a micro business Describe risks rewards and key personal entrepreneurship competences
6.3.5
Calculate ratios Calculate proportions Calculate unit analysis Calculate fractions Calculate algebraic expressions Apply fractions and algebraic expressions to business problems Apply business maths in calculating partnership profits Apply business mathematics in calculating discount, commission simple or compound interest Describe entrepreneurship Describe enterprise Describe an entrepreneur Describe entrepreneurial traits Describe entrepreneurial attitudes Describe entrepreneurial characteristics Identify the roles of entrepreneurship in Tanzania Identify the importance of entrepreneurship. Identify problems facing entrepreneurship Start a micro business Run a micro business Evaluate the micro business Identify entrepreneurship risks Identify entrepreneurship rewards Identify key personal competencies
Ratios and conversions are accurately worked out Fractions and algebraic expressions are correctly solved Business mathematics is properly applied in real world problems Entrepreneurship is clearly described Basic entrepreneurship issues are clearly described
Micro business is properly run and operated Risks, rewards and key personnel entrepreneurship competencies are clearly described
24
25
BENCHMARKING OF ASSESSMENT CRITERIA ASSESSMENT CRITERIA SATISFACTORY Hardware faults are correctly detected Describes hardware faults
GOOD Describe hardware faults and lists possible sources of hardware faults
EXCELLENT Describe hardware faults, lists possible sources of hardware faults and describes methods of detecting faults.
1.1.2
List different ways of correcting List different ways of correcting faults and describes hardware faults, describe hardware faults faults and reports hardware faults Describes and lists network resources Describe, list network resources and adds required hardware to the network Identifies different parts of hardware, the CPU, input devices and output device external storage and communication devices. List functions of input devices, the CPU, Output devices, external storage units and the communication devices Identify various parts of hardware application software and explains advantages and disadvantages of application software.
1.2.1
2.1.1
Identifies different parts of hardware, describes the CPU, Input devices and output devices List functions of input devices, the CPU and output devices
2.1.2
2.1.3
26
2.2.1
Describes software, system software, application software and explains advantages and disadvantages of application software Explains preconditions of installing software, installs software, customises software installations, configures software restrictions and enforces properties Identifies reasons for making backups, explains storage media to be applied and describe back up methods Identifies hardware to be cleaned and tools to be used and cleans all hardware parts. Describes, fragmentation and defragmentation and identifies types and causes of fragmentation, and prevents and eliminates fragmentation Describes, protects surging and describes viruses and protects viruses. Describes the web, parts of the web and describes characteristics 27
2.2.2
Explains preconditions of installing software installs software, customise software installations, and configure software restrictions Identifies reasons for making back-ups and explains storage media to be applied
2.3.1
2.3.2
2.3.3
Described fragmentation and defragmentation and identifies types and causes of fragmentation
2.3.4
3.1.1
terms are clearly described 3.1.2 Characteristics and parts of the web are clearly identified and described. Identifies characteristics of the web
types of the web. Identifies characteristics of the web and parts of the web
of the web Identifies characteristics of the web, parts of the web and describes characteristics of the web. Identifies requirement for design and lists contents of the web page and describes identifies requirements for the design and lists contents of the web page. Describes classes of the wed, types of the web and identifies the restrictions of the web design. Plans and design the web and reviews the designed web. Codes, tests the web and reviews the web Evaluates, monitors the web and maintains the web. Describe database, Management Information System and identifies advantages of a Management Information System Lists Data models, describes data models and describes schemas 28
3.2.1
Requirements for the design and contents of the web are Clearly listed
Identifies requirements for the design and lists contents of the web page
3.2.2
3.3.1
The web is properly planned and designed The web is correctly coded
3.3.2
Codes the web and tests the web Evaluates and monitors the web Describes database, Management Information System
3.3.3
The web properly evaluated and maintained Apply Database concepts and applications
3.4.1
Describes database
3.4.2
3.5.1
Describes Data flow diagrams and implements data storage structures properly. Identifies database language and interfaces and describes database languages Describes the design process and identifies the steps of the database design process
Describes Data flow diagrams, implements and evaluate data storage structures properly. Identifies database language and interfaces, and describes database languages and interfaces. Describe the design process, identifies steps of the design process describes the steps of the design process properly. Describes entity relationship, attributes and implements relationship properly. Describe Word processing and word processor and identifies features of a word processor. Starts, load and exists Ms word
3.5.2
3.6.1
3.6.2
4.1.1
4.1.2
Starts Ms word
4.1.3
Enters text
Enters and formats text and save Ms word documents. Describes, lists features and advantages of excel Starts, loads Ms excel documents and exists Ms excel.
4.2.1
Describes Ms Excel
Describes and lists features of Ms excel Starts Ms excel and loads Ms excel documents
4.2.2
Starts Ms excel
29
4.2.3
A spread sheet is properly entered and formatted Formulae and functions are properly applied Ms Power point is clearly described
Enters and formats data and save Ms excel documents. Applies formulae, functions and charts. Describe Ms power point, identifies various aspects of power point and exits power point. Starts Ms Power point, loads Ms power point and lists advantages of power point Enters, add and deletes and formats slides Explains the basics of VB, lists and explain terminologies of VB Identifies basic concepts of VB, start configure environment options of VB, identifies code modules, and applies the code editor. Applies the code writing structures (Ifthen, IfthenElse, Select case) and loop structures (DoLoop, ForNext, For eachNext). Identifies, describes and applies 30
4.2.4
Applies formulae
4.3.1
Describes Ms power point and identifies various aspects of power point. Starts Ms Power point, loads Ms power point
4.3.2
4.3.3
Slides are properly entered and formatted The structure of VB is clearly described Basic concepts of VB are properly applied
Enters slides
5.1.1
Explains the basics of VB and lists terminologies of VB Identifies basic concepts of VB, start and configure environment options of VB
5.1.2
5.1.3
Applies the code writing structures (If then, IfThenElse, Select case)
Applies the code writing structures (If then, IfThen Else, Select case) and loop structure (Do Loop)
5.2.1
variables Identifies and describes constants Identifies and describes various data types correctly Describes and creates functions correctly Describes and creates Subfunctions correctly Describes Objects and identifies sources of objects clearly
various variables. Identifies, describes and applies constant Identifies, describes and applies various data types correctly. Describes, creates and passes data to Sub-functions correctly. Describes, creates and passes data to Sub-functions correctly. Describes Objects, identifies sources of objects and differentiates objects and classes clearly. Controls objects and their properties properly and sets properly and values and applies methods in codes. Applies objects variables, declares object variables, lists types of objects, apply forms as objects and passes objects to procedures correctly. Describes objects hierarchies correctly, uses a collection of objects and makes objects 31
5.2.3
Various data types are clearly identified Functions are properly applied
5.3.1
5.3.2
5.4.1
5.4.2
Controls objects and their properties properly, and sets property values
5.4.3
Applies objects variables and declares object variables and lists types of objects correctly
5.4.4
communicate correctly 6.1.1 Communication concepts, processes and skills are properly applied Identifies correct tenses Identifies correct tenses and writes correct grammatical sentences Identifies, correct tenses and writes correct grammatical sentences and identifies voices (passive/active) Writes simple sentences correctly, copies different passage and summarises simple passages. Reads passages correctly, responds to questions and answers orally, and makes short presentations correctly. Reads selected passages, writes letters and prepares e-mails correctly. Performs fundamental arithmetic operations, calculates fractions and mixed numbers correctly and calculates percentages. Calculates ratio, proportions and unit analysis correctly
6.1.2
Writes simple sentences correctly and copies different passages Reads passages correctly and responds to questions and answers orally
6.1.3
6.1.4
6.2.1
Performs fundamental arithmetic operations and calculates fractions and mixed numbers correctly Calculates ratios and proportions correctly
6.2.2. Ratios and conversions and problems are accurately worked out 6.2.3 Fractions and algebraic expressions are correctly solved
Calculates fractions and algebraic expressions and applies functions and algebraic expressions to business problems correctly. 32
6.2.4
Calculates business profits and applies ratios in calculating partnership profits correctly
Calculates fractions and algebraic expressions and applies ratios in calculating partnership profits, discounts, commission and simple/compound inters correctly. Describe entrepreneur, enterprise and entrepreneurship correctly. Describe entrepreneurship traits and attitudes correctly and describe entrepreneurial characteristics. Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship and identifies the problems facing entrepreneurship Start, run and evaluates a micro business Identifies entrepreneurship risks, reward and key personal competencies correctly.
6.3.1
Describe entrepreneur and enterprise correctly Describe entrepreneurship traits and attitudes correctly
6.3.2
6.3.3
Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship
6.3.4
Micro business is properly run and operated Risks, rewards and key personnel entrepreneurship competencies are clearly described
6.3.5
33
: : :
: :
1.2.1 Track network resources 1.2.2 Add hardware to existing network Chalk board, flip chart stand, overhead projectors and computer This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES 1. 2. 3. 4. 5. Christo J.P. Moschovitis, History of the Internet: a chronology, 2009, Prentice Hall Michael A. Banks, On the way to the web. 2008, A press Plattner B, Computer Networks, 2008, Prentice Hall Stallings W, Wireless Communication and Networks, 2008, Prentice Hall Tanenbaum A.S, Computer Networks, 2005, Prentice Hall
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%
34
: : :
Apply communication concepts, processes and skills Take and make notes Make oral presentations Apply reading and writing skills work
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES 1. Davis M, Communication Skills, 2008, New Herbinger Publications, USA 2. James C, Mc Coskey, Richmond P, An Introduction to Communication in the classroom: the role of the communication in Teaching and Training, 2008, Alley and Baco. 3. Mahundu C M A, A Manual on Communication Skills Toward improving Communication Skills in English Language, 2008, Benedict Fathers, Ndanda, Tanzania. 4. Pual P and Korthali J S, Essentials of Business Communication, 2009, Sultan Chand and Sons 5. Shumbusho, Mwaijande, Business Communication Skills Hand book, 2003, Mzumbe University.
40% 60%
36
: : :
Solve simple operations Work out ratios and conversion problems Solve fractions and algebraic expressions Apply Business mathematics in real world
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES 1. 2. 3. 4. 5. Haemstock, H, Elements of Business Mathematics, 2008, Harrp Hughe, R J and Richard, D, Business Maths Essentials, 2008, Irwin Inc Mc Keague, C P, Pre Algebra, 2009, Brooke Cole Publishing Company Streete, R J, Basic Mathematics Skills with Geometry, 2007, McGraw Hill Willace, M, Pills, C, Mathematics for Business, 2008, Gage Education Publish Ltd.
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60% 37
: : :
4.1.1 4.1.2 4.1.3 4.2.1 4.2.2 4.2.3 4.2.4 4.3.1 4.3.2 4.3.3
Describe word processing and a word processor Start Ms word Enter and format text Describe spread sheets Start Ms excel Enter and format a spread sheet Apply formulae and functions Describe power point Start Ms power point Enter and format slides
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Birton P, Introduction to Computers, 2009 2. Cox J. Lambert J, Frye C, Microsoft Office Professional 2010 Step, 2010, Microsoft press 3. Doyle S, Understanding information and Communication technology, 2009, Delta Place Thornes 4. McManus S, Microsoft Office for the Older and Wiser: GetUp and Run with Office 2010, 2010 John Wiley. 5. Shelly/Cashman/Vermaat, Introduction, Concepts and Techniques, 2008, Microsoft Office 38
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%
: : :
Describe entrepreneurship Describe basic entrepreneurship Describe the role of entrepreneurship Tanzania Start and run micro business Describe risk, rewards and key personal entrepreneurship competencies Apply Business mathematics in real world
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
2. 3. 4. 5.
Burns P, Entrepreneurship and small Business, 2009, Palgrave Owen J, How to Sell, 2011, Prentice Hall Robson C, Confession of an Entrepreneur, 2010, Prentice Hall William S, Financial Times Guide to Business Plan Start up, 2011, Prentice Hall
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%
: : :
40
Describe the web and related basic terms Identify the characteristics and parts of the web Identify the requirements for design and contents of the web Identify the classes and types of the web Plan and design the web Code the web Evaluate and maintain the web
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Fisel C, Freelance Design in Practice, 2009, Wiley 2. Hardy J A, Carneiro C Jr, Beginning Rails 2: Freom Novice to Professionals, 2009, Wioley 3. Marks T, Good Design: Deconstruction Form and What Makes Design Work, 2009 Wiley 4. Toague J C, Speaking in Styles: Fundamentals of CSS foe Web Designers, 2009, Wiley 5. Wiedemann J, Web Design Navigation, 2009, Wiley
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%
41
: : :
Make back-ups Clean hardware Defragment files Protect surging and viruses
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Ballew J, Computer problems solved for the over 50s in Simple Steps, 2011, HP Indigo Digital Press 2. 3. 4. 5. Ballew J, Computer Basics, 2010, HP Indigo Digital Press Beales R P, PC Systems, Installation and Maintenance, 2020, Prentice Hall Johnson S, Brilliant Office 2010, 2010, Prentice Hall Resonthan J, PC Repair and Maintenance, 2010, Media Publications
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60% 42
: : :
Describe basic database concepts and applications Describe data models and schemas Describe storage organisation concepts Identify database languages and interfaces Implement relational database design Implement data modelling using ER models
TEACHING AIDS
METHODS OF INSTRUCTION
This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Desai B P, An Introduction to Database Systems, 2008, West Publication Company 2. Group I, Introduction to Database management System, 2008, McGraw Hill 3. Henry F, Silberschatz, Database system Concepts, 2009, McGraw Hill 4. IT Education Solutions Limited, Introduction to Database Systems, Pearson Education India 5. Ullman J D, Principles of Database and knowledge Base Systems, 2009, Computer Systems Press
43
INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%
44
1.0 BACKGROUND INFORMATION The philosophy behind the development of competent modular curricular is to comply with the Nations Vision and mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs. Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are the problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills. The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that given Appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. maintain computers, process files, manage computer networks, apply mathematics in solving computer problems, develop website, develop database. etc). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 5 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization. The qualification comprises of a number of modules, each module will be covered in one semester. For this course, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each semester and accounts for 34 weeks for a year. This qualification has 120 credits which is the minimum prescribed by NACTE. 45
2.0
MODULE CODING
The coding of modules follows logical sequence as in the following example for TCIT 511.
TCIT
The first digit stands for the NTA level, in this case Technician Certificate which is level five.
The second digit stands for semester, i.e. for semester one.
The last digit stands for the order of the module in the semester. Modules are arranged serially
from 1 to the highest number, upon the number of modules in the semester
46
3.0
The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 5
Grade A B C D F I
Score 80 100 65 79 50 64 40 49 00 39
4.0
AWARDS
The award shall be made to students who satisfy the following conditions. Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines. 47
5.0
AWARDS CLASSIFICATION: Awards Classification for NTA level 5 Class of Awards First Class Second Class Pass Cumulative GPA 3.5 to 4.0 3.0 to 3.4 2.0 to 2.9
48
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY. 6.0 SUMMARY FRAMEWORK QUALIFICATION TECHNICIAN TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine activities: develop database systems, design and analyze systems, prepare simple computer programs, connect peripherals, ports and network hardware CERTIFICATE IN INFORMATION & COMMUNICATION
communication systems, and apply office automation software, under less supervision. NTA LEVEL COMPETENCE LEVEL DESCRIPTOR 5 The holder of the qualification will apply skills and knowledge in a range of ICT activities some of which are non-routine of developing database systems, designing and analyzing systems, preparing simple computer programs, connecting
peripherals, ports and network hardware communication systems, applying office automation software, and assuming some operational responsibilities. CREDITS AT THIS LEVEL CUMULATIVE CREDITS AT THIS LEVEL MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL 120 0
0 49
New
ENTRANCE REQUIREMENTS
BTCIT level 4, or Form six with one principal pass either in mathematics or physics.
50
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 7.0 S/N PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA PRINCIPAL LEARNING OUTCOMES CREDIT VALUES 1.1. 24 1.2 ASSESSMENT CRITERIA
PLO 1
Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems. Apply system design and maintenance technology in database system development, web design, and analysis and design.
Communication at the place of work is effectively done. Computing mathematics skills are properly applied on solving business problems. System design technology is Properly applied.
POL 2
2.1
48
2.2
2.3
2.4 PLO 3 Prepare simple computer programmes using programming languages Connect peripherals and ports to computer network hardware communication system and apply office 12 3.1
Web is properly designed. Simple computer programs are properly prepared using computer languages.
PLO 4
4.1 Computer peripherals and ports are correctly connected to the network hardware communication system. 51
automation software.
24
4.2
Office automation software is properly applied. Computer professional ethical security principles are properly applied. Knowledge, skills and techniques of all modules learned in the course are properly applied in a real life situation.
PLO 5
Apply professional ethical security principles in computer use. Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.
5.1 12 6.1 -
PLO 6
120
52
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 8.0 PROGRAM STRUCRTURE SEMESTER I S/NO 1 2 3 4 5 CODE TCIT 511 TCIT 512 TCIT 513 TCIT 514 TCIT 515 NAME OF MODULE Communication Skills Computing Mathematics Database System Development Computer Maintenance Programming TOTAL CREDITS SEMESTER I SEMESTER II 1 2 3 4 5 6 TCIT 521 TCIT 522 TCIT 523 TCIT 524 TCIT 525 TCIT 526 Advanced Office Automation Web Design Networking Professional Ethics and Security in Computer use System Analysis and Design Practical Project TOTAL CREDITS SEMESTER II GRAND TOTAL CREDITS FOR NTA LEVEL 5 12 12 12 12 12 -60 120 CREDITS 12 12 12 12 12 60
53
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES : PRINCIPAL OUTCOMES 1. Communicate effectively ENABLING OUTCOMES 1.1 Apply mathematical Concepts in ICT. 1.1.2 SUB-ENABLING OUTCOMES 1.1.1 Apply mathematical concepts in calculation and preparation of database Solve basic problems relating to ICT using mathematical principles
and efficiently at the place of work and apply Computing mathematics skills in solving business problems.
1.2
1.2.1 1.2.2
Apply basic writing skills. Apply principles and theories involving business correspondences.
1.2.3 1.2.4
Apply employment communication. Prepare simple research proposal and write effective memos, paper presentations and other business presentations.
54
2.
2.1
Identify conditions of faults. Correct computer faults Analyze the conditions of computer systems.
and maintenance technology in database system development, web design, and system analysis and design 2.2
2.2.1 2.2.2
Diagnose problems Design web site that is easy and effective to use.
Maintain a website.
2.3.1 Design data models 2.3.2 Install and test database system 2.3.3 Update existing database.
2.4.1 Prepare system models 2.4.2 Document system problems and resolution for future reference.
55
3.
3.1.
3.1.1 Create
codes
that
meet
system
standards. 3.1.2 3.1.3 Maintain system application Innovate techniques. data visualization
4.
4.1
Describe types of computer software Apply file processes Apply data traffic flow and
computer hardware
network
coordination 4.1.4 apply Apply communication equipment and systems communication channels
automation
4.2.1
4.2.2 Connect workstation 4.2.3 Configure network 4.2.4 Test communication between workstations 4.3. Create queries and generate simple reports 4.3.1 4.3.2 4.3.3 4.3.4 Work with queries in database Create queries in design view Prepare simple reports Save and print simple reports 56
4.4
4.4.1 Maintain user accounts 4.4.2 Delete/Update user accounts 4.4.3 Assign access right (e.g. Guest, Administrator, Students)
5.
5.1.
5.1.1
5.1.2
5.1.3. Update/Install antivirus packages 5.1.4 Apply authentication methodologies in Computer use. 5.2 Apply computer ethical principles. 5.2.2 5.2.1 Maintain access right in computer use. Maintain accuracy 5.2.3 Detect/prevent (e.g. intruders) 6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation. 6.1 Maintain computer network systems 6.1.1 Connect, Configure, run networked computers. 6.1.2 Analyze network systems 57 unauthorized users. information privacy and
6.2.1 Maintain computer hardware 6.2.2 Connect computer hardware 6.2.3 Update computer software (e.g.
operating systems) 6.2.4 Manage computer networking 6.3 Analyze computer system communication 6.3.1 Communicate effectively with organizational Stakeholders (e.g. INTRANET and EXTRANET) 6.3.2. Apply computing mathematics in
58
10.0
SUB-ENABLING OUTCOMES
RELATED TASK
ASSESSMENT CRITERIA Mathematical concepts in calculation and preparation of database are properly applied
ASSESSMENT INSTRUMENTS Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
1.1.1
1.1.2
Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems). Explain sets and relations. Explain basic number theoretical functions.(e.g the MODE function, GCD, and LCM) Evaluate basic counting techniques and discrete probability Explain important
1.2.1
algorithms of graph theory. Explain Boolean logic and techniques of mathematical proofs. Apply grammar Construct sentences Write small texts
principles
checklist
1.2.2
Write business letters Write E-mail Write simple reports Write sales letters
1.2.3
1.2.4
Write employment application letters Write CVs Participate in employment interviews Search for jobs Prepare simple research proposal
Discussion Presentation
Whiteboard Markerpen 60
Write effective memos Prepare paper and other business presentations Define faults Mention condition of faults Identify different types of faults
effective memos, paper presentation and other business presentations are properly prepared Conditions of faults are correctly identified
2.1.1
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector 61
2.1.2
Mention types of instrument used Explain steps of correcting faults Fix the faults
2.1.3
2.2.1
Diagnose problems
Define the computer system Identify types of computer system Explain parts of computer system Define problems Describe the process of fixing problems Fix problems
2.2.2
2.2.3
Maintain a website
2.3.1
Describe data models Explain types of data models Give ways of designing data models Explain database system Describe ways of installing and testing database system Install and run database system Describe the features of databases Explain methods of updating
2.3.2
Discussion Presentation Discussion Presentation Tests and Quiz Assignment Discussion Presentation Tests and Quiz Assignment
Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop Checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector 62
2.4.1
2.4.2
3.1.1
databases Apply the methods to update databases Define system models Identify the types of system models Describe methods of preparing system models Apply the methods to prepare system models Explain system problems Describe resolutions of system problems Describe methods of system documentation Define codes Explain types of codes Describe methods of creating codes using programming languages (e.g
Laptop checklist
System problems and resolutions are correctly documented for future reference
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
63
Access,VB,Java, C++) Apply methods of creating codes Define system application Update new features Troubleshoot system application. Define data visualization Apply data visualization techniques Apply data visualization techniques Define computer software Identify types of computer software Identify the use of each computer software Define computer file Identify functions of computer files Describe operational functions of computer file Apply processes
3.1.3
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist 64
4.1.1
4.1.2
4.1.3
4.1.4
4.2.1
to prepare computer files Define data flow Identify parts of data flow Prepare data flow hardware communication Test dataflow hardware communication Define of communication channels Describe communication equipment(e.g. Access point, network routers,hubs,swit chers and servers) Identify types of communication channels and equipment Prepare communication channels Describe network tools Prepare tool kit(e.g. Tester, ripping tool, Combination pliers) Prepare trunking
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.2.2
Connect workstations
4.2.3
Configure Network
Define workstation/node s Describe types of workstations Identify types of topologies(e.g. Star,Bus,Ring) Prepare and Test UTP cables Connect different work stations Define network configuration Describe the use of ping command Troubleshoot network Define computer communication Describe processes of testing communication between workstations Use the ping command to check if your TCP/IP software is correctly configured.
4.2.4
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
66
4.3.1
4.3.2
Define queries in database Describe function of queries in database Identify types of objects in database Define queries in design view Describe data types entered in design view Identify data types Define report object in database Describe functions of reports in database Prepare simple report from the database system Create interface between table, query and report. Produce files and save the report Produce folder and save the file into folder Produce hardcopy of the
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.3.4
4.4.1
report by printing the report Define user account Describe the functions of user account Prepare user account Describe the process of deleting user accounts Describe the process of updating user accounts Apply the process for deleting user account Apply the process for updating user account Define access right Describe the function of access right Maintain access right Define computer crime Describe types of computer crime(e.g
4.4.2
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.4.3
5.1.1
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk 68
5.1.2
5.1.3
5.1.4
Hacking and Cracking) Describe ways of protecting computer from crime Define computer viruses Describe types of computer viruses Describe the effect of computer viruses Describe ways of dealing with computer viruses Define antivirus packages Define types of antivirus Describe ways of installing/updatin g computer antivirus Define the term authentication Identify types of authentication Explain the authentication methodologies.( e.g Domain name, passwording, access right)
Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
69
5.2.1
5.2.3
6.1.1
Assign the access code to access the server Create password and IP addresses Protect password Define information privacy Define information accuracy Describe the function of information privacy Describe the use of information privacy Define unauthorized user Describe the types of unauthorized users Describe the ways of preventing computer intruders Collect components Organize
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
6.1.2
6.2.1
equipment and tools Configure and run computer network Manage computer networks Monitor computer users Provide IP address to users Keep computer hardware Store computer hardware Organize computer hardware Connect all hardwares to obtain computer systems Test the system and install operating systems Install/Reinstall the operating system. Install application software. Run other application software
Quiz Assignment
Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.2.2
6.2.3
71
6.2.4
6.3.1
6.3.2
Control the server Manage other networked computers Provide access rights to nodes/workstatio ns Describe the usage of networked computers Organize the servers Provide closed loop with all nodes Organize different computers in other organizarions Collect different equipments and tools Apply mathematical rules in solving different computer problems
72
73
11.0
S/NO 1.1.1
ASSESSMENT CRITERIA Mathematical concepts in calculation and preparation of database are properly applied.
GOOD Converts various base number sytems and explains sets and relations
EXCELLENT Converts various base number systems, explain sets and relations and basic number theoretical functions Evaluates basic counting techniques , discrete probability and explains important algorithms of graph theory, Boolean logic and techniques of mathematical proof . Applies grammar , construct sentences and writes small texts Writes business letter,emails,simple report and sales letter correctly Writes employment letters, CVs ,participate in employment interviews 74
1.1.2
Basic problems relating to ICT are accurately solved using mathematical principles
Evaluates basic counting techniques , and explains important algorithms of graph theory
1.2.1
Applies grammar
1.2.2
Principles and theories involving business correspondence are appropriately applied. Employment communication is properly applied
1.2.3
employment interviews 1.2.4 Simple research proposal effective memos, paper presentations and other business presentations are properly prepared Conditions of faults are correctly identified Prepares simple research proposal Prepares simple research proposal and write effective memo
and search for jobs Prepares simple research proposals , writes effective memos ,paper and other business presentations
2.1.1
Defines faults
Define faults, mentions conditions of faults and identifies different types of faults. Mention types of instrument used, explain steps of correcting faults,and fixes the faults Defines computer systems ,identify types of computer systems and explains parts of computer systems Define problem , describe the process of fixing problems and fix problems Explain website ,types of websites and prepare simple Run, update and secure website
2.1.2
Mentions types of instrument used and explain steps of correcting faults Defines computer system and identify types of computer systems
2.1.3
2.2.1
Defines problems
Defines problem and describes the process of fixing problems Explains website and types of websites
2.2.2
Website that is easy and effective to use is correctly designed Website is properly maintained
Explain website
2.2.3
Run website
75
2.3.1
Describes data models, explain types of data models and give ways of designing data models . Explains database system ,describe ways of installing and testing database system, and install and run database system Describes features , explain methods of updating database and apply methods to update database Defines, identify, describe methods of preparing system models and apply the methods to prepare system models Explains system problems ,describe resolutions of system problems and methods of system documentation Defines codes, explain types of codes , describe the methods of creating codes using programming languages and apply 76
2.3.2
Explains database system and describe ways of installing and testing database system
2.3.3
2.4.1
2.4.2
System problems and resolutions are correctly documented for future reference
3.1.1
Defines codes, explain types of codes and describe the methods of creating codes using programming languages
methods to create codes that meet system standard 3.1.2 System application is properly maintained Defines system application Defines system application and update new features Defines system application, update new features and troubleshoot system application . Defines data visualization, apply data visualization techniques and apply data visualization techniques properly. Defines computer software, identify types of computer software and the use of each software , Defines computer file, identify functions of computer file, describe operational functions of computer file and apply process to prepare computer files. Defines , identify parts of data flow and prepare and test dataflow hardware communication Defines communication channels, describe communication equipment, 77
3.1.3
4.1.1
Defines computer software and identify types of computer software , Defines computer file, identify functions of computer files and describe operational functions of computer files ,
4.1.2
4.1.3
Data traffic flow and coordination Defines and identify parts of are properly applied data flow.
Defines , identify parts of data flow and prepare dataflow hardware communicationDefines communication channels, describe communication
4.1.4
communication equipment
identify types of communication channels and equipment and communication channels. Describes network tools and prepare tool kit and trunking. Defines workstation/node, describe types of workstation, identify types of topologies and prepare and test UTP cables and connect different workstations. Defines computer communication and describe the processes of testing communication between workstations use of ping command and troubleshoot network. Defines computer communication and use ping command to check if your TCP/IP software . configured and some more examples Defines quarries , describe functions of quarries in 78
4.2.1
4.2.2
Defines workstation/node, describe types of workstation, identify types of topologies and prepare and test UTP cables. Defines network configuration and describe the use of ping command.
4.2.3
4.2.4
Defines computer communication and describe the processes of testing communication between workstations
4.3.1
database and identify types of object in database properly Defines quarries in design view, describe data type entered in design view and identify data types. Defines report object, describe functions of report in, prepare simple report in database and create interface between table, query and report in database. Produce and save file, produce folder and save files into folder and print.
4.3.2
Defines quarries in design view and describe data type entered in design view. Defines report object, describe functions of report in and prepare simple report in database.
4.3.3
4.3.4
Produce and save file, produce folder and save files into folder.
4.4.1
Defines user account and Defines user account, describe functions of describe functions of user user accounts. accounts and prepare user accounts. Describes the process of deleting or updating user account . Defines access right and describe the functions of access right . Apply the process of deleting or updating user account. Defines access right, describe the functions of access right and maintain access right . 79
4.4.2
4.4.3
5.1.1
Defines computer crime ,describe types of computer crime and describe ways of protecting computer from crime . Defines computer viruses, describe types and effect of computer viruses ,and describe ways of dealing with computer viruses m Defines antivirus and types of antivirus, describe ways of installing/updating antivirus , Defines the term authentification ,identify types of authentification and explain authentification methodologies and give some examples , Assigns access code to access the server correctly and create password and IP addresses protect password ,
5.1.2
Defines computer viruses and describe types and effect of computer viruses
5.1.3
5.1.4
5.2.1
Assigns access code to access the server correctly and create password and IP addresses,
5.2.2
Defines information Defines information privacy privacy and accuracy and and accuracy and describe 80
maintained
describe the functions of information accuracy , Defines unauthorized user , Defines unauthorized user and describe types of unauthorized users ,
the functions of information accuracy and privacy , Defines unauthorized user, describe types of unauthorized users and describe ways of preventing computer from unauthorized users , Collects computer components and organize equipments and tools, adding more examples. Manages computer network, monitor computer and provide IP address tousers, Organizes computer hardware and connect all the hardware to obtain computer system and adding more examples. Connects all the hardware to obtain computer system. and testing the system and install operating system and adding more examples Install/Reinstall the operating system , install application software and 81
5.2.3
6,1,1
Collects computer components and organize equipments and tools Manages computer network and monitor computer users.
6.1.2
6.2.1
Organizes computer hardware and connect all the hardware to obtain computer system.
6.2.2
Connects all the hardware to obtain computer system. and testing the system and install operating system. Install/Reinstall the operating system and install application
6.2.3
software
run other application software Control the server ,manage other networked computers , provide access right to nodes/workstations and describe the usage of networked computers Organizes the servers , provide closed loop with all nodes and organize different computers in other organizations Collects different equipment and tools, apply mathematical rules in solving different computer problems and adding more examples.
6.2.4
Control the server ,manage other networked computers and provide access right to nodes/workstations
6.3.1
Organizes the servers and provide closed loop with all nodes
6.3.2
Collects different equipment and tools ,apply mathematical rules in solving different computer problems
82
NAME;
COMMUNICATION SKILLS 12
NUMEBER OF CREDITS:
SUB-ENABLING OUTCOMES: 1.2.1 1.2.2 1.2.3 1.2.4 Apply basic writing skills Apply principles and theories involving business correspondence Apply employment communication Prepare simple research proposal and write effective memos, paper presentations and other business Presentations.
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. 83
REFERENCES; 1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Autralia college of general Practitioners. 2 3 4 5 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland. Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh. Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd. Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh. Edition Royal
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%
84
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 1.11 1.12 Apply mathematical concepts calculation and preparation of databases Solve basic problems relating to ICT using mathematical principles
TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit. REFERENCES; 1 2 3 4 5 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA. Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer verlag Berin Heideberg Germany, Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1st Edition , AA Dordrecht the Netherlands Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd Edition springer Verlag Berin Heideberg Germany, Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 85
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 2.3.1 2.3.2 2.3.3 2.3.4 2.3.5 2.3.6 2.3.7 Design data models Install and test database system Update existing database Work with quarries in database Create quarries in design view Prepare simple reports Save and print simple reports
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2nd Ed,Cengage Learning,Canada Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada. Rob P. et al (2009) Database systems design, implementation and management, 5th Edition Cengage, Learning EMEA. Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 86
NAME;
COMPUTER MAINTENANCE
NUMBER OF CREDITS:
12
SUB-ENABLING OUTCOMES:
Identify conditions of faults Correct computer faults Analyse the conditions of computer systems Diagnose problems
TOPICS Define faults Mention condition of faults Identify different types of faults Mention types of instrument used Explain steps of correcting faults Fix the faults Define the computer system Identify types of computer system 87
Explain parts of computer system Define problems Describe the process of fixing problems Fix problems
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES 1 2 3 4 5 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc. Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison Wesley, NJ. Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.Butterworth-Heinmann.UK
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 88
NAME;
PROGRAMMING
NUMBER OF CREDITS:
12
SUB-ENABLING OUTCOMES:
Create codes that meet system standards Maintain system application Innovate data visualization techniques
TOPICS Define codes Explain types of codes Describe methods of creating codes using programming languages Apply methods of creating codes Define system application Update new features Troubleshoot system application. (e.g Access,VB,Java, C++)
89
TEACHING AIDS
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES; 1 2 3 4 5 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4th Edition, D. C. Heath and company 125 spring street, Lexington M. A. Oualline S. (2003) Practical C++ Programming 2nd Edition OReailly media Inc, 1005 Gravenstein Highway North , Sebastopol Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German. Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O Reilly media Inc, 1005 Gravenstein Highway North Sebastopol.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 90
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 4.1.1 4.1.2 4.1.3 4.1.4 Describe types of computer software Apply file processes Apply data traffic flow and coordination Apply communication equipment and system communication channels
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 . Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke Publishing 980 East Circle Drive USA Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher Education
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 91
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 2.2.1 2.2.2 2.2.3 Diagnose problems Design website that is easy and effective to use Maintain a website
TOPICS Define website Explain types of websites Prepare a simple website Run website Update website Secure website
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.
92
REFERENCES; 1 2 3 4 5 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol. Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York Institution of Technology at Utica/Rome. Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition ORelly media inc. 1005,Gravenstain Highway North, Sebastopoll. Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology. Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey
93
NAME;
NETWORKING
NUMBER OF CREDITS:
12
SUB-ENABLING OUTCOMES:
Identify tools for building network Connect workstations Configure network Test communication between workstations Apply communication equipment and systems communication channels
TOPICS Define of communication channels Describe communication equipment(e.g. Access point, network routers,hubs,switchers and servers) Identify types of communication channels and equipment Prepare communication channels Describe network tools Prepare tool kit(e.g. Tester, ripping tool, Combination pliers) 94
Prepare trunking Define workstation/nodes Describe types of workstations Identify types of topologies(e.g. Star,Bus,Ring) Prepare and Test UTP cables Connect different work stations Define network configuration Describe the use of ping command Troubleshoot network Define computer communication Describe processes of testing communication between workstations Use the ping command to check if your TCP/IP software is correctly configured.
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.
95
REFERENCES; 1 2 3 4 5 Barken L(2009) How secure is your wireless network your Wi-FLAN,2nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice Hall of India, New Delh. Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada Mathew J. (2005) Computer Networks, Internet protocols in actionaddition Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)
96
CODE: TCIT 524 NAME; PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE 12
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 5.1.1 5.1.2 5.1.3 5.1.4 5.2.1 5.2.2 5.2.3 Explain computer crime Solve computer virus problems Update/Install antivirus packages Apply authentication methodologies in computer use Maintain access right in computer use Maintain information privacy and accuracy Detect/prevent unauthorized users
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk. Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo . Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1st ed,Jones&Bartlett Publishers,Massachussets.USA Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ Prentice- Hall New Delh India.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 97
NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 2.4.1 2.4.2 Prepare system models Document system problems and resolution for future reference
TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit. REFERENCES; 1 2 3 4 5 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi. Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 98
1.0 BACKGROUND INFORMATION The philosophy behind the development of competent modular curricular is to comply with the Nati ons Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs. Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills. The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result o f the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 6 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization. The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.
This qualification has 120 credits which is the minimum prescribed by NACTE.
99
The coding of modules follows logical sequence as in the following example for ODIT 614. ODIT 6 1 1 1 to = = = = Stands for Ordinary Diploma in Information and Communications Technology The first digit stands for the NTA level, in this case Ordinary Diploma which is level six. The second digit stands for semester, i.e. for semester one. The last digit stands for the order of the module in the semester. Modules are arranged serially from the highest number, upon the number of modules in the semester.
3.0 GRADING OF ASSESSMENT RESULTS The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 6 Grade A B+ C D F I Definition Excellent Very Good Good Average Failure Incomplete Score 75 100 65 74 55 64 40 54 00 39
100
4.0 AWARDS
The award shall be made to students who satisfy the following conditions. Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.
Awards Classification for NTA level 6 Class of Awards First Class Upper Second Class Lower Second Class Pass Cumulative GPA 4.4 to 5.0 3.5 to 4.3 2.7 to 3.4 2.0 to 2.6
101
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT) 6.0 SUMMARY FRAMEWORK QUALIFICATION PURPOSE OF QUALIFICATION ORDINARY DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT) This qualification is intended for persons who will be able to develop and test programs, program web based applications, manage information systems resources, plan and manage networks, develop business plans focusing on entrepreneurship and perform audit assignments, analyze how computer components work and communicate under less supervision.
6 The holder of this qualification will be able to apply skills and knowledge to develop and test programs, program web based applications, manage information systems resources, plan and manage networks, develop business plans focusing on entrepreneurship and perform audit assignments, analyze how computer components work and communicate in a broad range of ICT work activities, most of which are non-routine and be able to assume operational and some managerial responsibilities.
102
CUMULATIVE CREDITS AT THIS LEVEL MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL DATE QUALIFICATION NEW STANDARD LAST RVIEWED ENTRANCE REQUIREMENTS TCIT Level 5 30 240
103
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT) 7.0 PRINCIPAL LEARNING OUTCOMES AND CREDIT VALUES SUMMARY S/NO PRINCIPAL LEARNING OUTCOMES CREDIT VALUES 1 Develop, test, debug and run programs using object oriented programming language, C++. ASSESSMENT CRITERIA
15
1.1 Programs using object oriented programming language C++ are properly developed, tested, debugged, and run.
15
2.1 Database driven web applications are properly designed and developed
Manage Information System Resources in an organization, evaluate a range of information systems solutions and examine the social and legal impacts of developing and implementing information systems and the role played by Information Systems (IS) professionals in addressing such issues.
30
3.1 Information systems resources in an organization and a range of information systems solutions are well managed and evaluated. 3.2 Social and legal impacts of developing and implementing information systems and the
104
role played by information systems (IS) professional in addressing such issues are well examined. 4 Plan, administer, troubleshoot and manage computer Networks and network equipment.
15
Computer networks and network equipment are properly planned, administered, and troubleshot.
Analyze the working of computer components and their communication to each other.
15
The working of computer components and their communication to each other are well analyzed
Apply information systems assurance in developing business plans focusing on entrepreneurship and perform audit assignments.
30
6.1 Information systems assurance in developing business plans focusing on entrepreneurship is well applied 6.2 Audit assignments are well performed.
TOTAL CREDITS
120
105
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 8.0 PROGRAM STRUCTURE SEMESTER I S/NO 1 2 3 4 CODE ODIT 611 ODIT 612 ODIT 613 ODIT 614 NAME OF MODULE Computer Architecture Programming in C++ Business Information Systems Entrepreneurship TOTAL CREDITS FOR SEMESTER I CREIDT 15 15 15 15 15
SEMESTER II S/NO 1 2 3 4 CODE ODIT 621 ODIT 622 ODIT 623 ODIT 624 NAME OF MODULE Information systems assurance Database driven website design Fundamentals of network administration Project development TOTAL CREDITS FOR SEMESTER I GRAND TOTAL CREDITS FOR NTA LEVEL 6 120
106
CREIDT 15 15 15 15 15
9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES PRINCIPAL OUTCOMES (NACTE Standards) ENABLING OUTCOMES (As Identified and formulated by Curriculum Developers) Apply Basic principles of C++ program 1.1.1 Describe Structure of a program 1.1.2 types. 1.1.3 Apply Constants 1.1.4 Assign Operators in C++ programs 1.1.5 Declare Basic Input/ Output 1.2 Apply Control Structures 1.2.1 Apply Control Structures in a Declare Variables and Data SUB-ENABLING OUTCOMES
1. Develop, test ,debug and 1.1 run programs using object oriented programming language, C++
C++ program 1.2.2 Declare different types of C++ programs 1.3 Identify different data types 1.3.1 Declare arrays in C++ program 1.3.2 Declare character sequences in c++ program 1.3.3 Declare pointers in C++ program
107
1.3.4 Allocate dynamic memory in C++ program 1.3.5 Declare data structures in C++ program 1.4 Apply Object Oriented Programming techniques 1.4.1 Declare Classes in C++ program 1.4.2 Declare Friendship and inheritance 1.4.3 Apply Polymorphism in C++ program 1.4.4 Pass message in C++ program
108
2.1
2.1.1 Download and save Apache, PHP, Mysql or Wamp/ Xamp 2.1.2 Install Apache,PHP, Mysql or Wamp / Xamp 2.1.3 Use the web server
2.2
2.2.1 Read and write files 2.2.2 Manipulate API files 2.2.3 Upload and exit file
2.3
2.3.1 Apply PHP syntax 2.3.2 Declare variables 2.3.3 Declare arrays 2.3.4 Declare functions
109
2.3.5 Declare classes and objects 2.3.6 Declare string operations in PHP 2.4 Develop dynamic interactive website 2.4.1 Declare website structure 2.4.2 Prepare graphic resources 2.4.3 Design templates, upload templates and resources 2.4.4 Create all modules and add to templates 2.4.5 Create pages and forms
3. Manage Information System Resources in an organization, evaluate a range of information systems solutions and examine
3.1 Evaluate the roles of various types of management information systems in business organisations. .
3.1.1 Discuss the relationship between the business organization ,processes, functions and the associated supporting management information systems.
110
the social and legal impacts of developing and implementing information systems and the role played by Information Systems (IS) professionals in addressing such issues. 3.2 Asses the emerging business technologies,environments and practices, and their impact on management information systems.
3.1.2 Explain appropriate management information systems for the range of business functions and organizational levels. 3.2.1 Assess the impact of new technology on business processes and associated management information systems. 3.2.2 Explain the emerging business technologies environments and practices of management information systems. 3.3 Discuss the relationship between the decision making process, the organizational hierarchy and the supporting management information systems. 3.3.1 Discuss the managerial decision making process in business. 3.3.2 Explain the relationship between decision making and management information systems at different levels of the organization. 3.3.3 Evaluate the importance of collaborative decision making environments and review
111
group management information systems. 3.3.4 Apply the concepts and knowledge in the management information systems context. 3.4 Develop awareness of the key role of management information systems in facilitating competitive advantage in business. 3.4.1 Explain the key requirement of competitive advantage. 3.4.2 Explain competitive advantage in business 3.4.3 Relate information systems to business competitive advantages 3.5 Apply Knowledge of security and control aspects of management information systems. 3.5.1 Discuss the risk, security and control issues associated with management information systems. 3.5.2 Discuss the control measures for the risks associated with managing information systems. 3.6 Apply professional approach to relating management information 3.6.1 Review the range of professional issues, which are associated with business activities and management
112
information systems. 3.6.2 Evaluate business activities that needs information systems support for better performance
4.Plan, administer ,troubleshoot and Manage computer Networks and network equipment
4.1.
4.1.1 Configure Network Adapter, Modem 4.1.2 Set Repeater and Bridge 4.1.3 Set Hub and Switch 4.1.4 Connect Wireless Access Point 4.1.5 Configure Router
4.2.1 Configure Address Resolution Protocol (ARP) 4.2.2 Configure Internet Control Message Protocol (ICMP) 4.2.3 Configure BootStrap Protocal(BOOTP
113
) 4.2.4 Configure(Dynamic Host Control Protocal) DHCP 4.2.5 Configure Domain Name System( DNS) 4.2.6 configure Lightweight Directory Access Protocol ( LDAP) 4.3 Manage network resources 4.3.1 Troubleshoot problems with computer systems 4.3.2 Assist users to resolve problems with equipment and data 4.3.3 Plan, design, acquire new or upgraded hardware and software 4.3.4 Install LAN/WAN and maintain Computer 4.3.5 Apply ISO management model 5. Analyze the working of computer components and their
114
5.1
Unit (CPU)
5.1.2 Describe the component parts of CPU 5.1.3 Describe purpose of instruction pointer 5.1.4 Describe steps of processing an instruction
5.2
5.2.1 Explain the purpose of memory cell 5.2.2 Apply RAM and ROM 5.2.3 Identify different types of ROM 5.2.4 Describe storage capacities 5.2.5 Differentiate between internal and external buses
5.3
5.3.1 Identify different Character recognition devices 5.3.2 Explain the role of barcodes
devices
115
5.3.3 Identify different types of Tapes 5.3.4 Identify different types of magnetic disks 5.3.5 Assess hard disk performance 6. Apply information systems assurance in develop business plan focusing on entrepreneurship and perform audit assignments 6.1 Apply Auditing standards, procedures and guideline of auditing Information Systems Audit assignments 6.1.1Audit Information Systems according to required procedures 6.1.2 Conduct an information systems Risk Assessment and arrange sequence of functions 6.1.3 Perform audit assignment 6.2 Assess effectiveness and efficiency of, Information Technology Governance, and Information System Life Cycle Management in supporting business operations and continuity. 6.2.1Assess Information Technology Governance 6.2.2 Assess adherence of Information Systems development life cycle management 6.2.3 Conduct Tests to check Business continuity Management 6.2.4 Conduct test to check effectiveness of
116
6.3 Relate concepts of security in ensuring information assets of the business organizations are protected 6.4 Analyze how information systems affect/effect the concepts of entrepreneurship in business organization
6.3.1 Ensure Security of Information assets 6.3.2 Conduct test Security of procedures and components 6.4.1 Describe objectives of entrepreneurship 6.4.2 Analyze entrepreneurship in business organization 6.4.3 Discuss the importance of information system in entrepreneurship 6.4.4 Discuss the role of entrepreneurship concepts in developing business
117
Declare comments in a C++ program eg; // my first program in C++ Declare a library function #include <iostream> Declare and use namespace std; Declare the main function ;int main () Declare a display function; cout << "Hello World!"
Exercise, assignment
1.1.2 types.
Declare
Identify reserved key words Describe and declare integers, boolean, float, character, double Initialize variables
118
1.1.3 Apply Constants in C++ program 1.1.4 Assign Operators in C++ program
Identify different types of operators; assignment, arithmetic, compound, increase and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff, precedence operators.
Operators in C++ program are properly assigned. Assignments and class in demonstrations Written assignments, model answer
Assign different types of operators; assignment, arithmetic, compound, increase and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff , precedence operators.
Identify and Declare Standard Output (cout) Identify Standard Input (cin).
declared
1.2.1
Apply
Declare conditional structures while, dowhile, forloop),jump statements, continue and go to statements.
Control C++ program are properly applied and used Assignments and class in demonstrations Written assignments, model answer
Apply conditional structures (if..else), iteration structure ( loops: while, dowhile, forloop),jump statements, continue and go to statements.
1.2.2
Identify and declare different types of Different types of functions: exit, selective switch, void, passing arguments, overloaded, inline, recursivity. C++ program are correctly declared. Assignments and class in demonstrations Written assignments, model answer
120
Initialize arrays Describe multi-dimension arrays Pass parameters Access values of an array
Arrays in C++ program are correctly declared Assignments and class in demonstrations Written assignments, model answer Written assignments, model answer
Apply reference operator Apply deference operators Apply variables of pointer types Initialize pointers; arithmetic, void, pointer to pointer, pointer to function and nully-pointers
Assignments and class in demonstrations Dynamic memory Assignments in C++ program are properly allocated and class in demonstrations
Apply operators new and new[] Apply operators delete and delete[] Apply memory in ANSI-C
121
Apply structure_name, object_name. Apply pointer to pointer Apply nesting structure Apply other data types( typedef) Apply class_name Apply object_name Apply class functions: constructors and destructors ,overloading and default
Data structures in C++ program are correctly declared Classes in C++ program are declared
Apply friend functions Apply friend class Apply inheritance between classes Apply multiple inheritance. Declare pointers to base class Declare virtual members and abstract base
Friendship and inheritance are correctly declared Polymorphism in C++ program are properly applied
Written assignments,
122
program 2.1.1 Download and save Apache, PHP, Mysql or Wamp/ Xamp
find a function to be invoked connect to the internet Download PHP for free : http://www.php.net/downloads.php Download MySQL for free : http://www.mysql.com/downloads/ Download Apache for free : http://httpd.apache.org/download.cgi
correctly passed Apache, PHP, Mysql or Wamp/ Xamp are properly downloaded and saved in a computer Apache, PHP, Mysql or Wamp/ Xamp are properly installed
open the Apache/php/mysql install file you downloaded, click yes and ok and next and so forth until you reach the Server Information screen, then
Written materials.
install the web server software on the The web server computer. assign a domain name. install antivirus software apply PHP-file open: write Files are read is properly used
write files
apply file fwrite function apply file-write:overwrite function view and modify file attributes read and list directory contents, alter file permissions, retrieve file contents into a variety of native data structures, search for files based on specific patterns. create table upload upload the data/files apply fclose() function apply PHP scripting block apply PHP output text: echo, print apply HTML tags
Files are uploaded and exit successfully PHP syntax is properly applied
identify the variable name and value apply $ to each variable name declare $var_name = value;
124
apply Predefined variables apply Variable scope Apply Variables from outside PHP identify different types of arrays; Numeric array , Associative array, Multidimensional array
declared
demonstrations
model answer
initialize array apply array declaration identify built-in functions and user defined functions apply the PHP syntax for functions: Functions are correctly declared Assignments and class in demonstrations Written assignments, model answer
and objects
Apply Constructors and Destructors Apply Visibility Apply Scope Resolution Operator (::) Apply Static Keyword Apply Object Constants Apply Object Abstraction Apply Object Interfaces Apply Overloading Apply Object Iteration Apply Patterns Apply Magic Methods Apply Final Keyword Apply Object cloning Apply Comparing objects Apply Reflection
Apply string concatenation Apply strlen() function Apply strps() function Identify different operators
126
:arithmetic, assignment, comparison, and logic operators Apply different operators :arithmetic, assignment, comparison, and logic operators
declared
Prepare homepage( index page) Prepare main section ( site index) Prepare subsection( content) Link between sections. Explain graphics Differentiate graphics Find graphics
Web site structure is correctly declared Graphic resources are properly prepared
Templates are properly designed and template resources are correctly Assignments and class in demonstrations Written assignments, model answer
127
uploaded 2.4.4 Create all modules and add to templates Define modules Differentiate modules Attach modules All modules are correctly created and added to templates 2.4.5 Create pages and form Define form Find contents Explain HTML Tags Pages and forms are correctly created Assignments and class in demonstrations Written assignments, model answer Assignments and class in demonstrations Written assignments, model answer
3.1.1 Discuss the relationship between the business organization, processes ,functions, and the associated supporting management information systems.
Apply the Business Organization and Supporting Management Information Systems by: Identify Systems and Systems Thinking. Outline Information systems in modern organizations. Discuss Types and characteristics of systems. Describe Business processes and information systems.
The relationship between the business organization ,processes functions, and the associated supporting management information systems are
128
Describe Customer Relationship Management (CRM) and SCM. Discuss Collaborative commerce. Discuss Enterprise systems. Outline Organizations and information systems. Discuss Organizations, procedures, politics and culture. Discuss Organizational structures and environments. Discuss the changing role of information systems in organizations. Discuss Economic and behavioral effects of information systems on organizations.
thoroughly discussed
Appropriate management
Written assignments,
129
management information systems for the range of business functions and organizational levels.
management information systems by level and function: operational level knowledge level management level strategic level.
information systems for the range of business functions and organizational levels are clearly explained
demonstrations
model answer
3.2.1 Assess the impact of new technology on business processes and associated management information systems.
Discus E-commerce, e-business and information systems. Discus Internet technology and the digital firm. Discus New business models. Discus Categories of e-commerce. Analyse Customer-centred retailing.
The impact of new technology on business processes and associated management information systems is correctly assessed.
Written assignments,
130
demonstrations
model answer
Discuss how to Manage the organization. Discuss Models and roles of management. Discuss Management decision making. Discuss Process, stages and models of decision making. Discuss Information systems and business strategy. Discuss Strategic information systems. Discuss the value chain model. Discuss Firm and industry level strategy and information systems.
131
3.3.2 Explain the relationship between decision making and management information systems at different levels of the organization.
Discuss the Decision Making and Management Information Systems at Different Levels in the Organization: Decision Support Systems (DSS),Types of DSS, Components of a DSS,DSS applications, Modeling, planning and control, Executive support systems (ESS),Role, benefits and success factors of ESS.
The relationship between decision making and management information systems is clearly explained at different levels of an organization The importance of collaborative decision making environments is correctly evaluated and review group management information
3.3.3 Evaluate the importance of collaborative decision making environments and review group management information
Discuss the Collaborative Decision Making Processes: Collaborative working, Group Decision Support Systems (GDSS), Factors for success in enhanced collaborative decision making.
132
systems.
3.3.4 Apply concepts and knowledge management in the management information systems context.
Discuss Knowledge and knowledge management. Discuss Systems and infrastructure for knowledge management. Discuss Information and knowledge work systems. Discuss Enterprise knowledge environments. Discus Business intelligence and enterprise reporting and analysis. Discuss the Competitive Advantage as a Driver for Management Information Systems: Information systems for competitive advantage, SCM and ERP, Organizational design, Business value of information ,Managing change and
The concepts and knowledge management are properly applied in the management information systems context .
133
implementation. 3.5.1 Discuss the risk, security and control issues associated with management information systems. 3.5.2 Discuss the control measures for the risks associated with managing information systems. Discus Systems integrity and risk assessment. Discuss Information systems security and control. Discuss Systems vulnerability and abuse. Discuss Systems quality problems. Discuss Control environments. Discuss Internet security challenges. Discuss Ensuring systems quality. Discus Disaster recovery and business continuity planning. Discuss risk control measures Discuss information systems vulnerability control Discuss information system security control The control measures for the risks associated with managing information systems are thoroughly discussed Assignments Model answers The risk, security and control issues associated with management information systems are thoroughly discussed. Assignments and class in demonstrations Written assignments, model answer
134
3.6.1 Review the range of professional issues, which are associated with business activities and management information systems.
Discuss Privacy and how this is managed. Discuss Intellectual property issues. Discus Codes of conduct and professional practice.
The range of professional issues, which are associated with business activities and management information systems are correctly reviewed
3.6.2 Evaluate business activities that needs information systems support for better performance
Discuss business activities Discuss information systems Relate business activities to the information systems supporting them Discuss organizational performance
The business activities that needs information systems support for better performance are correctively evaluated
assignments
Model answers
135
Identify Compatible modem, Ethernet card, sound card or other PCI card. Cross-point (Philips) Screwdriver suitable for your PC case. Use Fixing screw (usually comes with the case). Use Anti-Static Wrist-strap (if available) Locate the PCI slots
Enter global configuration mode. Enter interface configuration mode for the radio interface Create the SSID that the repeater uses to associate to a root access point Designate the SSID as an infrastructure SSID Exit SSID configuration mode and return to radio interface configuration mode Set the access point's role in the wireless LAN to repeater.
136
Find the WAN or uplink port of the Ethernet hub. Connect an Ethernet cable from the WAN port of the hub to either the Ethernet port of the internet modem or, if expanding a network, to an empty LAN port on the existing networks router, switch or hub.
Written materials.
Plug an Ethernet cable into one of the LAN ports on the Ethernet hub and connect the other end of cable to the computer
Power up the Ethernet hub and the computers or other devices attached to it.
Configure the network settings on each connected computer. Verify that all computers can access the network and the Internet if
137
connected 4.1.4 Connect Wireless Access Point and configure 4.1.5 configure Router Find the IP addresses of your existing Wireless Access gateway/router and clients Connect to your router administration interface to find the DHCP range Connect a computer to the wireless router/AP Configure the wireless router / AP Test admin page is reachable and secure the AP Test the AP wireless connection IDENTIFY different modes; user EXEC ,privileged EXEC, global config ,interface config, setup Enter the model ;user ,privileged EXEC Enter the configuration mode Configure the IP address Configure the routing protocol Open shortest path first (OSPF) Create the IGRP Routing Process Router is correctly configured Demonstration and observation Written materials. Point is correctly connected and configured Demonstration and observation Written materials.
138
Define a Static ARP Cache Entry, Enable Proxy ARP, Configure DAGR, Configure ARP purge-delay Configure ARP timeout
Written materials.
Written materials.
Allow traceroute TTL-Exceeded and Port-Unreachable messages inbound. Allow path MTU ICMP FragmentationDF-Set messages inbound. Block other types of ICMP traffic Chose and Decide the values that you BOOTP is want in the BOOTP packet reply fields: Choose and Decide the list of options
139
Written materials.
correctly configured
and their values that you want returned to the BOOTP client Set values in the policy you want associated with the BOOTP request: Enable the associated scope or scopes for BOOTP processing. Enable dynamic BOOTP processing if you want to have this scope provide an address for any BOOTP client that requests one 4.2.4 Configure DHCP 4.2.5 Configure DNS 4.2.6 Configure LDAP Configure a database agent and disable conflict loggins Exclude IP addresses Configure a DHCP address pool Choose a Domain name Enable The Boot File Start the named Daemon Test the DNS Configuration Locate the LDAP configuration files add the appropriate files to your server configuration Restart the server
140
Written materials.
Written materials.
Written materials.
Edit the containers.ldif file in order to include the correct LDAP suffix for your directory
Use the ldapadd command to add the containers. Use a bind DN that has the appropriate permissions.
Verify connections Ensure compatibilities of added devices in a network Verify functionalities of network devices Verify correct protocols are installed in a computer Ensure the firewall ports are open Use troubleshooting tools: ping, ifconfig ,arp, snoop, ndd,netstat, traceroute
Written materials.
Set up the same IP scheme (e.g. 192.168.0.x). Mask, Gateway, and DNS IP addresses
Written materials.
141
Make sure you can ping the other computers by IP ADDRESS and name
satisfactorily
Make sure you have the same workgroup name (watch for trailing spaces)
With Windows2000, XP and Vista, make sure you have the same username and password as the person logging onto the other computers. The default setting for all but the Home Versions is to require a password for network access
Remove any unnecessary firewalls, protocols or other configurations the complicate the troubleshooting process. You can add them back in later after you get things working.
Identify different versions of software to be used in upgrading the network Identify different hardware to be
Exercise, assignment
142
and software
Choose LAN/WAN design considerations Identify hub, switch, repeater, router to be used Identify cables: UTP/STP ,Coax, macro wave Identify IP address, subnet mask, default gateway, DHCP, proxy server Design a switched LAN Describe application layer Describe presentation layer Describe session layer Describe transport layer Describe network layer Describe data link layer Describe physical layer
Written materials.
Exercise, assignment
143
Exercise, assignment
Identify control unit Identify ALU Identify RAM Identify registers Identify how the computer is in instruction instruction sequence
Exercise, assignment
Exercise, assignment
Identify and describe instruction fetch Identify and describe instruction decode Identify and describe instruction
Exercise, assignment
144
execution 5.2.1 explain the purpose of memory cell Identify and describe instruction/data storage Identify cache memory Identify flash BIOS memory Describe memory address The purpose of memory cell is clearly described. Exercise, assignment Questions and model answer.
Describe the functions and uses of RAM Describe the functions and use of ROM
Exercise, assignment
Describe Mask-Programmed ROM (MROM) Describe Erasable-Programmable ROM (EPROM). Describe Electrically Erasable PROM (EEPROM) Analyse the storage capacity of bit
5.2.4 Describe
Storage
Exercise,
Questions and
145
storage capacities
Analyse the storage capacity of byte Analyse the storage capacity of word Analyse the storage capacity of kilobyte(KB) Analyse the storage capacity of megabyte (MB) Analyse the storage capacity of gigabyte (GB) Analyse the storage capacity of terabyte (TB)
assignment
model answer.
Describe internal/external parallel bus Internal and Describe internal/external serial bus Describe self-repaired internal bus Describe: PCI,PCIEXPRESS,AGP,USB,FIREWIRE PS/2 Describe the OCR Describe the MCR Describe the MICR Different character recognition devices are correctly external buses are clearly differentiated
Exercise, assignment
Exercise, assignment
146
identified. 5.3.2 Explain the role of barcodes 5.3.3 Identify different types of magnetic Tapes discus different barcode symbols discuss different scanning devices Discuss the functions of barcode readers Describe open pool tape Describe cassette tapes Describe tape cartridges Different types of Exercise, magnet tapes are clearly identified 5.3.4 Identify different types of magnetic disks Describe hard disk Describe floppy disks Different types of Exercise, magnetic disks are correctly identified 5.3.5 Asses hard disk performance Explain latency Explain seek time Explain transfer rates Hard disk performance is correctly assessed. 6.1.1Audit Information Systems Explain different categories of Audit assignment Information systems are
147
Exercise, assignment
assignment
assignment
Exercise, assignment
Exercise,
Questions and
assignment
model answer.
6.1.2 Conduct information systems Risk Assessment and arrange sequence of functions
Perform Compliance test Perform Substantive test Develop Audit plan according to risk level Gather and assess Evidence Produce report Present report to Communicate results
Risk assessment for information systems is properly conducted and sequence of functions properly arranged.
Exercise, assignment
Produce detailed audit plan Preliminary review of the audit area/subject Evaluating the audit area/subject
Exercise, assignment
148
Reporting (communicating results) Explain existing standards for effective Information Technology Governance Evaluate sufficiency of Information systems policy and Procedures Evaluate adherence of the procedures to the to regulatory standards Information Technology Governance is correctly assessed Exercise, assignment Questions and model answer.
Evaluate procedures for Information Systems Life Cycle Management Explain procedures for Explain procedures for systems testing Evaluate sufficiency of real life test to the standard test procedure
Exercise, assignment
149
Explain components of business continuity plan Develop a business continuity plan Explain decision criteria of levels of risk for business continuity. Test business continuity plan Explain components of Disaster recovery plan Evaluate roles of key players of disaster recovery plan Explain recovery strategy Test practical disaster recovery plan
Business continuity Management tests are properly conducted Test to check effectiveness of disaster recovery planning is properly conducted
Exercise, assignment
Exercise, assignment
Explain concepts of Confidentiality, Integrity, and Availability Assess different categories of physical and logical access controls. Explain Public Key Infrastructures
Exercise, assignment
150
and applicability to information assets protection 6.3.2 Conduct test of Security procedures and components Test controls to evaluate sufficiency of security of real business case Develop procedures for classifying information assets Test on Security procedures and components are properly conducted. Exercise, assignment Questions and model answer.
information systems and the activities system in of the business entrepreneurship is properly discussed
Describe entrepreneurship concepts Discuss different types of businesses Identify sources of business finance
152
11.0 BENCHMARKING OF ASSESMENT CRITERIA ASSESMENT CRITERIA 1.1.1 Structure of a program is clearly described. SATISFACTORY Declares comments in a C++ program , library function and use namespace std; GOOD Declares comments in a C++ program ,library function and gives example #include <iostream>,declares and uses namespace std;and declares the main function ;int main () EXCELLENT Declares comments, library function #include <iostream> in a C++ std;main function ;int main (), and displays function; cout << "Hello World!"
1.1.2
Identifies reserved key words, Describe and declare integers, Boolean, float, character, double.
Identifies reserved key words, describes and declare integers, initializes variables
1.1.3
Identifies and declare literals, integer numbers. Identifies different types of operators; assignment, arithmetic, compound,
1.1.4
Operators in C++ program are Identifies different types of correctly assigned. operators; e.g. assignment, arithmetic, compound, increase
and decrease.
increase and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff, and precedence operators.
bitwise, sizeoff, precedence operator Assign different types of operators; assignment, and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff, and precedence operators.
1.1.5
Identifies and declares Standard Standard input (cin). Declares wide range of conditional structures (if..else), iteration structure (loops: while, dowhile, and go to statements, and applies
154
1.2.1
Declares some conditional structures (if..else), iteration structure ( loops: while, dowhile, forloop.
Declares more conditional structures (if..else), iteration structure (loops: while, dowhile, forloop), jump statements, continue
and go to statements.
conditional structures (if..else), iteration structure (loops: while, continue and go to statements.
1.2.2
Identifies more different types of functions: exit, selective switch, void, passing arguments, overloaded, inline, recursivity.
Identifies and declares more differen types of functions: exit, selective switch, void, passing arguments, overloaded, inline, recursivity.
1.3.1
1.3.2
155
1.3.3
Applies reference operator, and deference operators and variables of pointer types
Applies: reference operator, deferen operators, variables of pointer types and initializes pointers; arithmetic, void, pointer to pointer, pointer function and nully-pointers to
1.3.4
Applies operators new and new[], and operators delete, and delete[]
Applies operators new and new[], operators delete, and delete[], and also memory in ANSI-C
1.3.5
Applies structure_name, object_nam pointer to pointer, nesting structure also Applies other data types( typedef)
1.4.1
construct
, overloading an
156
classes
default.
1.4.2
1.4.3
Declare pointers to base class, virtua members and also abstract base
1.4.4
declares message
2.1.1
Apache, PHP, Mysql or Wamp/ Xamp are properly downloaded and saved in a computer
Connects to the internet, downloads PHP for free : http://www.php.net/downlo ads.php, MySQL for free : http://www.mysql.com/dow nloads/
http://httpd.apache.org/download.cg 2.1.2 Apache, PHP, Mysql or Wamp/ Xamp are properly installed opens the Apache/php/mysql installs file downloaded, opens the Apache/php/mysql installs file downloaded, reaches the Server Information screen during downloading opens the Apache/php/mysql and installs the file downloaded, reaches the Server Information screen, then chooses the complete installation button.
2.1.3
installs the web server software on the computer, and assigns a domain name.
installs the web server software and also installs antivirus software
on
2.2.1
158
write:overwrite function
and also
2.2.2
views and modifies file attributes, views and modifies file reads and lists directory contents, attributes, reads and lists permissions,
views and modifies file attributes, reads and lists directory contents,
2.2.3
2.3.1
applies PHP scripting block, applies PHP output text: e.g. echo
159
2.3.2
identifies the variable name and value, applies $ to each variable name, declares $var_name = value;
identifies the variable name and value, applies $ to each variable name, declares $var_name = value; and applies Predefined variables
identifies the variable name and valu applies $ to each variable name,
declares $var_name = value; applies scope, and applies variables from outside PHP
2.3.3
identifies different types of arrays; Numeric array , Associative array, Multidimensional array
identifies different types of arrays; Numeric array , Associative array, Multidimensional array initializes array,
identifies different types of arrays; Numeric array , associative array, and also applies array declaration
2.3.4
identifies built-in functions and user defined functions, applies the PHP syntax for functions:
identifies built-in functions and user defined functions, applies the PHP syntax for functions: function functionName()
identifies built-in functions and user defined functions, applies the PHP syntax for functions:
applies function calling, User-defined Applies Returning values, Applies Variable functions.
2.3.5
Auto loads Objects, Applies the following Constructors and Destructors, Applies Visibility, Scope Resolution Operator (::), Static Keyword, Comparing objects and Reflection
Autoload Objects, Applies: Constructors and Destructors, Visibility, Scope Resolution Operator (::), Static Keyword, Object Constants, Applies Object Abstraction, Object Interfaces, Overloading, Object Iteration, and applies Patterns.
Autoload Objects, Applies Constructo and Destructors, Visibility, Scope Resolution Operator (::), Static Keyword, Object Constants, Object Abstraction, Object Interfaces,
161
2.3.6
Applies: string concatenation, strlen() function, strps() function, Identifies different operators :arithmetic, assignment, comparison, and logic operators.
Applies: string concatenation, strlen function, strps() function, Identifies: different operators
:arithmetic, assignment, comparison, different operators :arithmetic, assignment, comparison, and logic operators
2.4.1
Prepares homepage( index page), main section ( site index), and subsection( content)
2.4.2
Explains graphics, differentiates graphics, and finds graphics. Explains template, differentiates
162
2.4.3
Explains template.
Explains template,
designed and template resources are correctly uploaded 2.4.4 All modules are correctly created and added to templates Defines modules.
2.4.5
Defines form.
3.1.1
The relationship between the business organization ,processes and functions and the associated supporting management information systems are thoroughly discussed
Applies the Business Organization and Supporting Management Information Systems by: Identifying Systems and Systems Thinking, Outline Information
Applies the Business Organization and Supporting Management Information Systems by: Identifying Systems and
Applies the Business Organization an Systems by: Identifying Systems and Systems Thinking, Outlining Information
systems, Describing business process and information systems, Customer SCM, Discussing Collaborative commerce, Enterprise systems. Also Outlining Organizations and information systems.
Describe: Business processes and characteristics of systems. information systems, Customer Relationship Management (CRM) and SCM. Discusses Collaborative commerce. Describes business processes and information systems, Customer relationship Management (CRM) and SCM. Discusses: Collaborative commerce, Enterprise systems. Outline Organizations and information systems, and Organisations, procedures, politics and culture.
Discussing Organizations, procedures politics and culture, Organizational structures and environments, The
3.1.2
analyzing the type of management information systems by level and function:operational and knowledge levels
Systems by analyzing the types of management information systems by level and function: operational level, knowledge level, management level, strategic level.
types of management information systems by level and function: operational level, knowledge level, management level, strategic level.
3.2.1
The impact of new technology on business processes and associated management information systems is correctly assessed
Discusses E-commerce, ebusiness and information the digital firm, New business models, Categories of ecommerce.
Discusses E-commerce, ebusiness and information technology and the digital firm, New business models, Categories of e-commerce, Analyse Customer-centred retailing, Business-toBusiness (B2B).
commerce, analyse Customer-centre E-business and the digital firm, Challenges and opportunities of ecommerce.
165
3.2.2
The emerging business technologies environments and practices of management information systems are clearly explained
Discusses business-to-business (B2B business, electronic business (ebusiness) and the digital firm, and challenges and opportunities of ecommerce.
3.3.1
Discusses how to Manage the organization, Models and roles of management, Management decision making, Process, stages and models of decision making.
Discusses how to Manage the organization, Models and roles of management, Management decision models of decision making. Discuss Information systems and business strategy, Strategic information systems, and the value chain model.
Discusses how to Manage the organization, Models and roles of management, Management decision making, Process, stages and models
making, Process, stages and decision making. Discuss Information systems and
business strategy, Strategic informat and industry level strategy and information systems.
166
3.3.2
The relationship between decision making and management information systems is clearly explained at different levels of an organization
Explains briefly the Decision Making and Management Information Systems at Different Levels in the Organization.
Discusses generally the Decision Making and Management Information Systems at Different Levels in the Organization :Decision Support Systems (DSS),Types of DSS, Components of a DSS,DSS applications.
Discuss the Decision Making and Different Levels in the Organization: of DSS, Components of a DSS, DSS control, Executive support systems (ESS),Role, benefits and success factors of ESS.
3.3.3
The importance of collaborative decision making environments and review group management information Systems is correctly evaluated
Discusses briefly the Collaborative Decision Making Group Decision Support Systems (GDSS).
Discusses the Collaborative Decision Making Processes: Group Decision Support success in enhanced collaborative decision making.
3.3.4
Systems and infrastructure for knowledge management, Information and knowledge work systems, Enterprise knowledge environments.
infrastructure for knowledge management, Information and knowledge environments, Business intelligence and enterprise reporting and analysis.
3.4.1
Mentions and explains the Competitive Advantage as a Driver for Management Information Systems: Information systems for and ERP, Organizational design.
Discusses the Competitive Advantage as a Driver for Management Information Systems: Information systems for competitive advantage,
3.5.1
The risk, security and control issues associated with Management information systems are thoroughly discussed.
Mentions the following: Systems integrity and risk assessment, Information systems security and control, Systems vulnerability and abuse, Systems quality problems, Control environments,
Mentions the following: Systems integrity and risk assessment, Information systems security and control, Systems vulnerability and abuse,
Discusses the following: Systems integrity and risk assessment, Information systems security and control, Systems vulnerability and abuse, Systems quality problems,
Internet security challenges, Ensuring systems quality, and Disaster recovery and business continuity planning. 3.5.2 The control measures for the risks associated with managing information systems are thoroughly discussed 3.6.1 The range of professional issues, which are associated with business activities and management information systems are correctly reviewed 3.6.2 The business activities that needs information systems support for better performance are correctively evaluated Discusses business activities, information systems. Discusses privacy and how this is managed. Discusses risk control measures.
challenges, Ensuring systems quality and Disaster recovery and business continuity planning.
Discusses risk control measures, and information systems vulnerability control. Discusses privacy and how this is managed, and intellectual property issues.
Discusses risk control measures, information systems vulnerability control, and information system security control. Discusses privacy and how this is
Discusses business activities, information systems, and relate business activities to the information systems
Discusses business activities, information systems, and relate systems supporting them, and organizational performance.
169
supporting them. 4.1.1 Network Adapter, Modem are correctly configured Identifies Compatible modem, ethernet card, sound card or other PCI card. Identifies Compatible modem, ethernet card, sound card or other PCI card, Cross-point (Philips) Screwdriver suitable for your PC case. Identifies Compatible modem, ethernet card, sound card or other PCI card, Cross-point (Philips)
(if available)and Locates the PCI slo 4.1.2 Repeaters and bridges are correctly set up Enters global configuration mode and interface configuration mode for the radio interface. Enters global configuration mode and interface configuration mode for the radio interface. Creates the SSID that the repeater uses point and Sets the access point's role in the wireless LAN to repeater.
Enters global configuration mode and interface configuration mode for the the repeater uses to associate to a
root access point, designates the SSI configuration mode and return to radio interface configuration mode, Sets the access point's role in the to privileged EXEC mode.
170
4.1.3
Hub and switches are correctly Finds the WAN or uplink port of set up the Ethernet hub and Connects an Ethernet cable from the WAN port of the hub to either the Ethernet port of the internet modem or, if expanding a network, to an empty LAN port on the existing networks router, switch or hub.
Finds the WAN or uplink port of the Ethernet hub and Connects an Ethernet cable from the WAN port of the hub to either the modem or, if expanding a network, to an empty LAN port on the existing networks router, switch or hub.Plugs an Ethernet cable the Ethernet hub and connect the other end of cable to the computer
Find the WAN or uplink port of the cable from the WAN port of the hub
networks router, switch or hub .Plug ports on the Ethernet hub and
into one of the LAN ports on hub and the computers or other network settings on each connected computer and verifies that all computers can access the network and the Internet if connected.
171
4.1.4
Finds the IP addresses of your existing gateway/router and clients and connects to your router administration interface to find the DHCP range
Finds the IP addresses of your existing gateway/router and clients and connects to your router administration interface to find the DHCP range,computer to the wireless router/AP and configures the wireless router / AP.
Finds the IP addresses of your existin gateway/router and clients and interface to find the DHCP range, computer to the wireless router/AP. Configures the wireless router / AP, tests admin page is reachable and secure the AP, tests the AP wireless connection
4.1.5
Identifies different modes; user EXEC ,privileged EXEC, global config ,interface config, setup and Enters the model ;user ,privileged EXEC
Identifies different modes; user EXEC ,privileged EXEC, global config ,interface config, setup and Enters the model ;user ,privileged EXEC, the configuration mode and also Configures the IP address,
Identifies modes; user EXEC ,privileged EXEC, global config ,interface config, setup, Enters the model ;user ,privileged EXEC, ,privileged EXEC, global config ,interface config, setup, Enters the model ;user ,privileged
172
Configures the IP address, the routin protocol also Opens shortest path first (OSPF), Creates the IGRP Routing Process, 4.2.1 The Address Resolution Protocol(ARP) is correctly configured Defines a Static ARP Cache Entry, Enables Proxy ARP, Defines a Static ARP Cache Entry, Enables Proxy ARP, Configures DAGR, Defines a Static ARP Cache Entry, Enables Proxy ARP, Configures DAGR, ARP purge-delay, ARP timeout
4.2.2
Allows ping ICMP Echo-Request outbound and Echo-Reply messages inbound, traceroute TTL-Exceeded and Port-Unreachable messages inbound.
Allows ping ICMP EchoRequest outbound and Echo-Reply messages inbound, traceroute TTLExceeded and PortUnreachable messages inbound, MTU ICMP Fragmentation-DF-Set
Allows ping ICMP Echo-Request outbound and Echo-Reply messages inbound, traceroute TTL-Exceeded and Port-Unreachable messages inbound, MTU ICMP FragmentationDF-Set messages inbound. Blocks other types of ICMP traffic
173
messages inbound.
4.2.3
Choses and Decide the values that you want in the BOOTP packet reply fields, and Decide the list of options and their values that you want returned to the BOOTP client
Choses and Decide the values that you want in the BOOTP packet reply fields, and Decide the list of options and their values that you want returned to the BOOTP client. Sets values in the policy you want associated with the BOOTP request:
Choses and Decide the values that you want in the BOOTP packet reply fields, and decide the list of options and their values that you want returned to the BOOTP client.
Sets values in the policy you want associated with the BOOTP request:
Enables the associated scope or dynamic BOOTP processing if you want to have this scope provides an address for any BOOTP client that requests one. 4.2.4 The Dynamic Host Control Protocol (DHCP) is correctly Configures a database agent and Configures a database agent and disable conflict
174
configured
4.2.5
Chooses a Domain name, Enables The Boot File, Starts the named Daemon.
Chooses a Domain name, Enables The Boot File, Starts the named Daemon and Tests the DNS Configuration
4.2.6
Locates the LDAP configuration your server configuration, Restarts the server
Locates the LDAP appropriate files to your server configuration, Restarts the server, Edits the containers. ldif file in order to include the correct LDAP suffix for your directory
Locates the LDAP configuration files, adds the appropriate files to your server configuration, Restarts the
server, and Edits the containers. Use LDAP suffix for your directory Uses the ldapadd command to add the containers. Use a bind DN that has the appropriate permissions.
175
4.3.1
Verifies connections, Ensures compatibilities of added devices in a network, and Verifies functionalities of network devices
Locates the LDAP configuration files, adds the appropriate files to your server configuration, Restarts the server, Verifies connections, Ensures compatibilities of added devices in a network.
Locates the LDAP configuration files, adds the appropriate files to the server configuration, restarts the server, verifies connections, ensures compatibilities of added devices in a network, verifies functionalities of are installed in a computer, Ensures the firewall ports are open Uses troubleshooting tools: ping, traceroute
4.3.2
Equipment problems are resolved properly and users are able to do their work correctly
Sets up the IP scheme is the same, (e.g. 192.168.0.x), the same Subnet Mask, Gateway, and DNS IP addresses also can ping the other computers by IP ADDRESS and name.
Sets up the same IP scheme Sets up the same IP scheme (e.g. (e.g. 192.168.0.x), Subnet Mask, Gateway, and DNS IP addresses Also pings the other computers by IP ADDRESS and name, the same 192.168.0.x). Makes sure that there is the same Subnet Mask, Gateway, and DNS IP addresses, can ping the other computers by IP ADDRESS and name, have the same workgroup
176
name (watch for trailing spaces) With Windows2000, XP and Vista, makes sure that have the same
username and password as the perso default setting for all but the Home network access
Removes any unnecessary firewalls, complicate the troubleshooting process. You can add them back in later after you get things working.
4.3.3
Identifies different hardware Identifies different hardware to be to be used in the upgrading used in the upgrading Plans and designs the network
177
4.3.4
Chooses LAN/WAN design considerations. Identifies hub, switch, repeater, router to be used
Chooses LAN/WAN design considerations. Identifies hub, switch, repeater, router to be used and cables: UTP/STP ,Coax, macro wave
Identifies hub, switch, repeater, rout to be used, cables: UTP/STP ,Coax, macro wave, IP address, subnet server and dsigns a switched LAN.
4.3.5
Describes application layer, presentation layer, session layer, and network layer
Describes application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer.
5.1.1
5.1.2
5.1.3
Identifies how the computer is in instruction sequence Identifies and describe instruction fetch, Identifies and describe instruction decode, Identifies and describe instruction execution, Identifies and describe instruction/data storage.
5.1.4
Identifies and describes instruction fetch, instruction decodes, Identifies and describe instruction execution.
5.2.1
Identifies cache memory, flash BIOS memory and Describes memory address
5.2.2
Describes the functions and uses of RAM, the functions and use of ROM
179
applied.
of RAM
5.2.3
Describes MaskProgrammed ROM (MROM), Programmable ROM (PROM), ErasableProgrammable ROM (EPROM), MaskProgrammed ROM (MROM), and Programmable ROM (PROM).
Describes Mask-Programmed ROM Erasable-Programmable ROM (EEPROM), Mask-Programmed ROM (MROM), and programmable ROM (PROM)
5.2.4
Analyses the storage capacity of bit, the storage capacity of byte, and the storage capacity of word
Analyses the storage capacity of bit, the storage capacity of byte, the storage capacity of word, the storage capacity of kilobyte(KB)
Analyses the storage capacity of bit, the storage capacity of byte, the capacity of kilobyte(KB), the storage capacity of megabyte (MB), the storage capacity of terabyte (TB).
180
5.2.5
Describes internal/external parallel bus, internal/external serial bus and self-repaired internal bus
5.3.1
5.3.2
discusses different barcode symbols, different scanning devices, and the functions of barcode readers
5.3.3
5.3.4
Describes hard disk, floppy disks, differentiates with other media e.g.
181
tape drives 5.3.5 Hard disk performance is correctly assessed. Explains latency Explains latency, seek time Explains latency, seek time, and transfer rates
6.1.1
Explains different categories of Audit assignment, Obtains and recording an understanding of the audit area/subject
Explains different categories of Audit assignment, Obtains and recording an understanding of the audit area/subject, Explains sources of information for tests.
6.1.2
Risk assessment for information systems is properly conducted and sequence of functions properly arranged.
Performs Compliance test, Substantive test and Develops Audit plan according to risk level
Develops Audit plan according to risk level, Gathers and assess Evidence,
182
Produces report, Presents report to Communicate results. 6.1.3 Audit assignments are correctly performed Produces detailed audit plan Produces detailed audit plan, and prepares Preliminary review of the audit area/subject Produces detailed audit plan, and prepares preliminary review of the audit area/subject, Evaluates the audit area/subject, Reports (communicating results). 6.2.1 Information Technology Governance is correctly assessed Explains existing standards for effective Information Technology Governance, Evaluates sufficiency of Information systems policy and Procedures Explains existing standards for effective Information Technology Governance, Evaluates sufficiency of Information systems policy and Procedures, Evaluates adherence of the procedures to the to regulatory standards Explains existing standards for effective Information Technology Governance, Evaluates sufficiency of Information systems policy and Procedures, Evaluates adherence of the procedures to the to regulatory standards, Assesse effectiveness of available resources to satisfy required
183
obligations. 6.2.2 Adherence of Information Systems development life cycle management is correctly assessed. Evaluates procedures for Information Systems Life Cycle Management, Explains procedures for Evaluates procedures for Information Systems Life Cycle Management, Explains procedures for system development, Explains procedures for systems testing
Evaluates procedures for Information Systems Life Cycle Management, Explains procedures for system testing, Evaluates sufficiency of real life test the standard test procedure
6.2.3
Explains components of business continuity plan, Develops a business continuity plan, Explains decision criteria of levels of risk for business continuity.
Explains components of business continuity plan, Develops a business continuity plan, Explains decision criteria of levels of risk for business continuity, Tests business continuity plan
184
6.2.4
Explains components of Disaster recovery plan, Evaluates roles of key players of disaster recovery plan
Explains components of Disaster recovery plan, Evaluates roles of key players of disaster recovery plan, Explains recovery strategy, and
Tests practical disaster recovery plan 6.3.1 Security of information assets is correctly assessed Explains concepts of Confidentiality, Integrity, and Availability Explains concepts of Confidentiality, Integrity, and Availability Assesses different categories of physical and logical access controls. Explains concepts of Confidentiality, Integrity, and Availability Assesses different categories of physical and logical access controls. Explains Public Key Infrastructures protection 6.3.2 Security procedures and components are correctly tested. Develops procedures for classifying information assets Develops procedures for classifying information assets, Tests controls to evaluate sufficiency of security of Develops procedures for classifying information assets
185
of security of 6.4.1 Objectives of entrepreneurship are properly described Explains background to entrepreneurship Defines entrepreneurship 6.4.2 Entrepreneurship in business organization is properly analyzed Lists categories of businesses Explain background to entrepreneurship, and define entrepreneurship Lists categories of businesses, and mentions characteristics of entrepreneurship with examples 6.4.3 The importance of information system in entrepreneurship is properly discussed Define information system Define information system, and assess relationship between information systems and the activities of the business 6.4.4 The role of entrepreneurship concepts in developing Describes entrepreneurship Describes entrepreneurship concepts, and Define information system by information systems, and assess relationship between information systems and the activities of the business Describes entrepreneurship concepts, discusses different types of businesses, and
186
entrepreneurship by providing
concepts.
187
NTA LEVEL 6
12.0 MODULES DESCRIPTION ODIT 611: COMPUTER ARCHITECTURE NAME: COMPUTER ARCHITECTURE NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 5.1.1 Identify the role of CPU 5.1.2 Describe the component parts of CPU 5.1.3 Describe purpose of instruction pointer 5.1.4 Describe steps in processing an instruction 5.2.1 Describe the purpose of memory cell 5.2.2 Identify the use of RAM and ROM 5.2.3 Identify different types of ROM 5.2.4 Describe storage capacities(bit, byte, word, KB,MB,GB,TB) 5.2.5 Identify internal and external buses 5.3.1 Identify different Character recognition devices
188
5.3.2 Identify the role of barcodes 5.3.3 Identify different types Tapes 5.3.4 Identify different magnetic disks 5.3.5 Describe hard disk performance TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Abd-El-Barr M., El-Rewin M, (2008), Fundamentals of Computer Organization and Architecture, Addison Wesley, McGraw-Hill Co, USA 2. Carter N. P., (2008), Schaums Outline of Computer architecture, 5th Edition, Prentice Hall, India 3. Harris D. M., Harris S. L, (2007), Digital Design and Computer Architecture, 5th edition, Addison Wesley, McGrawHill Co, USA. 4. Hennesy J. L, et al, (2007), Computer Architecture- A Quantitative Approach, 4th Edition, McGraw-Hill, USA 5. Gragon H. C, (2007), Computer Architecture and Implementation, 4th edition, Prentice-Hall USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%
ODIT 612: PROGRAMMING IN C++ NAME: PROGRAMMING IN C++ NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 1.1.2 Describe Structure of a program 1.1.2 Declare Variables and Data types.
1.1.3 Use Constants 1.1.4 Assign Operators 1.1.5 declare Basic Input/ Output 1.2.1 Use Control Structures in a program 1.2.2 1.4.1 1.4.2 1.4.3 1.4.4 Declare Functions Declare Classes Declare Friendship and inheritance apply Polymorphism apply message passing
TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions
190
REFERENCES 1. 2. 3. 4. 5. Dale N. B., Weems C., (2004), Programming in C++, 4th Edition, Addison-Wesley Publishing Co. USA Deitel P., Deitel H. M, (2009), C++ How to Program, 7th Edition, Pearson Publishing Co. UK Duffy D. J., (2006), Introduction to C++ for Financial Engineers, 4th Edition, Pearson Publishing Co. UK Joyce F., (2008), Object Oriented Programming Using C++, 6th Edition, Addison Wesley Longman, USA. Mike M., (2006), C++ Programming in Easy steps, 5th edition, Addison Wesley Longman, USA.
191
ODIT 613: BUSINESS INFORMATION SYSTEMS NAME: BUSINESS INFORMATION SYSTEMS NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 3.1.1 Discuss the relationship between the business organization, processes and functions and the associated supporting management information systems. 3.1.2 Explain appropriate management information systems for the range of business functions and organizational levels. 3.2.1 Explain how new technology is impacting on business processes and associated management information systems. 3.3.1 Discuss the managerial decision making process in business. 3.3.2 Explain the relationship between decision making and management information systems at different levels of the organization. 3.3.3 Evaluate the importance of collaborative decision making environments and review group management information systems. 3.3.4 Explain the concepts of knowledge and knowledge management in the management information systems context. TEACHING AIDS:
192
Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Abramowic W., Fensel D., (2008), Business Information Systems, 5th Edition, Prentice Hall, Warsaw, Poland 2. Abramowic W., Mayr H. C, (2007), Technologies for Business Information Systems, 5th Edition, , Prentice- Hall, Warsaw, Poland 3. Abramowic W., Flejter D., (2009), Business Information Systems Workshops, 5th edition, Prentice-Hall, Poznan Poland 4. Curtis G., Cobham D., (2008), Business Information Systems: Analysis, Design and Practice, 5th Edition, Addison Wesley, McGraw-Hill Co. USA 5. Elliot G., (2007), Global Business Information Technology, 5th Edition, Addison Wesley, McGraw-Hill Co, USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%
193
ODIT 614: ENTREPRENEURSHIP NAME: ENTREPRENEURSHIP NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 6.4.1 Describe objectives of entrepreneurship 6.4.2 Analyze entrepreneurship in business organization 6.4.3 Discuss the importance of information system in entrepreneurship 6.4.4 Discuss the role of entrepreneurship concepts in developing business TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc. METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Carson M, Buckley P. J. (2010), Entrepreneurship: Theory, Networks, History, 2nd Edition, Prentice-Hall, Poznan Poland. 2. Davidson P., (2005), Researching Entrepreneurship, 5th Edition, Addison Wesley, McGraw-Hill Co, USA 3. Drucker P. F., (2009), Innovation and Entrepreneurship, 3rd Edition, Addison Wesley McGraw-Hill Co, USA 4. Kuratko D. F., Hodgetts R. M., (2008), Entrepreneurship: Theory, Process, and Practice, 4th Edition, Prentice- Hall, Delhi. 5. Wickham P. A., (2007), Strategic Entrepreneurship, Prentice-Hall, UK.
194
195
ODIT 621: INFORMATION SYSTEM ASSURANCE NAME: INFORMATION SYSTEMS ASSURANCE NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 6.1.1Perform Information Systems audit according to required procedures 6.1.2 Perform information systems Risk Assessment Arrange sequence of functions 6.1.3 perform audit assignment 6.2.1Assess Information Technology Governance 6.2.2 Assess adherence of Information Systems development life cycle management 6.2.3 Perform Tests to check Business continuity Management 6.2.4 Perform test to check effectiveness of Disaster recovery planning 6.3.1 Assess Security of Information assets 6.3.2 Test Security procedures and components
TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc
196
METHOD OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Andrew B., Kovacich G. L, (2006), Information Assurance: Security in the Information Environment, 6th Edition, Prentice Hall, Warsaw. 2. Dube D. P., Gulati V. P., (2005), Information Systems audit and Assurance, 5th Edition, Prentice Hall, New Delhi India. 3. Gelinas U. J., Dull R. B., (2009), Accounting Information Systems, 5th Edition, Addison Wesley Co., USA. 4. Qian Y., Tipper D., Krishnamurthy P., (2008), Information Assurance: Dependability and security in Networked Systems, 6th Edition, Prentice Hall, India. 5. Warketin M., Vaughn R., (2006), Enterprise Information Systems Assurance and System Security, 7th Edition, Addison Wesley, USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%
197
ODIT 622: DATABASE DRIVEN WEBSITE DESIGN NAME: DATABASE DRIVEN WEBSITE DESIGN NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 2.1.1 download Apache, PHP, Mysql or Wamp/ Xamp 2.1.2 install download Apache,PHP, Mysql or Wamp / Xamp 2.1.3 use the server 2.2.1 reading and writing files 2.2.2 API file manipulation 2.2.3 Uploading and exit file 2.3.1 use PHP syntax 2.3.2 declare variables 2.3.3 declare arrays 2.3.4 declare functions 2.3.5 declare classes and objects 2.3.6 declare string operations
198
2.4.1 declare sites structure 2.4.2 prepare graphic resources 2.4.3 design templates, upload templates and resources 2.4.5 create all modules and add to templates 2.4.6 create pages and forms TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. 2. 3. 4. 5. Dunlap I. H, (2006), Open Source Database Driven Web Development, 5th edition, Kauffmann, USA Norman M., (2007), Database Design Using MySQL for Windows, 6th edition, Prentice-Hall, California, USA Oxer J., (2007), How to Build a Website and Stay Sane, 4th Edition, Prentice-Hall, USA Reynolds J., (2007), The Complete E-Commerce Book: Design, Build & Maintain, 6th Edition, Prentice-Hall, USA Yank K., (2008), Build Your Own Database Driven Website Using PHP & MySQL, 5th Edition, Addison Wesley, USA
ODIT 623: FUNDAMENTALS OF NETWORK ADMINSTRATION NAME: FUNDAMENTALS OF NETWORK ADMINISTRATION NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 4.1.1 configure Network Adapter, Modem 4.1.3 set Repeater and Bridge 4.1.4 set Hub and Switch 4.1.5 connect Wireless Access Point 4.1.6 configure Router 4.2.1 configure ARP 4.2.2 configure ICMP 4.2.3 configure BOOTP 4.2.4 configure DHCP 4.2.5 configure DNS 4.2.6 configure LDAP 4.3.1 Troubleshoot problems with computer systems
200
4.3.2 assist users to resolve problems with equipment and data 4.3.3 plan, design, acquire new or upgraded hardware and software 4.3.4 Install LAN/WAN (Cabling, Modifying, Testing), Maintaining Computer 4.3.5 Apply ISO management model TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Limoncelli T. A., et al, (2007), 8th Edition, McGraw-Hill, USA 2. Maiwald E, (2006), Fundamentals of Network Security, 4th Edition, Addison Wesley Co., USA 3. Skandier T., (2009), Network Administrator Street Smart: A Real World Guide to CompTIA, 6th Edition, PrenticeHall, USA. 4. Stein L. D., (2001), Network Programming with Perl, 5th edition, Pearson Publishing Co. Ltd, UK 5. Suehring S., et al, (2007), Wiley Pathways Windows Network Administration, 5th edition, Pearson Publishing Co. Ltd, UK INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%
201
ODIT 624: PROJECT DEVELOPMENT NAME: PROJECT DEVELOPMENT NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 3.4.1 Explain the key requirement of competitive advantage that drives the need for management information systems and its manifestation through processes such as Supply Chain Management (SCM), Enterprise Resource Planning (ERP), organizational redesign and change. 3.5.1 Discuss the risk, security and control issues associated with managing Information systems projects. 3.6.1 Review the range of professional issues, which are associated with managing business project activities and management information systems.
TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc. METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions
202
REFERENCES 1. Cleland D. I., Ireland L. R., (2006), Project Management: Strategic Design and implementation, 5th Edition, Pearson Publishing Co., UK. 2. Haynes M. E., (2006), Project Management: Practical Tools for Success, 5th edition, McGraw-Hill, USA 3. Heerkens G. R., (2007), Project Management: 24 Steps Help You Master any Project, 4th Edition, Pearson Publishing Co., UK. 4. Kerzner H., (2009), Project Management: A Systems Approach to Planning, Scheduling, 10th edition, McGraw-Hill, New Jersey, USA 5. Lewis J. P., (2007), Fundamentals of Project Management, 3rd Edition, Prentice-Hall, California, USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%
203
1.0
BACKGROUND INFORMATION The philosophy behind the development of competence modular curricula is to comply with the Nations Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative, and flexible work force that will be responsive to the social needs. Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills. The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g. create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 7 for the INFORAMTION AND COMMUNCITION TECHNOLOGY specialization. The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated for this qualification and this accounts for 34 weeks for a year or 68 weeks for the whole qualification of 2 years (4 semesters)
204
2.0
MODULE CODING
The coding of modules follows logical sequence as in the following example for HDIT 711.
HDIT
The first digit stands for the NTA level, in this case Higher Diploma which is level Seven.
The second digit stands for semester, i.e. for semester one
the last digit stands for the order of the module in the semester. Modules are arranged serially the highest number, depending upon the number for modules in the semester.
205
3.0 GRADING OF ASSESSMENT RESULTS The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 7 Grade A B+ B C F I Definition Excellence Very Good Good Average Failure Incomplete Score 75-100 65-74 55-64 40-54 0-39
206
4.0
AWARDS The award shall be made to students who satisfy the following conditions. (a) (b) (c) Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guideline
5.0
AWARDS CLASSFICATION
Awards Classification for NTA Level 7 Class of Award First Class Upper Second Lower Second Class Pass Cumulative GPA 4.4 to 5.0 3.5 to 4.3 2.7 to 3.4 2.0 to 2.6
207
6.0 SUMMARY FRAMEWORK QUALIFICATION HIGHER DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will configure and manage operating systems, prepare graphical user interfaces and animations, apply knowledge, skills and principles of
accounting and JAVA to prepare and manage office automation packages, including accounting packages, apply principles of computer network and other computing techniques to manage organization systems and recommend appropriate measures for management decisions. NTA LEVEL 7
COMPETENCE The holder of this qualification will apply knowledge, skills and principles in a broad range of LEVEL DESCRIPTOR complex technical ICT activities of developing and managing operating systems, graphical interfaces, animations and office automation packages with higher degree of personal responsibility and some responsibility for the work of others. CREDITS AT THIS LEVEL CUMULATIVE CREDITS AT THIS LEVEL MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL DATE
240
360
30 NEW
208
QUALIFICATION STANDARD LAST RVIEWED ENTRANCE REQUIREMENTS ODIT Level 6 or Form Six with 2 Principal level Passes, with total points of not less than 4.5; one of them should be either Physics or Advanced Mathematics.
7.0 PRINCIPAL LERNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA S/NO PRINCIPAL LEARNING OUTCOME CREDIT VALUE ASSESSMENT CRITERIA 1 2 Configure and manage Operating System Manage business environment performance and social well being by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication. 15 60 1.1 Operating Systems are properly configured and managed. 2.1 Computer graphics techniques to manage business performance are properly applied 2.2 Entrepreneurship skills to manage business performance are properly applied. 2.3 Knowledge and skills of development studies are properly applied in business environment. 2.4 Business Communication skills are properly applied for effective and efficient communication. 3.1 Artificial Intelligence skills in managing businesses are properly applied.
60
209
3.2 Discrete Mathematics and statistics knowledge is properly applied to manage businesses. 3.3 Research methods skills and techniques are properly applied. 3.4 Quantitative techniques to solve business problems are properly applied.
Apply Java skills and knowledge of accounting in developing and managing different application programs
45
4.1 Java skills and knowledge to develop and manage application programs are properly applied. 4.2 Principles of accounting skills to manage application program are properly applied. 4.3 Knowledge and skills of computer applications are applied to manage accounting packages
Manage the organization information systems by applying skills and knowledge of computer network and multimedia.
30
5.1 Knowledge and skills of computer network are properly applied to manage organization information systems. 5.2 Knowledge and skills of multimedia are properly applied to manage organization information systems.
210
Apply technologies of mobile computing and explain the potential, importance and ways of utilizing them in ICT projects and working environment.
30
6.1 Knowledge and skills of mobile computing are clearly explained and properly applied to improve business performance. 6.2 Knowledge and skills of ICT Project management are properly applied to improve business performance.
240
211
8.0
PROGRAM STRUCTURE
SEMESTER I S/NO 1 2 3 4 CODE HDIT 711 HDIT 712 HDIT 713 HDIT 714 NAME OF MODULE Discrete Mathematics and Statistics Business Communication Computer Graphics Designing Operating Systems Configuration TOTAL CREDITS FOR SEMESTER I CREDIT 15 15 15 15 60
SEMESTER II S/NO 1 2 3 4 5 CODE HDIT 721 HDIT 722 HDIT 723 HDIT 724 HDIT 725 NAME OF MODULE Development Studies Principles of Accounting Artificial Intelligence Applications Quantitative Techniques Field Attachment TOTAL CREDITS FOR SEMESTER I 60 CREDIT 15 15 15 15
212
SEMESTER III S/NO 1 2 3 4 CODE HDIT 731 HDIT 732 HDIT 733 HDIT 734 NAME OF MODULE Multimedia Systems Design Programming with Java Research Methodology Computerized accounting TOTAL CREDITS FOR SEMESTER III CREDIT 15 15 15 15 60
SEMESTER IV S/NO 1 2 3 4 CODE HDIT 741 HDIT 742 HDIT 743 HDIT 744 NAME OF MODULE Networking Management Entrepreneurship Development Mobile Computing Project Management TOTAL CREDITS FOR SEMESTER IV GRAND TOTAL CREDITS FOR NTA LEVEL 7 CREDIT 15 15 15 15 60 240
213
9.0
NACTE STANDARDS AND RELATED ENABLING OUTCOMES ENABLING OUTCOMES (As Identified and Formulated by Curriculum Developers) 1.1 Configure Operating Systems SUB-ENABLING OUTCOMES
1.1.1Install Operating Systems 1.1.2 Create users of operating systems with their rights.
1.2.1 Administer users of operating system 1.2.2 Secure Operating Systems components 1.2.3 Assess systems performance and diagnose faults
2. Manage business environment performance and social wellbeing by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication.
2.1.1 Design graphics in media such as print digital or motion pictures. 2.1.2 Decorate products 2.1.3 Assemble images, motions and graphics.
2.2 Communicate effectively in business environment and apply skills of development studies.
2.2.1 Apply writing and presentation skills for effective communication 2.2.2 Make effective presentations in international business environment
214
2.2.3 Interrelate different development studies concepts to manage business 2.2.4 Apply techniques to manage different social development challenges 2.3 Develop entrepreneurship venture and manage them for business growth 2.3.1 Prepare business plans 2.3.2 Apply marketing skills to market products for opportunities identified. 2.3.3 Apply skills for overcoming business challenges. 3. Apply Artificial Intelligence, Discrete Mathematics, Research methods and Quantitative techniques in managing businesses. 3.1 Apply intelligent algorithms, artificial intelligence and software tools to solve business problems 3.1.1 Interrelate Intelligent Algorithms tools to business problems. 3.1.2 Apply methods for encoding knowledge in computer systems 3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems. 3.2.2 Design quantitative models of estimation and forecasting for decision making. 3.3 Apply discrete Mathematical and Statistical techniques in computing operations. 3.3.1 Apply information technology in mathematical contexts 3.3.2 Explain the logical and systematic approach to solving problems in
215
particular simple combinatorial problems. 3.4 Apply Research Methodology for writing the field attachment report. 3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations. 3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.
4. Apply Java skills and knowledge of accounting in developing and managing different application programs.
4.1.1 Analyze user requirements for program development. 4.1.2 Apply skills and knowledge of designing and building application programs.
4.1.3 Test and Implement application programs 4.2 Apply Principles of accounting to manage business finance 4.2.1 Prepare financial statements for business 4.2.2 Identify and describe legal aspects of company formation, shares and bonus. 4.3.1Monitor and evaluate designed application programs.
216
5. Manage the organization information systems by applying skills and knowledge of computer network and multimedia.
5.1.1 Design the network system for the organization. 5.1.2 Install, test and implement the computer network system 5.2.1 Deploy security mechanism 5.2.2 Troubleshoot the network systems 5.2.3 Evaluate and Maintain network systems. 5.3.1 Design appropriate multimedia systems to solve specific business problems. 5.3.2 Evaluate business problems to be solved by multimedia tools. 6.1.1 Design wireless systems for solving business problems. 6.1.2 Apply Wireless transmission in solving business problems.
5.3 Apply multimedia tools and techniques to develop, present and solve business problems.
6. Apply technologies of 6.1 Formulate requirements for a mobile mobile computing and computing application in a chosen explain the potential, Specialized business case. importance and ways of utilizing them in ICT and projects and working environment. 6.2 Apply Information Communication Technology concepts to business projects in order to improve business performance
6.1.3 Evaluate wireless transmission systems 6.2.1 Assess business performance requiring ICT enhancement 6.2.2 Implement ICT concepts in solving business problems.
217
6.3 Apply Information Communication Technology concepts to support business at place of work.
evaluate
system
218
10.0 ASSESSMENT CRITERIA AND ASSESSMENT INSTRUMENT SUB-ENABLING RELATED TASK ASSESSMENT OUTCOMES CRITERIA 1.1.1 Install Operating Systems Set boot sequence Partition hard disk Format hard disk Operating systems are properly installed. Users of operating systems with their rights are properly created. Users of operating systems are appropriately administered. Components of operating system are properly secured.
1.1.2
1.2.1
Create users of Create a user to a specific group operating systems with their Set initial password to be changed rights Configure user right Test user credentials Administer users Set permissions for files and application of operating Set login schedule systems. Set network access Secure Operating Systems components Explain procedures for turning on firewall Install anti-virus Authenticate users. Enforce sharing. Setup communication security Diagnose software and hardware errors. Troubleshoot errors Report fault rectification systematically
Practical test
1.2.2
1.2.3
Practical test
219
2.1.1
Graphics in media such as print digital or motion pictures are properly designed. Products are clearly decorated.
2.1.2
Decorate products
2.1.3
Design colors, sounds and photo Set appropriate styles Test the objects (color, sound and photo) Assemble images Assemble sound and motion pictures Integrate assembled objects
Images, motion and graphics are properly assembled. Writing and presentation skills are properly applied for effective communication. Effective presentations in international business environment are properly made. Techniques are
Group assignment
Practical test
2.2.1
Apply writing and Explain techniques for effective communication presentation skills Write a report. for effective Make presentation in communication. group work.
Group presentation
2.2.2
Apply tools for effective communication in International business environment Make presentation for a real business case Apply tools to enhance
Group presentation
2.2.3
Apply techniques
Group
Report and
220
2.3.1
2.3.2
2.3.3
3.1.1
good governance Relate gender issues with social development Explain development challenges and opportunities in regional integration and trade Initiate Entrepreneurial venture Prepare feasible business plan Monitor and Evaluate venture initiated Identify market opportunities Explain key factors for business venture development Give examples of creativity and innovation for product development Explain sources of financing entrepreneurial venture Explain contemporary entrepreneurship issues Apply business networking skills to overcome business challenges Apply intelligent algorithms in problem solving. Discuss strengths and limitations of various
Business plans are Individual/ group Report properly prepared. assignment submission
Marketing skills are properly applied to market products for opportunities identified. Skills for overcoming business challenges are properly applied
Case Study
Report submission
221
to business problems.
artificial intelligence and machine learning techniques Implement Artificial Intelligent and machine learning algorithms to solve real problems Distinguish between a conventional system and intelligent system Explain Artificial Intelligence concept and its applications Apply Artificial Intelligent techniques in solving problems of a particular domain. Apply transportation model to solve business problems Apply network analysis and project scheduling for resource allocation Apply basic inventory techniques for decision making Formulate Linear programming model Apply linear programming models to solve complex business cases.
3.1.2
Methods are System coding properly applied case study for encoding knowledge in computer systems.
3.2.1
Apply different Decision models and Quantitative methods in analysing and solving business problems.
Different decision models and quantitative methods are properly applied in analysing and solving business problems. Quantitative models of estimation and forecasting are properly designed
Report submission
3.2.2
Report submission
222
decision making.
3.3.1
Apply information Practise basic concepts of mathematical proof. technology in Solve complex ideas and mathematical relate them Apply methods to solve a context given task Explain the logical Implement selected Artificial Intelligence and and systematic machine learning approach to algorithms to solve real world problems solving problems Apply different decision in particular models and quantitative methods in analyzing and simple solving business combinatorial problems. Apply sensitivity analysis problems. techniques to solve business challenges
Information Exercises, technology is assignments properly applied in mathematical context. The logical and systematic approach is clearly explained in solving problems in particular simple combinatorial problems. . Exercises, assignments, examinations
3.3.2
3.4.1
Explain a research process Design research with tested hypothesis using real business case Develop research
Report submission
223
exercising critical judgment and discrimination in the resolution of complex problematic situations. 3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.
instruments for data exercising critical collection. judgment in the Test research instruments resolution of complex problematic situations. Develop research problem and research design Write research proposal Explain research analysis techniques Produce research report
Research methods Individual and and techniques group are properly assignment applied in reporting and presenting the required results in agreed format. Users requirements are clearly analyzed for program development. Skills and knowledge of designing and building application programs are properly applied Case study, assignment
Report submission
4.1.1
4.1.2
Prepare a programming environment Plan for application program Design an application program Write a program(coding)
224
4.1.3
Install designed program Login data to test its effectives Execute (compile) program
System coding
4.2.1
Check for routine errors Document the errors Examine program performance
4.2.2
5.1.1
Check required update Perform necessary updates Report changes performed accordingly Explain technical issues associated with virtual, switching tools for LAN and WAN internetworking. Explain cost, merits and demerits of wide area and local area network. Explain the role of different Layers of OSI Network model Apply design technologies concepts to develop computer network system
Application programs are properly maintained. Computer network system for an organization is properly designed.
Guided simulation
Practical presentation
Practical case
225
5.1.2
5.2.1
Install, test and Apply hardware network connectivity system to implement implementation computer network Explain and apply system software tools to implement network system Apply tools to test implemented network system Establish security Explain issues related to threats and vulnerabilities mechanism to computer networks Explain the mechanism of setting and using Intrusion Detection System,firewall,data encryption algorithms, Kerberos key exchange to ensure maximum network security Apply security mechanism and techniques to control and manage the network system security Troubleshoot the network systems Identify the problem by checking the settings and options. Describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details
Practical case
Practical case
Case presentation
5.2.2
Practical case
Presentation Report
226
5.2.3
view on internet connection and sharing. Select and use diagnostic tools and equipment to identify and analyze network malfunctions Apply software and hardware tools to recover the problem Analyze current system and organization requirements to identify system upgrade requirements
Simulation case
Report submission
Perform upgrade
installation, test effectiveness and functionality of upgrade, and document results Evaluate system performance and produce performance report 5.3.1 Design appropriate multimedia systems to solve specific business Describe basic concepts and domains in Multimedia Explain the techniques used to create and combine different media types. Implement design theories Appropriate multimedia systems are properly designed to solve specific business Simulation case Report submission
227
problem.
problems.
5.3.2
Assess practicability of
6.1.1
multimedia applications using contemporary hardware and software. Assess impact of multimedia applications to enhance business process performance. Assess implementation issues surrounding key facets of multimedia design, including interface design. Identify user requirements for the system development Examine the resources for the design Implement program for business resolution Explain business processes as related to mobile computing Explain the concept of wireless communication to support connectivity to mobile networks and wireless internet.
Business problems Case study/ are appropriately simulation evaluated by multimedia tools.
Report submission
Practical case
Report submission
6.1.2
Practical case
Report submission
228
Apply the principles of transaction and ecommerce over wireless devices to support ebusiness 6.1.3 Evaluate wireless transmission systems Assess systems integrity Monitor system log files Evaluate systems availability Integrate all required resources Improve resource accessibility time Report system performance Wireless Simulation/ case Report transmission study systems are correctly evaluated Performance of Simulation/ case Report Mobile systems study developed is properly assessed.
6.2.1
6.2.2
Assess business Check business growth performance after Check cost improvement after implementation mobile computing Check level of business competitiveness in the implementation global market
Report submission
229
11.0 BENCHMARKING OF ASSESSMENT CRITERIA ASSESSMENT CRITERIA SATISFACTORY 1.1.1 Operating systems properly installed. Sets boot sequence
EXCELLENT Sets boot sequence, partitions hard disk and formats appropriately and install operating system Creates a user to a specific group, sets password features, configure user right and tests user credentials.
1.1.2
1.2.1
Sets permissions for files Sets permissions for files and and application login application, schedules the schedule logging and sets network access.
1.2.2
Explain procedures for turning on firewall, install anti-virus, and authenticate of users.
Explains procedures for turning on firewall, installs anti-virus, authenticate of users, enforce sharing and setup communication security. Diagnoses software and hardware errors, troubleshoots errors, and reports fault rectification systematically
230
1.2.3
diagnosed. 2.1.1 Graphics in media such as print digital or motion pictures are properly designed. Does needs analysis Performs needs analysis and prepares design plan. Performs needs analysis, prepares design plan and develops the design.
2.1.2
Designs colors, sounds and photo, sets appropriate styles and objects (color, sound & photo)
2.1.3
Assembles images
Assembles images, sound and motion pictures and integrates assembled objects
2.2.1
Writing and Explains techniques for presentation skills effective communication are properly applied for effective communication.
Explains techniques for effective communication, writes a report and makes presentation in group work.
231
2.2.2
Explains quality features of international business and develops tools for effective communication in International business environment
Explains quality features of international business, develops tools for effective communication in International business environment and makes presentation for a real business case Develops tools to enhance good governance, relates gender issues with social development and explains development challenges and opportunities in regional integration and trade Initiates Entrepreneurial venture, prepares feasible business plan, monitor and evaluates venture initiated Identifies market opportunities, explains key factors for business venture development and gives examples of creativity and innovation for product development
2.2.3
Develops tools to enhance good governance and relates gender issues with social development
2.3.1
2.3.2
Marketing skills are properly applied to market products for opportunities identified.
Identifies market opportunities, and explains key factors for business venture development
2.3.3
Skills for
Explains sources of
Explains contemporary
entrepreneurial venture, explains contemporary entrepreneurship issues and applies business networking skills to overcome business challenges
3.1.1
Explains strengths and limitations of various artificial intelligence and machine learning techniques
Discusses strengths and limitations of various artificial intelligence and machine learning techniques and applies intelligent algorithms in problem solving.
Discusses strengths and limitations of various artificial intelligence and machine learning techniques, applies intelligent algorithms in problem solving and implements Artificial Intelligent and machine learning algorithms to solve real problems
3.1.2
Distinguishes between a conventional system and intelligent system, and explains Artificial Intelligence concept and its applications
Distinguishes between a conventional system and intelligent system, explains Artificial Intelligence concept and its applications, and applies Artificial Intelligent techniques in solving problems of a particular domain
233
3.2.1
Different decision models and quantitative methods are properly applied in analysing and solving business problems.
Applies transportation model to solve business problems, and applies network analysis and project scheduling for resource allocation
Applies transportation model to solve business problems, network analysis and project scheduling for resource allocation, and basic inventory techniques for decision making
3.2.2
Quantitative models Formulates Linear of estimation and programming model forecasting are properly designed for decision making.
Formulates Linear programming model, and applies linear programming models to solve complex business cases.
Formulates Linear programming model, applies linear programming models to solve complex business cases, and analyzes quantitative models of estimation for decision making.
3.3.1
Practices basic concepts of mathematical proof, and solve complex ideas and relate them
Practices basic concepts of mathematical proof, solves complex ideas and relate them, and applies methods to solve a given task
3.3.2
explained in solving algorithms to solve real problems in world problems particular simple combinatorial problems.
algorithms to solve real world problems, and applies different decision models and quantitative methods in analyzing and solving business problems.
real world problems, applies different decision models and quantitative methods in analyzing and solving business problems, and applies sensitivity analysis techniques to solve business challenges
3.4.1
Different research methodologies, tools and techniques are properly applied in exercising critical judgment in the resolution of complex problematic situations. Research methods and techniques are properly applied in reporting and presenting the required results in agreed format. Users
Explains research process, and design research with tested hypothesis using real business case, develops research instruments for data collection.
Explains research process, design research with tested hypothesis using real business case, develops research instruments for data collection, and tests research instrument
3.4.2
Develops research problem and research design, and writes research proposal
Develops research problem and research design, write research proposal, explains research analysis techniques, and produces report
4.1.1
Examines user
requirements are clearly analyzed for program development. 4.1.2 Skills and knowledge of designing and building application programs are properly applied An application program is properly tested and implemented. Prepares a programming environment
Prepares a programming Prepares a programming environment, and plans environment, plans for for application program application program, designs an application program and write a program(coding).
4.1.3
Installs designed program, login data to test its effectives and execute (compile) program
4.2.1
Designed Checks for routine errors application program is properly monitored and evaluated.
Checks for routine errors, documents the errors, and examines the program performance
4.2.2
Checks required update, performs necessary updates, and reports changes performed accordingly
236
5.1.1
Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN internetworking.
Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN internetworking, and explains cost, implementation, benefits and disadvantages of wide area and local area network.
Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN internetworking, explains cost, implementation, benefits and disadvantages of wide area and local area network, explain the role of different Layers of OSI Network model, and applies design technologies concepts to develop computer network system
5.1.2
Applies hardware network connectivity technologies to implement network system, explains and applies software tools to implement network system
Applies hardware network connectivity technologies to implement network system, explains and apply software tools to implement network system, and applies tools to test implemented network system
5.2.1
established
to computer networks.
computer networks, and explains the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms, Kerberos key exchange to ensure maximum network security.
the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms, Kerberos key exchange to ensure maximum network security applies security mechanism and techniques to control and manage the security mechanism. Identifies the problem by checking the settings and options, describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing, detects and use diagnostic tools and equipment to identify and analyze network malfunctions, and applies software and hardware tools to recover the problem Analyzes current system and organization requirements to identify system upgrade requirements, perform upgrade installation, tests effectiveness
238
5.2.2
Identifies the problem by checking the settings and options, and describes the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing.
5.2.3
Analyzes current system and organization requirements to identify system upgrade requirements, performs
requirements
upgrade installation, tests effectiveness and functionality of upgrade, and documents results
and functionality of upgrade, and document results, and evaluates system performance and produce performance report. Describes basic concepts and domains in Multimedia, explain the techniques used to create and combines different media types, and implements design theories by building interactive webbased multimedia product. Assesses practicability of multimedia applications using contemporary hardware and software, asses impact of multimedia applications to enhance business process performance, and assess implementation issues surrounding key facets of multimedia design, including interface design. Identifies user requirements for the system development, examines the resources for the design and implements
239
5.3.1
Appropriate Describes basic concepts Multimedia systems and domains in Multimedia are properly designed to solve specific business problems
Describes basic concepts and domains in Multimedia and explain the techniques used to create and combines different media types.
5.3.2
Assesses practicability of multimedia applications using contemporary hardware and software, and assess impact of multimedia applications to enhance business process performance.
6.1.1
Identifies user requirements for the system development and Examine the resources
business problems.
6.1.2
Explains business processes as related to mobile computing and explains the concept of wireless communication to support connectivity to mobile networks and wireless internet.
Explains business processes as related to mobile computing, explains the concept of wireless communication to support connectivity to mobile networks and wireless internet and applies the principles of transaction and e-commerce over wireless devices to support e-business Assesses systems integrity, monitor system log files and evaluates systems availability
6.1.3
Wireless transmission systems are correctly evaluated Performance of Mobile systems developed is assessed. Business performance after mobile computing implementation assessed.
6.2.1
Integrates all required resources and improves resource accessibility time. Checks business growth and checks cost improvement after implementation
Integrates all required resources, improves resource accessibility time and reports system performance Checks business growth, checks cost improvement after implementation and checks level of business competitiveness in the global market
240
6.2.2
12.0 MODULES DESCRIPTION CODE NAME NO OF CREDITS : : : HDIT 711 DISCRETE MATHEMATICS AND STATISTICS 15
SUB-ENABLING OUTCOMES 3.3.1 Apply information technology in mathematical contexts 3.3.2 Explain the logical and systematic approach to solving problems in particular simple combinatorial problems. TEACHING AIDS: Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures and demonstration REFERENCES: 1. Gossett,E(2009), Discrete Mathematics with Proof, Second Edition, John Wiley & Sons, United Kingdom 2. Gupta, S.C and Kapoor, V.K (2007), Fundamentals of mathematical Statistics, 11th Edition, Sultan Chand and Sons. India. 3. Johnsonbaugh,R (2008) ,Discrete Mathematics, 8th edition, Macmillan- London 4. Kenneth,H (2007) ,Discrete Mathematics and its Applications, Sixth Edition, McGraw-Hill,Asia. 5. Susanna, S(2011), Discrete Mathematics with Applications, Fourth Edition, Brooks/Cole,Boston.
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
241
: : :
SUB-ENABLING OUTCOMES 2.2.1 Apply writing and presentation skills for effective communication 2.2.2 Make effective presentations in international business TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, demonstration and role model REFERENCES 1. 2. 3. 4. Gilbald.(2006);MLA Handbook for writers of Research Paper Edition, Mod Lang Association of America. Guffey, Mary Ellen.(2006);Business Communication Process and Product 5th Edition, South-Western Los Angels. Madhukerr RK.(2005);Business Communication and Customer,1st ed., Vikas Publishing house, New Dethi. Munter,M.(2006);Guide to Managerial Communication Effective Business Writing and Speaking ,Prentice Hall New Jersey-USA. 5. Urmila,Rai S.M(2006);Business Communication: Himalaya Publishing, New,Dethi.
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
242
: : :
SUB-ENABLING OUTCOMES 2.1.1 Design graphics in media such as print digital or motion pictures. 2.1.2 Decorate products 2.1.3 Assemble images, motion graphics TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, demonstration and role model REFERENCES 1. Asthana, R & Sinha,N (2007) Computer Graphics For Scientists And Engineers, Second Edition New Age International Publisher-USA. 2. Cunningham, S (2007); Computer Graphics: Programming in OpenGL for Visual Communication, Prentice Hall New Jersey -USA. 3. Edward, A (2008) Interactive Computer Graphics: A Top-down Approach with OpenGL, 5th Edition, Addison-Wesley,NY 4. Hill,F &Kelley, S (2006); Computer Graphics Using OpenGL, 3rd Edition, Prentice New Jersey -USA. 5. Lengye, E (2006); Mathematics for 3D Game Programming and Computer Graphics, 3rd Edition, California. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
243
: : :
SUB-ENABLING OUTCOMES 1.1.1Install Operating Systems 1.1.2 Create users with their rights 1.2.1 Administer users 1.2.2 Secure Operating Systems components 1.2.3 Assess systems performance and diagnose faults TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Galvin,S( 2011) Operating System Concepts 8th Edition, John Wiley and Sons Cleveland, OH -USA. 2. Stallings,W ( 2009),Operating Systems: Internals and Design Principles 5th Edition, Prentice Hall, New Jersey. 3. Stallings.W (2011); Operating Systems: Internals and Design Principles 6th Edition Prentice Hall, New Jersey. 4. Tanenbaum,A &.Woodhull, A (2008) Operating Systems Design and Implementation Third Edition Prentice Hall, New Jersey,USA. 5. Tanenbaum,A (2008) Modern Operating Systems, 3rd Edition, Prentice Hall Press, Atlanta -USA. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
244
: : :
SUB-ENABLING OUTCOMES 2.2.3 Interrelate different development studies concepts to manage business 2.2.4 Apply techniques to manage different social development challenges TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Chambers, R. (2005); Ideas for Development, Earthscan, London. 2. Crocker, D. A. (2008); Ethics of Global Development: Agency, Capability and Deliberative Democracy, Cambridge University Press, Cambridge. 3. Peet, R. with Hartwick, E. (2009) Theories of Development, Contentions, Arguments , Alternatives. Second Edition, Guilford Press, New York and London. 4. Smith, J. (2008) Social Movements for Global Democracy, John Hopkins University Press, Baltimore-USA. 5. Willis, K. (2005) Theories and Practices of Development, Routledge, London and New York-USA.
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
245
: : :
SUB-ENABLING OUTCOMES 4.2.1 Prepare financial statements for business 4.2.2 Identify and describe legal aspects of company formation, shares and bonus. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB 2. Jat, R.B. and Jugu, Y.A. (2008); Modern Financial Accounting: Theory and Practice. Jos: Ehindero (Nig.) Limited 3. Jugu, Y. G. (2008); Financial Accounting Synopsis 2nd Edition, Jos Ehindero Ltd (Nig.) 4. Raimes Jane,(2006);Financial Accounting Prentice Hall New Jersey-USA. 5. Wood Frank, Alan Sangster,(2005);Business Accounting 10th Edition Prentice Hall, New Jersey-USA. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
246
: : :
SUB-ENABLING OUTCOMES 3.1.1 Interrelate Intelligent Algorithms tool to business problem. 3.1.2 Apply methods for encoding knowledge in computer systems TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Elaine,R &Kevin,K((2009),Artificial Intelligence (2nd ed.),McGraw Hill, NY 2. Macmillan, R(2009) Artificial Intelligence,(3rd ed.),Prentice Hall, London 3. Wesley,G(2008), Artificial Intelligence (6th ed.), Addison Wesley, NY 4. Wesley,P(2007), Artificial Intelligence(7th ed.),Addison Wesley, NY. 5. Stuart, R &Peter,N(2010), Artificial intelligence: a modern approach, (2nd Edition), Prentice Hall, USA INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
247
: : :
SUB-ENABLING OUTCOME 3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems. 3.2.2 Design quantitative models of estimation and forecasting for decision making. TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. 2. 3. 4. 5. Denzin NK, Lincoln YS (2009). Handbook of Qualitative Research. Sage Publications London. Nkwi P, et al (2008) Field Research into Social Issues: Methodological Guidelines. Osborne,J (2007),Best Practices in Quantitative Methods, Pope C,& Mays N (2009) Qualitative Research in Health Care. London: BM Richard. I. Levin & David. S. Rubin(2006) Statistics for Management,7th Edition ,Pearsons,New Delhi. Washington, DC.
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
248
: : :
SUB-ENABLING OUTCOMES
6.3.1 Apply ICT skills to support organization applications and infrastructure. 6.3.2 Maintain and evaluate system optimum performance
INTEGRATED METHOD OF ASSESSMENT: Employers work certificate Report Internal supervisor assessment 40% 30% 30%
249
: : :
SUB-ENABLING OUTCOMES 5.3.1.Design appropriate multimedia systems to solve specific business problems. 5.3.2. Evaluate business problems to be solved by using multimedia tools TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Agnew,P& Keller,P man.(2006);Distributed Multimedia: Technologies, Applications, and Opportunities in the Digital Information Industry,2nd ed, Addison Wesley,NY. Banerji,A & Ghosh,A (2010) Multimedia Technologies 3rd Edition McGraw Hill, New Jersey-USA. Gibbs,J& Dionysion C. (2005); Multimedia Programming 2nd Edition Addison Wesley, New Jersey-USA
2. 3. 4. 5. .
Halsall,F (2007);Multimedia Communications: Applications, Networks, Protocols and Standards,3rd Edition ,Addison Wesley,NYJeffcott,J (2007); Multimedia In Practice :Technology and. Applications, First Edition Prentice Hall New Jersey.
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
250
: : :
SUB-ENABLING OUTCOMES 4.1.1 Analyze user requirements for program development. 4.1.2 Apply skills and knowledge of designing and building application programs. 4.1.3 Test and Implement application programs TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration. REFERENCES 1. Bruce Eckel(2010);Thinking in Java 4th Edition O'Reilly Cambridge-USA. 2. David Flanagan(2007) ;Java in a Nutshell ,4th Edition, : O'Reilly Cambridge-USA.
3. David Poplawski,(2009); Objects Have Class, An Introduction to Programming with Java, Fourth Edition McGraw-Hill,Columbus-USA 4. John Lewis and William Loftus(2008);Java Software Solutions, Foundations of Program Design, 2nd Edition. , Addison-Wesley,NY5. Vlada Matena, Sanjeev Krishnan.(2007);Applying Enterprise JavaBeans, Second Edition Addison Wesley NY-USA. NTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
251
SUB-ENABLING OUTCOMES 3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations. 3.4.2 Apply research methods techniques in reporting and presenting the required results in agreed format. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration
REFERENCES 1. 2. 3. 4.
Burke J, Larry C (2010);Educational Research: Quantitative, Qualitative, and Mixed Approaches Burton, D & Steve Bartlett(2009);Key Issues for Education Researchers,4th Edition, SAGE Publications Ltd Darville-USA. Denscombe, M (2007);The good research guide: for small-scale social research projects McGraw-Hill International ,Columbus USA Gary, T (2009); How to do your research project: A guide for students in education and applied social sciences 2nd Edition, SAGE Publications Ltd, London. 5. Ian,B (2008); Questionnaire Design: How to Plan, Structure and Write Survey Material for Effective Market Research,Kogan Page Publishers, London. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
252
: : :
SUB-ENABLING OUTCOMES 4.2.1 Prepare financial statements for business 4.2.2 Identify and describe legal aspects of company formation, shares and bonus. TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES: 1. Carol,Y & Susan,C (2007),Computer Accounting Essentials with Microsoft Office Accounting, (1st ed.),McGraw Hill,NY 2. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB. 3. Raimes J,(2006);Financial Accounting Prentice Hall New Jersey-USA. 4. Robert,H (2009),Accounting Information Systems,(3rd ed.)McGraw Hill,NY 5. Wood, F. and Alan S. (2005); Business Accounting 1 (10th ed.),Prentice Hall,London. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
253
: : :
SUB-ENABLING OUTCOMES 5.11 Design the network system for the organization.
5.1.2 Install, test and implement the system 5.2.1 Establish security mechanism 5.2.2 Troubleshoot the network systems 6.1.4 Evaluate and Maintain network systems. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Alexander, C (2006); Network Management Fundamentals,1st Edition,Cisco Press, Indiana-USA. 2. Gerard, B (2008);Network Management 100 Success Secrets - the Complete Guide to Network Management Software, Tools, Systems, Services and Performance Management,1st Edition, Emereo Pty Limited Brisbane Australia. 3. Joseph, D (2006); Network Troubleshooting Tools: 3rd Edition, O'Reilly Media Inc, Cambridge. 4. Neal, A (2009 );Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems 2nd Edition NJ-USA. 5. Udupa, D(2006); Network Management Systems Essentials,2nd Edition, McGraw-Hill, New York, NY: INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
254
: : :
SUB-ENABLING OUTCOMES 2.3.1 Prepare business plans 2.3.2 Apply marketing skills to market products. 2.3.3 Apply skills for overcoming business challenges. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Andr van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, Ne York-USA. 2. Lawrence, A& Webber (2005),Business and Society 11th Edition, McGraW, Hill NJ. 3. Norman W (2009), Entrepreneurship and Local Economic Development, 11th Edition, Rowman & Littlefield Maryland-USA.. 4. Randall G (2007) Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA. 5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press, Atlanta-USA INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
255
: : :
SUB-ENABLING OUTCOMES 6.1.1 Evaluate performance of mobile systems developed 6.1.2 Assess business performance after mobile computing implementation TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES
1. Andr van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, Ne York-USA. 2. Lawrence,A& Weber,J (2005),Business and Society 11th Edition, Mc GraW, Hill NJ. 3. Norman W (2009), Entrepreneurship and Local Economic Development , 11th Edition, Rowman & Littlefield Maryland-USA.. 4. Randall G (2007)Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA. 5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press,Atlanta-USA INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
256
: : :
SUB-ENABLING OUTCOMES 6.2.1 Assess business performance requiring ICT enhancement 6.2.2 Implement ICT concepts in solving business problems. TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES: 1. Anuj S.(2008);Enterprise Contract Management: A Practical Guide to Successfully Implementing an ECM Solution, 1st Edition, New York-USA. 2. Gerry, K and Steve R (2009); Advanced Project Portfolio Management and the PMO,2 nd Edition NJ-USA. 3. Howard G. (2008);Project Management for Designers and Facilities Managers, third edition, Reilly Media-USA. 4. Schragenheim, E, et al (2009). Supply chain management at warp speed: integrating the system from end to end,2nd Edition Cleverand-USA. 5. Sturdy, A et al (2009);Management Consultancy,1st Edition Oxford University Press-UK INTEGRATED METHOD OF ASSESSMENT:
257
The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.
This qualification has 120 credits which is the minimum prescribed by NACTE.
258
BDIT 8 1 1
= = =
Stands for Bachelor Degree in Information and Communication Technology The first digit stands for the NTA level, in this case Bachelor Degree which is level eight. The second digit stands for semester, i.e. for semester one.
= The last digit stands for the order of the module in the semester. Modules are arranged serially from 1 to the highest number, upon the number of modules in the semester.
259
4.0 AWARDS
The award shall be made to students who satisfy the following conditions. Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.
260
8 The holder of this qualification will apply knowledge and skills in a wide and unpredictable variety of contexts to design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve routine problems, use design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets and assume personal responsibility, responsibility for the work of others, and the responsibility in the allocation of resources, policy formulation, planning, execution and evaluation. 120
261
New
262
7.0 PRINCIPAL LEARNING OUTCOMES AND CREDITS VALUES AND ASSESSMENT CRITERIA
S/NO PRINCIPAL LEARNING OUTCOMES CREDITS VALUES 15 ASSESSMENT CRITERIA
Design and manage a distributed system that fulfills requirements with regard to key system properties
Distributed systems that fulfill requirements with regard to key system properties is clearly designed and managed.
Design and manage web applications by applying current web technologies and programming techniques.
15
Web applications that apply current web technologies and programming techniques are clearly designed and managed
Apply software engineering techniques, design tools and software development processes to develop software
30
3.1 Software development tools, models and processes are properly applied to develop software 3.2 Object oriented techniques are properly applied to develop software 3.3 Object oriented analysis and design using UML are properly applied to develop software 3.4 Object oriented programming with JAVA is properly applied to develop software
Apply management information system concepts to manage information systems including E-business, and
45
4.1 E-business concepts are properly applied to manage business systems 263
4.2 Principles of MIS are properly applied in decision making and business needs clearly identified 4.3 IT projects are properly designed and implemented to overcome business challenges
15
5.1 Various technologies and security measures are properly applied to implement appropriate security measures within an organization.
TOTAL CREDITS
120
264
SEMESTER II 1 2 3 4 BDIT 821 BDIT 822 BDIT 823 BDIT 824 E-Business Management Management of Information Systems IT Security Management Project Development TOTAL CREDITS SEMESTER II GRAND TOTAL CREDITS FOR NTA LEVEL 8 15 15 15 15 60 120 265
1.3
1.3.
1.4
Explain replication, consistency and distributed shared memory systems. Design distributed file systems Explain fault tolerant systems
1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.1 1.3.2 1.3.3 1.4.1 1.4.2 1.4.3 1.5.1 1.5.2 1.5.3 1.5.4 2.1.4 2.1.5
Explain the concept of system autonomy in distributed systems Describe distributed computing and programming concepts Explain design issues with distributed systems Describe models of distributed systems Explain inter-process communication in distributed systems Explain replications and their reasons Apply consistency models Analyze distributed system implementation models Explain the concept of distributed file system Describe file services types in distributed systems Discuss and classify issues in distributed file systems Describe faults, errors, and failures Explain failure models in distributed systems Apply hardware reliability models Apply recovery mechanisms. Apply web technology concepts in web design Apply web development tools in web design
1.5
2.1 Design and manage web applications by applying current web technologies and programming techniques
2.2.1 Apply the concept of website management 2.2.2 Apply access control mechanisms 2.2.3 Manage users of websites 2.2.4 Analyze management of website contents 266
3.1 Apply software engineering techniques, and design tools, and software development process to develop software
3.2.
2.2.5 5.1.5 5.1.6 5.1.7 5.1.8 5.2.1 5.2.2 5.2.3 5.3.1 5.3.2
Manage website updates. Apply software development tools Apply various software development models Apply the steps in the requirements analysis process Design software information systems Apply object oriented techniques in software development Apply agile software development techniques to develop software Apply object oriented concepts using UML do describe software development processes Apply object oriented analysis and design with UML Discuss object oriented programming with JAVA
5.2
5.3
5.4
Apply the Unified Modeling Language concept Apply the concept of object orientation
3.4.1 Describe objects and classes of software systems 3.4.2 3.4.3 3.5.1 3.5.2 Explain inheritance, polymorphism, and message passing Describe UML diagrams in software development Apply the concept Object Oriented Database Management Systems Design Object Oriented Database Management Systems
3.5
Explain object oriented database management systems Assess business information needs
Apply management information system concepts to manage information systems including E-Business and IT projects in a contemporary business setting
4.1
4.2
4.1.1 4.1.2 4.1.3 4.1.4 4.2.1 4.2.2 4.2.3 4.2.4 4.3.1 4.3.2 5.1.1 5.1.2 5.1.3
Analyze current e-business situations Identify Business e-application needs Apply various e-business application in contemporary business settings Discuss the advantages and disadvantages of e-business Analyze current business situations Identify Business information needs Explain different information systems Apply various information systems in business Explain the principles of MIS Apply the MIS principles in making decisions Discuss common security threats Explain different types of security threats Assess the effects of security threats 267
5.2
5.3
Apply various technologies to implement security measures within an organization Inspect and protect information assets
5.2.1 5.2.2
Apply various security technologies Identify security resources for safeguarding of information systems
Explain the role of data in an organization Describe different information assets Inspect information systems for security threats Implement mechanisms to protect information systems from threats
security
268
Explain a distributed system Identify types of distributed systems Discuss the features of distributed system.
Mention examples of distributed systems Discuss types of distributed systems Compare distributed systems with other systems Identify advantages of distributed systems Identify disadvantages of distributed systems Apply the limitations of distributed system in design process Define system autonomy Explain the concept of system autonomy in distributed systems Explain the functions of system autonomy Explain the concept of distributed computing Explain the concept of programming Describe different programming technology
The pros and cons of the distributed systems are thoroughly discussed The concept of system autonomy in distributed systems is clearly explained Distributed computing and programming concepts are clearly explained
Model answers
269
Discuss the known design issues in distributed systems Describe the issues in distributed system Explain the role of design issues in distributed system. Apply the models of distributed systems Describe the distributed systems resources Apply the architectural, interactive and fault models Define communication Explain communication in distributed systems Describe process communications Apply the concept of replication Discuss the reasons for replication Explain the importance of replication concept Define models Mention common consistency models Describe the models Describe consistency protocols Explain distributed system Describe distributed model system Explain the function of distributed model. Explain a file system Explain distribution of resources in
Demonstration Assignments.
Demonstration Assignments.
Inter-process communication in distributed systems clearly explained Replication and their reasons are clearly explained
Model answers
Assignments, presentations
model answers
Demonstration assignment
Demonstrations,
Assignments, 270
distributed file system 1.4.2 Describe file service types in distributed systems
a system Describe files in a distributed system Explain a file service Mention common file service types Describe file service types in a distributed system Explain reasons for using distributed file systems Discuss design issues with distributed file systems Identify types of file system Explain faults , errors and failure in distributed systems Identify faults Describe the identified faults
system clearly explained File service types in distributed systems clearly described
assignments, Discussions Demonstrations, assignments, discussions Demonstrations, assignments, Discussions Demonstrations, assignments, Discussions
1.4.3
Issues in distributed file systems thoroughly discussed Faults, errors and failures are clearly described and classified Failure models in distributed systems clearly explained Hardware reliability models properly applied Recovery mechanisms correctly applied
1.5.1 Describe and classify faults, errors, and failures and classify faults
1.5.2
1.5.3
Apply system failure concept Explain failure models in distributed systems Describe different models applied in distributed system Define hardware Apply hardware reliability concept Mention known hardware reliability models Define recovery Explain what is a recovery mechanism Discuss common recovery mechanism in a distributed system
Demonstration, case studies, test, assignments Demonstrations, Assignments, Test and Examinations Case studies, demonstration, study tours Test and Examinations 271
1.5.4
2.1.1
2.1.2
2.2.2
Explain the concept of computer networking Explain the concept of resource networking Define world wide web Describe internet facilities Apply HTML tags Apply PHP tool Apply Knowledge of SQL basics Apply Java Scripts Discuss web hosting issues Apply website management tools Analyze content of management issues Discuss administrative rights issues Discuss different privileges Discuss security policy issues
Web technology concepts are properly applied in web design Web development tools are properly applied
Model answers
The concept of Assignments, website management is properly applied Access control mechanisms are properly applied Users of the website are properly managed Management of website contents properly analyzed Website updates are properly managed Assignments, presentations
Model answers
Model answers
2.2.3
2.2.4
Explain Password management Create, delete users Provide passwords and access rights to users Modify user details Explain upload and download issues Explain forms and password issues Explain telnet, ftp Describe website update tools Explain and apply HTML Explain and apply PHP Apply Knowledge of Dreamweaver Explain software development lifecycle (SDLC) Explain structured software
Assignments, Test and Examinations and model answers Assignments, exercises and model answers Assignments, exercises and model
2.2.5
3.1.2 Apply various software development models 3.1.4 Design software information systems
development techniques Explain object oriented software development techniques Explain waterfall model Explain V-Model Describe Prototyping Apply requirements elicitation concept Explain users role in the requirements definition Explain the role of documentation in requirements definition Apply design techniques Explain object oriented design Apply structured design techniques
answers
Various software development models are properly applied The steps in the requirements analysis process are properly applied Software information systems are properly designed Object oriented techniques are properly applied Agile software development techniques are properly applied Object oriented techniques using UML are properly applied Object oriented
3.2.3 Apply object oriented concepts using UML to describe software development process
Apply Dynamic System Development Method (DSDM) Apply extreme Programming (XP) method Explain agile techniques in software development Apply cases, Apply actors Apply UML diagrams
oriented
Assignments, Test
Explain the classes apply the use cases and other UML diagrams Declare comments in JAVA Declare classes and objects in JAVA Explain inheritance Explain JDK Apply object methods Apply object properties Explain message passing function Apply object orientation concepts Explain objects Explain classes
analysis and design is properly applied using UML Object oriented programming with JAVA is clearly discussed Objects and classes are clearly described Inheritance, polymorphism, and message passing are clearly explained UML diagrams are clearly described
and Examinations
checklist
3.4.1 Describe objects and classes of software systems 3.4.2 Explain inheritance, polymorphism, message passing in object orientation
Apply object orientation concepts Explain class diagrams Explain collaborative diagrams Understand deployment diagrams Explain use cases Define OODBMS Explain the function of OODBMS Describe features of OODBMS
Model answers
Exercise examination
Modal answers
Explain OODBMS Explain the relationship between objects and classes Apply inheritance concept.
Exercise Test
274
4.1.1
4.1.2
4.1.3
4.1.4
Analyze the operations of current e-business Identify the gap between expected situation and the current situation Apply knowledge of ICT to gather eapplications needs Discuss different business eapplications needs Apply information systems techniques in capturing data Discuss different models for capturing data explain use of e-applications in business Discuss different e-business systems Explain different information technology that support e-business Discuss the pros and cons of eapplication Discuss the strengths of eapplications Compare e-application with traditional applications Analyze the operations of current system Identify the gap between expected situation and the current situation Apply knowledge of system analysis and design to capture data Discuss different business information systems Apply information systems techniques in capturing data
Case studies, demonstration, study tours Test and Examinations Case studies, demonstration, study tours Test and Examinations Case studies, demonstration, study tours Test and Examinations Case studies, demonstration, study tours Test and Examinations checklist Model answers
E-business applications applied contemporary business settings Advantages and disadvantages of ebusiness discussed
Exercises assignment
275
5.1 .1 Discuss common security threats 5.1.2 Explain different types of security threats
Discuss different models for capturing data Define a system Explain information system Differentiate between information and a system explain use of information system in business Discuss different information system that support business Explain different information technology that support business Define MIS Discuss uses of MIS in business organization Identify different types of MIS Explain the function of MIS in an organization. Discuss the role MIS in decision making. Discuss steps in decision making define security threats Identify common threats Classify threats Describe security threats Understand the causes of threats Classify security threats according to their causes
are clearly identified Different information systems are properly explained Various information systems in business are properly applied Exercises assignment assignment exercise
model answers
Principles of MIS in making decisions are properly applied Security threats are thoroughly discussed Different types of security threats are clearly explained
Describe the importance of security Apply appropriate measures to prevent/minimize threats Identify different sources of threats
276
5.3.1 Explain the role of data in an organization 5.3.3 Inspect information systems for security threats
Define security technology Identify different features of security technology Discuss different security technology Describe IT in relation to security Discuss different Information technologies used to safeguard information systems. Discuss different technology used to safeguard information system Define data Apply the concept of data quality Discuss different uses of data Define information assets Identify different information assets within an organization Discuss the functions of information assets Identify different security threats Discuss the behavior of Information systems before and after security threats. Apply different techniques in inspection Apply different security measures Identify strong and weak security measures Discuss the effects of applying weak security measures in information systems
Various security technologies are properly applied Security resources for safeguarding information systems are clearly identified. The role of data in an organization, is clearly explained Information assets are clearly described.
Exercise assignment
Answers Checklist
exercise assignment Demonstrations, Assignments, Test and Examinations model answers checklist checklist modal answers
information systems for security threats are properly inspected Mechanisms to protect information systems are properly implemented
exercise assignment
277
1.1.2
1.1.3
The pros and cons of the distributed systems are thoroughly discussed The concept of system autonomy in distributed systems is clearly explained
1.2.1
1.2.2
Explains the concept of distributed computing, the concept of distributed programming, and describes different programming technologies Mentions the known design issues in distributed systems, describes the issues in distributed systems, and explains the 278
1.2.3
distributed systems
issues in distributed systems Mentions the models of distributed systems, and describes the distributed systems resources Defines communication and explains communication in distributed systems Explains the concept of replication and discusses the reasons for replication Defines models and explains, mentions common consistency models Explains the concept of distributed systems and describes distributed system models Explains a file system and explains distribution of resources in a system Explains a file service, and mentions common file
1.2.4
Mentions the models of distributed systems, describes the distributed system resources and describes the architectural, interactive and fault models Defines communication, explains communication in distributed systems and describes process communications
1.2.5
Defines communication
1.3.1
Explains the concept of replication, discusses the reasons for replication, and explains the importance of replication Defines models, explains mentions common consistency models and describes the models
1.3.2.
Defines models
1.3.3
Explains the concept of distributed systems, describes distributed system models and explains the functions of distributed system models Explains a file system, explains distribution of resources in a system, and describes files in a distributed system Explains a file service, mentions common file service types, and describes file 279
1.4.1
1.4.2
service types 1.4.3 Issues in distributed file systems properly discussed Explains reasons for using distributed file systems Explains reasons for using distributed file systems and explains design issues with distributed file systems Defines faults, errors and failures, explains these in a distributed system environment Applies system failure concepts and explains failure models in distributed systems Defines the term hardware and applies hardware reliability concepts
service types in a distributed system Explains reasons for using distributed file systems, explains design issues with distributed file systems and identifies types of file systems Defines faults, errors and failures, explains these in a distributed system environment and identifies and describes identified faults Applies system failure concepts, explains failure models in distributed systems and describes different models applied in distributed systems Defines the term hardware, applies hardware reliability concepts and mentions common hardware reliability models Defines recovery concept, explains what is a recovery mechanism and discusses common recovery mechanisms in distributed systems Explains the concept of computer networking and resource networking and defines the world wide web (www) and describes internet facilities
1.5.1
1.5.2
1.5.3
1.5.4
2.1.1
Explains the concept of computer networking and resource networking and defines the world wide web (www)
280
2.1.2
Web development tools are clearly applied The concept of website management is properly applied
Applies HTML tags, PHP tools and SQL basics Discusses web hosting issues and applies website management tools Discusses administrative rights issues and discusses different privileges Explains password management and creates, modifies and deletes users Explains upload and download issues and understands forms and password issues Describes website update tools and explains and applies PHP and HTML Explains software development life cycles (SDLC) and structured software development tools Explains waterfall model and V-model
Applies HTML tags, PHP tools and SQL basics and java scripts Discusses web hosting issues, applies website management tools and analyses contents of management Discusses administrative rights issues, different privileges and security policy issues Explains password management , creates, modifies and deletes users and provides access rights to users Explains upload and download issues, understands forms and password issues and explains telnet, ftp
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
Describes website update tools and explains and applies PHP and HTML and applies knowledge of Dreamweaver Explains software development life cycles (SDLC) and structured software development tools with examples
3.1.1
3.1.2
281
3.1.3
Applies requirements Applies requirements elicitation concepts elicitation concepts, and explains users role in the requirements definition Applies design techniques Applies design techniques and explains object design
Applies requirements elicitation concepts, explains users role in the requirements definition and the role of documentation in requirements definition Applies design techniques, explains object design, and applies structured design techniques Explains objects ,classes, and describe UML diagrams Applies dynamic system development method (DSDM) ,eXtreme programming (XP) method and explains agile techniques in software development.
3.1.4
3.2.1
Object oriented techniques using UML are properly applied Agile software development techniques are properly applied
Explains objects
3.2.2
Applies dynamic system development method(DSDM) and extreme programming (XP) method Applies cases, and actors
3.2.3
Object oriented techniques using UML are properly applied Object oriented analysis and design using UML is properly applied Software development process using UML is properly applied
Applies cases
3.3.1
Explains the objects and classes Applies object oriented concepts and explains the UML diagram Declares, comments , classes, objects in JAVA and explains inheritance
Explains the objects ,classes, applies the use cases and other UML diagrams Applies object oriented concepts, explains the UML diagram and applies class methods and properties Declares, comments , classes, objects in JAVA ,explain inheritance and JDK
3.3.2
3.3.3
282
3.4.1
Objects and classes are clearly described Inheritance, polymorphism and message passing are clearly explained UML diagrams are clearly described
Applies object methods and properties Applies object orientation concepts and explain objects Applies object orientation concepts, explains class diagrams and collaborative diagrams. Explains OODBMS and function. Explains OODBMS and the relationship between objects and classes Analyses the operations of current e-business and identifies the gap between expected situation and the current situation Discusses different business e-applications and applies e-business techniques in capturing data Explains the use of eapplications in business
Applies object methods ,properties and explains message passing function Applies object orientation concepts, explain objects and classes
3.4.2
3.4.3
Applies object orientation concepts and explains class diagrams Explains OODBMS
Applies object orientation concepts, explains class diagrams ,collaborative diagrams ,deployment diagrams and explains use cases Explains OODBMS, describes features f unction and
3.5.1
The concept of OODBMS are clearly applied OODBMS are properly designed
3.5.2
Explains OODBMS
Explains OODBMS and the relationship between objects, classes and applies inheritance concept. Analyses the operations of current ebusiness, identifies the gap between expected situation, and the current situation and applies the knowledge of ICT to gather e-applications needs Discusses different business eapplications, applies e-business techniques in capturing data and discusses different models for capturing data
4.1.1
4.1.2
4.1.3
business
systems and explains different information technology that support ebusiness Discusses the pros and cons of eapplications, discusses the strengths of eapplications and compares e-applications with traditional applications Analyses of the operations of current system and identify the gap between expected situation and the current situation and applies knowledge of system analysis and design to capture data. Discuss different business information systems, apply information systems techniques in capturing data and discuss different models for capturing data.
4.1.4
Discusses the pros and cons of e-applications and discusses the strengths of e-applications Analyses of the operations of current system and identify the gap between expected situation and the current situation, Discuss different business information systems and apply information systems techniques in capturing data. Defines a system and explain information system
4.2.1
4.2.2
4.2.3
Defines a system
Defines a system, explain information system and differentiate between information and a system Explains use of information systems in business, discusses different information systems that support business and explains different ITthat support business.
4.2.4
Explains use of information systems in business and discusses different information system that support business Defines MIS and discuss uses of MIS in business
4.3.1
Defines MIS
Defines MIS ,discuss uses of MIS in business organization and identifies 284
explained 4.3.2 Principles of MIS in making decision are properly applied Explains function of MIS in an organization
organization Explains function of MIS in an organization and discusses the role of MIS in decision making Defines security threats and identifies common threats Describes security threats and understands the causes of threats Describes the importance of security and applies appropriate measures to prevent or to minimize threats Describes the importance of security and applies appropriate measures to prevent/minimize threats Describes IT in relation to security and identifies different information technologies used to safeguard information systems
different types of MIS Explains function of MIS in an organization ,discusses the role of MIS in decision making and discusses steps in decision making Defines security threats , identifies common threats, and classifies security threats Describes security threats, understands the causes of threats and, classifies security threats according to their causes. Describes the importance of security, applies appropriate measures to prevent or to minimize threats, and identifies different sources of threats
5.1.1
5.1.2
5.1.3
5.2.1
Describe the importance of security ,applies appropriate measures to prevent /minimize threats and identifies different sources of threats Describes IT in relation to security , identifies different information technology used to safeguard information systems and discusses different technologies used to safeguard information system
5.2.2
285
5.3.1
Define data
Define data, applies the concept of data quality and discusses different uses of data. Defines information assets, identifies different information systems within an organization, and discusses the functions of information assets Identify different threats and discuss the behavior of information systems before and after security threats and applies different techniques in inspection.
5.3.2
Defines information assets and identifies different information systems within an organization. Identifies different security threats and discusses the behavior of information systems before and after security threats Applies different security measures, and identifies strong and weak security measures
5.3.3
5.3.4
Applies different security measures, identifies strong and weak security measures and discusses the effects of applying weak security measures in information system
286
NTA LEVEL 8
NAME:
NUMBER OF CREDITS: 15 SUB-ENABLING OUTCOMES: 1.1.1 1.1.2 1.1.3 1.2.1 1.2.2 1.2.3 1.2.4 1.2.5 1.3.1 1.3.2 1.3.3 1.4.1 1.4.2 1.4.3 1.5.1 1.5.2 1.5.3 1.5.4 1.5.5 Apply the concept of distributed systems Identify the examples of distributed systems Discuss the pros and cons of distributed systems Explain the concept of systems autonomy in distributed systems Describe distributed computing and programming concepts Discuss design issues with distributed systems Describe models of distributed systems Explain inter-process communication in distributed systems Explain replication and the reasons for replication Apply consistency models Analyze distributed systems implementation models Explain the concept of distributed file systems Describe file service types in distributed systems Discuss and classify issues in distributed file systems Describe faults, errors and failures Classify faults Explain failure models in distributed systems Apply hardware reliability models Apply recovery mechanisms 287
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points. METHODS OF INSTRUCTION This module will be conducted through class lectures, demonstrations and practical work in the computer laboratory under close supervision of the lecture. REFERENCES; 1. Blair, G.S., F. Costa, G. Coulson, H. Duran, et al, (2005), The Design of a Resource-Aware Reflective Middleware Architecture, Proceedings of the 2nd International Conference on Meta-Level Architectures and Reflection, St.-Malo, Springer-Verlag, France. 2. Coulouris, G. et al , (2000), Distributed Systems : Concepts and Design, Third Edition, 2000, Books News Inc, USA 3. George Coulouris, Jean Dollimore and Tim Kindberg, (2000), Distributed Systems: Concepts and Design, Addison Wesley, USA 4. Mullender, S (2009), Distributed Systems, 2nd Edition, Longman Group United Kingdom, UK 5. Tanenbaum, A & Martin, V (2007); Distributed Systems- Principles and Paradigms; 2nd Edition, Pearson Prentice Hall, New Delhi, India
INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%
288
NAME:
WEB PROGRAMMING
15
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES 2.1.1 2.1.2 2.1.3 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 Apply web technology concepts in web design Apply web development tools in web design Discuss the standardization process of websites Apply the concept of website management Apply access control mechanisms Manage users of websites Analyze management of website contents Manage website updates
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION This module will be conducted through class lectures, tutorials, demonstrations and practical work in the computer laboratory under close supervision of the lecture. 289
REFERENCES; 1. Jackson, J (2006), Web Technologies: A Computer Science Perspective. Prentice Hall, New Delhi, India. 2. O'Reilly, T and John, B (2004), Opening Welcome: State of the Internet Industry. In San Francisco, California, USA 3. Paul, G andShriram, K (2001), Programming the Web with High-Level Programming Languages. Proceedings of ESOP 2001. India. 4. Scott, Dand Sharp, R (2002); Abstracting application-level Web security. In Proceedingsof 11th ACM International World Wide Web Conference, Hawaii,USA, 5. Sebesta, R (2007), Programming the World Wide Web (4th Edition). Addison Wesley, McGraw-Hill Co, USA.
290
SUB-ENABLING OUTCOMES: 3.1.1 3.1.2 3.1.3 3.1.4 Apply software development tools Apply various software development models Apply the steps in the requirement analysis process Design software information systems
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION This module will be conducted through lectures, tutorials, practical work in the computer laboratory under close supervision of the lecture and fields during vacations.
291
REFERENCES; 1. Carlo, G; Jazayeri, M and Mandrioli, D (2003), Fundamentals of Software Engineering, 2nd International Edition, Pearson Education, PrenticeHall, United Kingdom. 2. Lauesen, R.S ((2005), Software requirements: Styles and Techniques , 4th Edition, Addison-Wesley Pub Co. USA 3. Pressman, R. S (2005). Software Engineering: A Practitioner's Approach , 6th edition, Boston, Mass: McGraw-Hill, USA 4. Roger, P.S (2009), Software Engineering A practitioners Approach, 5th edition, Pearson Publishing Co. LTD, UK. 5. Sommerville, I (2007) , Software Engineering,8th Edition , Pearson Education, Harlow, England
INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%
292
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points. METHODS OF INSTRUCTION This module will be conducted through class lectures, tutorials, and practical work in the computer laboratory under close supervision of the lecture or tutorial assistants.
293
REFERENCES; 1. Ambler, S. W (2004). The Object Primer: Agile Model Driven Development with UML 2. Cambridge University Press, UK 2. Booch, G, et al(2000) OMG Unified Modeling Language Specification, Version 1.3 First Edition Pearson Co. UK 3. Elmasri, R&Navathe, S.B (2000), Fundamentals of Database Systems (3rd Edition), Addison-Wesley, USA 4. Jacobson, I, Grady B &James Rumbaugh (2000). The Unified Software Development Process. Addison-Wesley New Jersey, USA. 5. Penker, M and Hans-Erik E (2000), Business Modeling with UML, John Wiley & Son, USA.
INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%
294
CODE:
BDIT 821
NAME:
E-BUSINESS
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES: 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 Analyze current business e-applications Identify business e-applications needs Explain different information systems Apply various e-business applications in contemporary business settings. Discuss the advantages and disadvantages of e-applications.
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points. METHODS OF INSTRUCTION This module will be conducted through class lectures, case studies, tutorials and practical work in the computer laboratory under close supervision of the lecture.
295
REFERENCES; 1. Eastlake, D. E (2010), 3rd and T. Goldstein. ECML v1.1: Field specifications forE-commerce, London School of Business, UK 2. Kalakota, R & Robinson, M (2000), E-Business 2.0: Roadmap for Success, 2nd Edition, Addison-Wesley professional; UK 3. Lynda M. A (2002), Excerpts from the E-business Handbook, The St. Lucie Press, Fair Association, Inc, USA 4. Minoli, D and Minoli, E (2008) Web Commerce Technology Handbook, TataMcGraw-Hill, New Delhi, India. 5. Rosen, A (2000), The E-commerce Question and Answer Book, American Management Association, USA.
INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%
296
SUB-ENABLING OUTCOMES:
Analyze current business situations Identify business information needs Explain different information systems Explain the principles of MIS in making decisions Apply various information systems in business
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION: This module will be conducted through class lectures, field tours and practical work in the computer laboratory under close supervision of the lecture.
297
REFERENCES: 1. Davis,G.B (2006), The Blackwell Encyclopedia of Management, Management Information Systems (Blackwell Encyclopedia of Management) Volume 7, Wiley-Blackwell, United Kingdom 2. Effy, O (2008), management Information Systems, Sixth Edition, Course Technology, McGraw-Hill ,USA. 3. Jessup, Leonard M.; Joseph S. Valacich (2008), Information Systems Today, 3rd Edition, Pearson Publishing Co, United Kingdom. 4. OBrien, J (2009), Management Information Systems Managing Information Technology in the Internetworked Enterprise,( 7th Edition ), Boston: Irwin McGraw-Hill, USA 5. OBrien, J.A., &George M.M (2008). Management Information Systems, 8th Edition. New York: McGraw-Hill, USA.
INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%
298
CODE:
BDIT 823
NAME:
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES: 5.1.1 5.1.2 5.1.3 5.2.1 5.2.2 5.3.1 5.3.2 5.3.3 5.3.4 Discuss common security threats Explain different types of security threats Assess the effects of security threats Apply various security technologies Identify security resources for safeguarding information systems Explain the role of data in an organization Describe different information assets Inspect information systems for security threats Implement mechanisms to protect information systems from security threats
TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.
299
METHODS OF INSTRUCTION This module will be conducted through class lectures, tutorials, observations and practical work in the computer laboratory under close supervision of the lecture.
REFERENCES; 1. Mansour, O &Ghazawneh, A. (2009) Research in Information Systems: Implications of the constant changing nature of IT capabilities in the social computing era, Molde University College, Molde, Norway. 2. Schechter, S.E (2004). Computer security strength and risk: a quantitative approach, Ph.D. thesis, Harvard University 3. Stallings (2001), Network Security Essentials, Pearson Education Asia, New Delhi 4. Varian. H System reliability and free riding. In Economics of Information Security. J. Camp, S. Lewis, eds. (Kluwer Academic Publishers, 2004), vol. 12 of Advancesin Information Security, UK. 5. Varian, H (2000), Managing online security risks; In the New York Times, New York, USA.
INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%
300