Enabling and Sub Enabling Outcomes

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 86

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY. 1.

0 SUMMARY FRAMEWORK QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION & COMMUNICATION TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine activities: develop database systems, design and analyze systems, prepare computer programs, connect peripherals, ports, maintain the computer , build and troubleshoot communication systems, and apply office automation software, under less supervision. NTA LEVEL COMPETENCE LEVEL DESCRIPTOR 5 The holder of the qualification will apply skills and knowledge in a range of ICT activities some of which are non-routine of developing database systems, designing and analyzing systems, preparing computer programs, connecting peripherals, ports ,maintaining the computer ,building and troubleshooting communication systems, applying office automation software, and assuming some operational responsibilities. CREDITS AT THIS LEVEL CUMULATIVE CREDITS AT 120 0

THIS LEVEL

MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL

DATE THE QUALIFICATION STANDARD LAST REVIEWED

New

ENTRANCE REQUIREMENTS

BTCIT level 4, or Form six with one principal pass either in mathematics or physics.

8.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA

S/N PLO 1

PRINCIPAL LEARNING OUTCOMES Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems.

CREDIT VALUES 1.1. 18 1.2 are 1.3

ASSESSMENT CRITERIA Communication at the place of work is effectively done. Business problems in an organization identified properly

Computing mathematics skills are properly applied on solving business problems.

POL 2

Apply system design and maintenance technology In database development and web design

2.1 System design techniques is Properly applied in the analysis and designing or updating a system 54 2.2 Computer maintenance Technology is properly applied in maintain the computer. 2.3 Analysis and design stages are properly applied ithe the database development process 2.4 Analysis and design stages are properly applied the the website development process

PLO 3

Prepare computer programmes using different high level programming languages

12

3.1 Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly. 3.2 Principles underlying the design of high level programming languages are demonstrated properly . 3.3 Students acquired experience and confidence in the use of a high level programming language to implement algorithms.

PLO 4

Connect network resources ,troubleshoot network and apply office automation software for effective operations and communication in an organization

4.1 computer network resource are properly connected and tested for effective operations 24 4.2 office automation software are installed and applied properly for effective operations 4.3 network and office automation software are properly utilized and maintained for effective operations in an organization

PLO 5

Apply computer professional ethical and security principles in computer use For protecting against computer crimes

12

5.1 Elements of information and security are clearly understood and applied in assessing the need of security 5.2 Risk management strategies and plans are properly applied in securing information 5.3 Cryptograpy methods and physical plan techniques are applied properly in protecting information

PLO 6

Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.

6.1 6.2 6.3

concepts of project life cycle are properly established. Feasibility study is properly done to gather the user requirements Application System is designed, documented and a final report is produced and assessed properly.

120

NACTE STANDARDS AND RELATED ENABLING OUTCOMES : PRINCIPAL OUTCOMES 1. Communicate effectively and ENABLING OUTCOMES 1.1 Apply mathematical Concepts in ICT.

efficiently at the place of work and apply Computing mathematics skills in solving business problems.

1.2

Apply basic communication skills.

2.Apply system design and maintenance technology In database development and web design

2.1

Work With Adobe Dreamweaver CS3 to

create static websites 2.2 Work With Adobe Flash CS3 to in designing websites 2.3 Prepare database application system 2.4 Configure peripherals,devices and maintain PC systems. 2.5 Collect information, analyze and evaluate existing system and develop or update a sysm using system development tools.

3.

Prepare computer programmes using different high level programming languages

3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems. 3.2 demonstrate the principles underlying the design of high level programming languages. 3.3 give students experience and confidence in the use of a high level programming language to implement algorithms.

4.

Connect network resources ,troubleshoot network and apply office automation software for effective operations and communication in an organization

4.1

Apply application software for database and office automation systems to enhance effective operations of an office

4.2

Describe basic networking concepts and configurations, the OSI model, work with network-related hardware, Describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.

4.3

5.

Apply computer professional ethical and security principles in computer use For protecting against computer crimes

5.1.apply Elements of information and security are assessing the need of security in an organization 5.2 identify Risk management strategies and plans in securing information 5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information

6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.

6.1 Maintain computer network systems 6.2 Make operational Services 6.3 Analyze computer system communication

ENABLING AND SUBENABLING OUTCOMES

ENABLING OUTCOMES 1.1 Apply mathematical Concepts in ICT.

SUB-ENABLING OUTCOMES 1.1.1 Apply mathematical concepts in calculation and preparation of database 1.1.2 Solve basic problems relating to ICT using mathematical principles

1.3

Apply basic communication skills.

1.3.1 Apply basic writing skills. 1.3.2 Apply principles and theories involving business correspondences. 1.3.3 Apply employment communication. 1.3.4 Prepare simple research proposal and write effective memos, paper presentations and other business presentations. Start the Dreamweaver Develop a Web Page Work with Text and Graphics Work with Links Work with Tables

2.1

Work With Adobe Dreamweaver CS3 to

create static websites

2.1.1 2.1.2 2.1.3 2.1.4 2.1.5

2.2 Work With Adobe Flash CS3 to in

2.2.1 Start the Adobe Flash

designing websites

2.2.2 Draw Objects in Adobe Flash 2.2.3 Work with Symbols and Interactivity 2.2.4 Create Animations 2.2.5 Create Special Effects

2.3

Prepare database application system

2.3.1 Describe Databases and Transactions 2.3.2 DescribeData Models 2.3.3 Describe the Database Design 2.3.4 Describe the Relational Algebra and Calculus 2.3.5 Describe Constraints 2.3.6 Describe SQL

2.4 Configure peripherals,devices and maintain PC systems.

2.4.1 Describe the Motherboard and its Components 2.4.2 Describe Storage Devices & its Interfacing 2.4.3 Describe Display Devices & Interfacing 2.4.4 Describe the Power Supplies of computers 2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools

2.4.6 Describe PC interfaces

2.5 Collect information, analyze and evaluate existing system and develop or update a sysm using system development tools.

2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase 2.5.2 Determine System Requirements and Design Strategies 2.5.3 Structure systems requirements

3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems.

3.1.1 Introduce Computer Programming concepts used in writing code 3.1.2 Describe the overview and Introduction to Java 3.1.3 Describe the Programming Fundamentals used in Java programs

3.2 demonstrate the principles underlying 3.2.1 Describe Java Control Structures used when writing a the design of high level programming program languages. 3.2.2 Work with the Java Class Library when conding

programs 3.2.3 Describe Object-Oriented Programming 3.3 give students experience and confidence in the use of a high level programming language to implement algorithms. 4.1 Apply application software for database and office automation systems to enhance effective operations of ana office 5.1.1addddddddd

4.1.1 identify windows basics applications 4.1.2 use Ms Word to Explore office applications 4.1.3 use ExelExplore office applications 4.1.4 use power point Explore office applications 4.1.5 xxxxxx addddddd

4.2 Describe networking concepts,configurations, the OSI model, and work with network-related hardware .

4.2.1 Describe Networking Fundamentalals 4.2.2 Describe The OSI Model 4.2.3 Describe the TCP/IP Fundamentals 4.2.4 Describe the TCP/IP Utilities

4.3 describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.

4.3.1 4.3.2 4.3.3 4.3.4

Describe Describe Describe Describe

the Network Operating Systems Network Access and Security Fault Tolerance and Disaster Recovery Network Troubleshooting

5.1..apply Elements of information and security are assessing the need of security in an organization

5.1.1 Describe Elements of Information and Web Security 5.1.2 describe Legal, Ethical, and Professional Issues in Information Security 5.1.3 Describe The Need for Security in information computing 5.2.1 Describe Risk Management 5.2.2 Describe Security Planning strategies 5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control 5.3.1 Describe Cryptography 5.3.2 Describe Physical Security and Implementing Information Security 5.3.3 Describe Security and Personnel, and Information Security Maintenance 6.1.1 Connect, Configure, run networked computers. 6.1.2 Analyze network systems 6.2.1 Maintain computer hardware 6.2.2 Connect computer hardware 6.2.3 Update computer software (e.g. systems) 6.2.4 Manage computer networking operating

5.2 identify Risk management strategies and plans in securing information

5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information

6.1 Maintain computer network systems 6.2 Make operational Services

6.3 Analyze computer system

6.3.1 Communicate effectively with

organizational

communication

Stakeholders (e.g. INTRANET and EXTRANET) 6.3.2. Apply computing mathematics in problems solving computer

ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS

SUB-ENABLING OUTCOMES

RELATED TASK

ASSESSMEN

ASSESSMEN ASSESSM

T CRITERIA

T METHODS

ENT INSTRUM ENTS Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal

1.1.1 Apply mathematical concepts in calculation and preparation of database.

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems). Explain sets and relations. Explain basic number theoretical functions.(e.g the MODE function, GCD, and LCM)

Mathematical concepts in calculation and preparation of database are properly applied

Discuss ion Present ation Tests and Quiz Assign ment

1.1.2 Solve basic problems relating to ICT using mathematical principles

Evaluate basic counting techniques and discrete probability Explain important algorithms of graph theory. Explain Boolean logic and techniques of mathematical proofs.

Basic problems relating to ICT are accurately solved using mathematical principles

Discuss ion Present ation Tests and Quiz Assign ment

k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark

1.2.1 Apply basic writing skills

Apply grammar Construct sentences Write small texts

Basic writing skills are properly applied

Discuss ion Present ation Tests and Quiz Assign ment

1.2.2 Apply principles and theories involving business correspondence

Write Write Write Write

business letters E-mail simple reports sales letters

Principles and theories involving business

Discuss ion Present ation

correspondenc e are appropriately applied

Tests and Quiz Assign ment

erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist

1.2.3 Apply employment communication

Write employment application letters Write CVs Participate in employment interviews Search for jobs

Employment communicatio n is properly applied

Discuss ion Present ation Tests and Quiz Assign ment

1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business presentations.

Prepare simple research proposal Write effective memos Prepare paper and other business presentations

Simple research proposal and effective memos, paper presentation and other business presentations are properly prepared

Discuss ion Present ation Tests and Quiz Assign ment

Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k

2.1.1 Start with Dreamweaver

a. Explore the DW Workspace b. View a Web page and Use the Help feature c. Plan and Define a Web Site d. Add Folders and Pages to your Web Site e. Create and View a Site Map

The dream weaver application program is started properly

Discuss ion Present ation Tests and Quiz Assign ment

2.1.2 Develop a Web Page a. Create Head Content and Set page properties b. Create, Import, and FormatText c. Add Links to Web pages d. Use the History Panel and the Code Inspector e. Modify and Test Web pages Website is developed properly using the Dreamweaver application programs Discuss ion Present ation Tests and Quiz Assign ment 2.1.3 Work with Text and Graphics a. Create Unordered and Ordered Lists b. Create, Apply, and Edit Cascading Style Sheets c. Insert and Align Graphics d. Enhance an Image and Use Alternate Text e. Insert a Background Image and Perform Site Text and graphics are properly applied in a well designed website Discuss ion Present ation Tests and Quiz Assign

Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa

maintenance

ment

rd Chal k Proje ctor Lapt op chec klist

2.1.4 Work with Links

a. Create External and Internal Links b. Create Internal Links to Named Anchors c. Insert Flash Text d. Create and Modify a Navigation Bar e. Manage Web Site Links a. Create a Table b. Resize, Split, and Merge Cells c. Insert and Align Graphics in Table Cells d. Insert Text and Format Cell Content e. Perform Web Site Maintenance a. Understand the Adobe Flash CS3 Workspace b. Open a Document and Play a Movie

Links are properly utilized in designing a website

2.1.5 Work with Tables

Tables are created, resized and utilized in a designed website

2.2.1 Start the Adobe Flash

Adobe Flash is correctly started to design a

Discuss ion Present ation

Whit eboa rd Mark

c. Create and Save a Movie d. Work with the Timeline e. Distribute an Adobe Flash Movie

website

Tests and Quiz Assign ment

2.2.2 Draw Objects in Adobe Flash

a. Use the Flash Drawing Tools b. Select Objects and Apply Colors c. Work with Drawn Objects d. Work with Text and Text Objects e. Work with Layers and Objects

Objects are drawn correctly using Adobe Flash in a website

Discuss ion Present ation Tests and Quiz Assign ment

2.2.3 Work with Symbols and

a. Create Symbols and

Symbols and

Discuss

er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op Chec klist Whit

Interactivity

Instances b. Work with Libraries c. Create Buttons d. Assign Actions to Frames and Buttons

buttons are correctly applied using Adobe flash.

ion Present ation Tests and Quiz Assign ment

2.2.4 Create Animations

a. Create Frame-by-Frame Animations b. Create Motion-Tweened Animations c. Work with Motion Guides d. Create animation effects e. Animate Text

Animations are correctly created using Adobe Flash

Discuss ion Present ation Tests and Quiz Assign ment

eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op

2.2.5 Create Special Effects a. Create Shape Tween Animations b. Create a Mask Effect c. Add Sound d. Add Scenes e. Create an Animated Navigation Bar Special effects are applied correctly in website using Adobe Flash Discuss ion Present ation Tests and Quiz Assign ment 2.3.1 Describe Databases and Transactions a) explain database system b) Explain relational databases and database architecture c) Describe transaction management Database and transaction are correctly describe Discuss ion Present ation Tests and Quiz Assign ment

chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje

2.3.2 Describe Data Models a) Explain data models b) Describe Basic building blocks of data models c) Explain the Degrees of data abstraction. Database models are correctly described Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 2.3.3 Describe the Database Design a) Explain the ER-Model b) Describe the Logical view of data c) Describe the features of good relational database design Database design is correctly described Discuss ion Present ation Tests and Quiz Assign ment

ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd

2.3.4 Describe the Relational Algebra and Calculus a) Explain Selection and projection b) Describe Operators c) Explain Tuple relational calculus Relational Algebra and Calculus are properly described Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 2.3.5 Describe Constraints a) Explain constraints b) Introduce views, c) Apply SQL statements Constraints, views and SQL commands are correctly described and applied during Discuss ion Present ation Discuss ion

Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen

the design of a database

Present ation Tests and Quiz Assign ment

2.3.6 Describe SQL

a) Create Tables b) Apply sql commands c) Apply Aggregate functions SQL tables are created and updated correctly

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment

2.4.1 Describe the Motherboard and its Components

a) IdentifyDifferent types of PC configurations and

Motherboard and its Components

Discuss ion Present

Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd

their comparison b) Outline the Overview and features of ISA, PCIX, PCI-Xpress, AGP, Processor Bus c) Describe memory organization

are clearly described

ation Tests and Quiz Assign ment

2.4.2 Describe Storage Devices & its Interfacing

a) Explain Recording Technique b) Describe Hard disk constructionand working c) Identify features of parallel AT attachment (PATA), Serial AT Attachment (SATA), External SATA

Storage Devices & its Interfacing are properly described

Discuss ion Present ation Tests and Quiz Assign ment

Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

2.4.3

Describe Display Devices & Interfacing

a. Explain the CRT colour monitor including the Block diagram and function of each block and the Characteristics of CRT monitor b. Identify theLCD monitor , functional blockdiagram of LCD monitor, working principal, advantages and disadvantages Types c. Explain the Important characteristics of display screen

Display Devices & Interfacing are properly described

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment

Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

2.4.4 Describe the Power Supplies of computers

a) Explain Block diagram and working of SMPS b) Power supply characteristics c) Describe Power problems and Protection devices Interfaces

Power Supplies of computers are clearly Described

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign

Whit eboa rd Mark er pen Blac kboa rd Chal k Proje

ment 2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools a) Explain Preventive Maintenance b) Describe Fault finding and troubleshooting of computer peripherals c) Describe the Working of logic probe, logic purser, current (CRO). PC Diagnostic, Testing and Maintenance & Tools are clearly described. Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 2.4.6 Describe PC interfaces a. Explain SCSI, SCSI cables PC interfaces and connectors, SCSI are clearly drive configuration; described. b. Describe USB features; RS232 : (Voltages & 9 pin Signal description c. Describe Centronics (interface diagram, Discuss ion Present ation Discuss ion Present ation Tests

ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd

signals and timing waveform) d. Describe Firewire features.

and Quiz Assign ment

2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase

a) Identify roles of systems analyst b) Explain Structured Analysis &Structured Design c) Explain Object-Oriented Analysis and Design

phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase are properly described

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment

2.5.2 Determine System Requirements and Design Strategies

a) Initiate and Plan Information Systems Projects Structures as output parameters. b) Apply CASE tools

System Requirements and Design Strategies are clearly

Discuss ion Present ation Discuss ion

Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen

c) Gather Information using traditional and modern techniques.

determined

Present ation Tests and Quiz Assign ment

2.5.3 Structure systems requirements

a) Apply Process Modeling b) Apply Conceptual Data Modelling c) Apply Object-Oriented Analysis d) Apply Logical & Physical Design in Designing Forms and Reports, Designing UserInterface Details

systems requirements are clearly structured

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment

3.1.1 Introduce Programming

Computer concepts

a. Outline the basic Components of a Computer: Software &

Computer Programming concepts used

Discuss ion Present

Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd

used in writing code

Hardware b. Introduce an Overview of Computer Programming Languages c. Describe Program development life cycle (algorithms) d. Apply Number Systems and Conversions

in writing code are clearly introduced

ation Tests and Quiz Assign ment

3.1.2 Describe

the

overview

and Introduction to Java

a. Explain the Java Background b. Outline Phases of a Java Program c. Write your First Java Program: Hello World! d. Write programs by using a text editor and console e. Deal with errors

overview and Introduction to Java are properly described

Discuss ion Present ation Tests and Quiz Assign ment

Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

3.1.3 Describe Programming Fundamentals Java programs used

the in

a. Describe Java Comments, statements, blocks, identifiers, keywords, literals b. Explain the Primitive data types c. Define Java Variables d. Explain Java Operators(arithmetic, relational) and Operator Precedence e. Explain Java Operators(logical, conditional) and Operator Precedence a. Explain and apply the Decision control structures (if, else, switch) b. Apply Java Repetition control structures (while, do-while, for) c. Apply Java Branching statements (break, continue, return) d. Describe Java Arrays and Command Line arguments

Programming Fundamentals used in Java programs are clearly described

3.2.1 Describe Structures

Java used

Control when

writing a program

Java Control Structures used when writing a program are clearly described

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment

Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec

klist

3.2.2 Work with the Java Class Library when conding programs

a. Introduce the Objectoriented programming b. Apply Encapsulation c. Apply Classes and Objects d. Apply Class variables and methods e. Apply Casting, Converting and Comparing Objects

Java Class Library used when conding programs are properly worked.

Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment

3.2.3 Describe Object-Oriented Programming

a. Define your own classes b. Declare attributes (instance variables, static variables)

ObjectOriented Programming is clearly

Discuss ion Present ation

Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark

c. Declare methods (accessor, mutator) d. Apply The this reference e. Apply the Overloading methods f. Declare constructors g. Apply The this() constructor call

described

Tests and Quiz Assign ment

3.3.1

Discuss ion Present ation Tests and Quiz Assign ment

3.3.2

Discuss

er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit

ion Present ation Tests and Quiz Assign ment

3.3.3

Discuss ion Present ation Tests and Quiz Assign ment

eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op

4.1.1 identify windows basics applications a. Define windows b. Introduce windows and advance window versions c. Operationize windows basic control d. Work with programs e. Manage files and folders f. Customize windows and explain accessories of windows windows basics applications are clearly identified Discuss ion Present ation Tests and Quiz Assign ment 4.1.2 use Ms Word to Explore office applications a. Type, Edit, Proof and Review typed document b. Format Text & Paragraphs c. Apply Automatic Formatting and Styles d. Work with Tables e. Apply Graphics and Frames f. Apply Mail Merge g. Automate Your Work & print Documents Ms Word to Explore office applications are properly used Discuss ion Present ation Tests and Quiz Assign ment

chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje

4.1.3 use Exel to Explore office applications a. Work & Edit In Workbooks b. Create Formats & Links c. Format a Worksheet & create graphic objects d. Create Charts (Graphs), format and analyze data e. Organize Data in a List (Data Management) f. Share & Import Data g. Apply Printing Exel to Explore office applications are properly used Discuss ion Present ation Tests and Quiz Assign ment 4.1.4 use power point to a. Get started with PowerPoint b. Create a presentation c. Create & edit slides d. Preview a slide show e. Add picture & graph f. Add sound & video g. Add auto shape h. Animate objects Power point to Explore office applications are properly used Discuss ion Present ation Tests and Quiz Assign ment

Explore applications

office

ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd

4.1.5 xxxxxx addddddd Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 4.2.1 Describe Networking Fundamentalals a. Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring. Networking Fundamentala ls Are clearly described Discuss ion Present ation Tests and

Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen

b. Specify the main features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5 (Token Ring), 802.11 (wireless), and Fiber Distributed Data Interface (FDDI) networking technologies, including: Speed, Access method (CSMA/CA [Carrier Sense Multiple Access/Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access /Collision Detection]), Topology, and Media. c. Specify the characteristics (for example, speed, length, topology, and cable type) of the following cable standards: 10BaseT, 10Base-FL, 100BaseTX, 100Base-FX, 1000Base- TX, 1000Base-CX, 1000BaseSX, 1000Base-LX, 10GBase-SR, 10GBaseLR, and 10GBase-ER d. Recognize the following media connectors and

Quiz Assign ment

Blac kboa rd Chal k Proje ctor Lapt op chec klist

describe their uses: RJ11 (Registered Jack), RJ-45, F-Type, ST (Straight tip), SC (subscriber connector), IEEE 1394 (FireWire), LC (local connector), MTRJ (Mechanical Transfer Registered Jack), USB (Universal Serial Bus) e. Recognize the following media types and describe their uses: Category 3, 5, 5e, and 6, UTP (Unshielded twistedpair), STP (shielded twisted-pair), Coaxial cable, SMF (singlemode fiber) optic cable, and MMF (multimode fiber) optic cable. f. Identify the purposes, features, and functions of the following network components: Hubs, Switches, Bridges, Routers, Gateways, CSU/DSU (Channel Service Unit/Data Service Unit), NICs (network interface cards, ISDN (integrated Services Digital Network)

adapters, WAPs (wireless access points), Modems, Transceivers (media converters), and Firewalls. 4.2.2 Describe The OSI Model a. Identify a MAC (Media Access Control) address and its parts. b. Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions. c. Identify the OSI (Open Systems Interconnect) layers at which the following network components operate: Hubs, Switches, Bridges, Routers, NICs (network interface cards), and WAPs (wireless access points). d. Differentiate between the following network protocols in terms of routing, addressing schemes, interoperability, and naming conventions; IPX/SPX (Internet-work OSI Model is clearly described Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

Packet Exchange/Sequenced Packet Exchange), NetBEUI (Network Basic Input/Output System Extended User Interface), AppleTalk/AppleTalk over IP (Internet Protocol), and TCP/IP (Transmission Control Protocol/Internet Protocol). Broad overview and understand the functions of the OSI Model and its seven layers: (Physical, Data Link, Network, Transport, Session, Presentation, and Application). 4.2.3 Describe the TCP/IP Fundamentals a. Describe the TCP/IP family of protocols, IP Addressing, address classification, and name resolutions services. Discuss of how to setup and configure TCP/IP on Windows 2000 and a brief discussion of VLAN technologies b. Identify the purpose of TCP/IP Fundamentals are clearly described Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark er pen Blac kboa rd Chal

subnetting, the differences between private and public network addressing schemes, the differences between IP addressing methods: Static, Dynamic, and Selfassigned (APIPA). c. Define the purpose, function and use of the following protocol used in the TCP/IP suite: TCP, UDP, FTP, SFTP, TFTP, SMTP, HTTP, HTTPS, POP3/IMAP4, Telnet, SSH, ICMP. ARP/RARP, NTP, NNTP, SCP, LDAP, IGMP, LPR. d. Define the function of TCP/UDO ports. e. Identify the well-known ports associated with the following commonly used services and protocols: 20 FTP, 21 FTP, 22 SSH, 23 Telnet, 25 SMTP, 53 DNS, 69 TFTP, 80 HTTP, 110 POP3, 119 NNTP, 123 NTP, 143 IMAP4, 443 HTTPS.

k Proje ctor Lapt op chec klist

4.2.4 Describe the TCP/IP Utilities

4.3.1 Describe the Network Operating Systems

a. Learning how to use the Address Resolution Protocol (ARP), the netstat Utility, the nbstat Utility, the File Transfer Protocol (FTP), the ping Utility, winipcfg, ipconfig, ifconfig, the tracert Utility, the Telnet Utility, and the nslookup Utility. b. Given a troubleshooting scenario, select the appropriate network utility from the following: tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig c. Given output from a network diagnostic utility, identify the utility and interpret the output. a. Identify the basic capabilities (for example, features, client support, interoperability authentication, Directory Structure, file and print services, application support and security) of the following server

TCP/IP Utilities are properly described.

Discuss ion Present ation Tests and Quiz Assign ment

Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

Network Operating Systems are properly described

Discuss ion Present ation Tests and Quiz Assign

Whit eboa rd Mark er pen Blac kboa

b. c. d. e.

operating systems to access network resources: Unix/Linux/Mac OS X Server Novell Netware Microsoft Windows AppleShare IP (Internet Protocol Network Access and Security are clearly described

ment Discuss ion Present ation Tests and Quiz Assign ment

4.3.2 Describe Network Access and Security

a. Identify the following security protocols and describe their purpose and function: IPSec (Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x b. Identify authentication protocols (for example, CHAP [Challenge Handshake Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication Protocol], PAP [Password Authentication Protocol], RADIUS [Remote

rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

c.

d.

e.

f.

Authentication Dial-In User Service], Kerberos, and EAP [Extensible Authentication Protocol]) Identify the basic capabilities needed for client workstations to connect to and use network resources (for example, media, network protocols, and peer and server services). Identify the purpose, benefits, and characteristics of using a firewall. Identify the purpose, benefits, and characteristics of using a proxy service. Giving a connectivity scenario, determine the impact on network functionality of a particular security implementation (for example, port blocking/filtering, authentication, and encryption Fault Discuss Whit

4.3.3 Describe Fault Tolerance

a. Identify the purpose,

and Disaster Recovery

4.3.4 Describe Network Troubleshooting

benefits, and characteristics of using antivirus software for virus protection. b. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery needs: for example, disk system fault tolerance methods, Power, Link redundancy, Storage, and Services. c. Identify the purpose and characteristics of disaster recovery for backup consideration: Backup/restore,Offsite storage,Hot and cold spares;Hot, warm, and cold sites a. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem. b. Given a troubleshooting scenario involving a client accessing remote network services,

Tolerance and Disaster Recovery are properly described.

ion Present ation Tests and Quiz Assign ment

eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist

Network Troubleshooti ng is properly described

Discuss ion Present ation Tests and Quiz Assign ment

Whit eboa rd Mark er pen Blac kboa rd Chal k

identify the cause of the problem (for example, file services, print services, authentication failure, protocol configuration, physical connectivity, and SOHO [small office, home office] router). c. Given a troubleshooting scenario between a client and the following server environments, identify the cause of a stated problem: UNIX/xMac OS X Server NetWare, Windows, AppleShare IP. d. Given a scenario, determine the impact of modifying, adding, or moving network services (for example, DHCP [Dynamic Host Configuration Protocol], DNS {Domain Name Service] and WINS (Windows Internet Naming Service]) for network resources and users. e. Given a troubleshooting scenario involving a

Proje ctor Lapt op chec klist

network with a particular physical topology (for example, bus, star, mesh, or ring) and including a network diagram, identify the network area affected and the cause of the stated failure f. Given a network troubleshooting scenario involving an infrastructure (for example, wired or wireless) problem, identify the cause of a stated problem (for example, bad media, interference, network hardware, or environment). g. Given a network problem scenario, select an appropriate course of action based on a logical troubleshooting strategy. This strategy can include the following steps: 1.Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish what has changed, 4. Select

the most probable cause, 5.Implement an action plan and solution, including potential effects, 6.Test the Result, 7.Identify the results and effects of the solution, 8.Document the solution and process 5.1.1 Describe Elements of Information and Web Security a. Explain Security and its history b. Explain NSTISSC Security Model c. Explain Information system components d. Explain Balancing security with access Elements of Information and Web Security is clearly described Discuss ion Present ation Tests and Quiz Assign ment 5.1.2 Describe Legal, Ethical, and Professional Issues in Information Security a) Explain Security implementation b) Explain System and Security Development Life Cycles Legal, Ethical, and Professional Issues in Information Discuss ion Present ation Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe

c) Explain Law and Ethics d) Explain Ethics ,privacy and Codes of Ethics

Security are clearly described

Tests and Quiz Assign ment

5.1.3 Describe The Need for Security in information computing

a. Explain the need of The Need for security in Security in Business information b. Explain Threats computing is c. Explain Attacks clearly d. Outline Top ten described security vulnerabilities

Discuss ion Present ation Tests and Quiz Assign ment

5.2.1 Describe Risk Management

a. Explain Risk management

Risk Management

Discuss ion

n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa

b. c.

d. e. f. g.

overview Explain Risk identification Explain Quantitative and qualitative risk control Explain Risk management Explain Risk control practice Explain Risk assessment Explain Risk control strategies and selection

is clearly described

Present ation Tests and Quiz Assign ment

rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist

5.2.2

Describe Security Planning strategies

a. Explain Security policy, standards and practices b. Explain Information security blueprint c. Explain Security education, training and awareness d. Explain Continuity strategies

Security Planning strategies are clearly described.

Discuss ion Present ation Tests and Quiz Assign ment

Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt

5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control a. Describe Physical design b. Describe Firewalls c. Describe Protecting remote connections d. Describe Intrusion detection and prevention systems e. Describe Honey pots, honey nets and padded cell systems f. Describe Scanning and analysis tools, access control devices Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control are clearly described Discuss ion Present ation Tests and Quiz Assign ment 5.3.1 Describe Cryptography a. Describe Cryptography Foundations Cryptography is clearly b. Describe Cipher methods described c. Describe Cryptographic algorithms d. Describe Cryptographic tools e. Describe Protocols for secure communications Discuss ion Present ation Tests and Quiz Assign ment

op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k

f. Describe Attacks on cryptosystems

5.3.2 Describe Physical Security and Implementing Information Security

a. Explain Physical access controls b. Explain Fire security and safety c. Explain Supporting utility failure and structural collapse d. Explain Data interception e. Explain Mobile and portable systems f. Explain Special considerations for physical security threats g. Explain Project management h. Explain Technical implementation topics i. Explain

Physical Security and Implementing Information Security Is properly described

Discuss ion Present ation Tests and Quiz Assign ment

Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist

Nontechnical implementation topics j. Explain Certification and accreditation 5.3.3 Describe Security and Personnel, and Information Security Maintenance a. Explain Positioning and staffing b. Explain Information security professional credentials c. Explain Employment policies and practices d. Explain Security for nonemployees e. Explain Internal control strategies f. Explain Privacy and security of personnel data g. Explain Security management models h. Explain Maintenance model Security and Personnel, and Information Security Maintenance is properly described Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist

i. Explain Digital forensics 6.1.1 Connect,Configure,Run networked computers Collect components Organize equipment and tools Configure and run computer network Networked computers are correctly connected and configured Discuss ion Present ation Tests and Quiz Assign ment 6.1.2 Analyse network systems Manage computer networks Monitor computer users Provide IP address to users Network systems are correctly analysed Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k

6.2.1 Maintain Computer hardwares Keep computer hardware Store computer hardware Organize computer hardware Computer hardwares are properly maintained Discuss ion Present ation Tests and Quiz Assign ment 6.2.2 Connect computer hardwares Connect all hardwares to obtain computer systems Test the system and install operating systems Computer hardwares are correctly connected Discuss ion Present ation Tests and Quiz Assign

Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa

ment 6.2.3 Update computer software Install/Reinstall the operating system. Install application software. Run other application software Computer software is properly updated Discuss ion Present ation Tests and Quiz Assign ment 6.2.4 Manage computer networking Control the server Manage other networked computers Provide access rights to nodes/workstations Computer networking is properly managed Discuss ion Present ation Tests

rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe

Describe the usage of networked computers

and Quiz Assign ment

6.3.1 Communicate effectively with organizational stakeholder

Organize the servers Provide closed loop with all nodes Organize different computers in other organizarions

Organisational stakeholders are effectivelly communicate d with

Discuss ion Present ation Tests and Quiz Assign ment

6.3.2 Apply Computing mathematics in solving

Collect different equipments and tools

Computing mathematics

Discuss ion

n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa

computer problems

Apply mathematical rules in solving different computer problems

is accurately applied in solving computer problems

Present ation Tests and Quiz Assign ment

rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist

11.0 BENCHMARKING OF ASSESSMENT CRITERIA

S/NO 1.1. 1.2

ASSESSMENT CRITERIA Communication at the place of work is Business problems in an organization are identified properly Computing mathematics skills are properly applied on solving business problems. System design techniques is Properly applied in the analysis and designing or updating a system Computer maintenance Technology is properly applied in maintain the computer. Analysis and design stages are properly applied ithe the database

SATISFACTORY

GOOD

EXCELLENT

1.3

2.1

2.2

2.3

development process 2.4 Analysis and design stages are properly applied the the website development process Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly. Principles underlying the design of high level programming languages are demonstrated properly . Students acquired experience and confidence in the use of a high level programming language to implement algorithms. computer network resource are properly connected and tested for effective operations office automation

3.1

3.2

3.3

4.1

4.2

software are installed and applied properly for effective operations 4.3 network and office automation software are properly utilized and maintained for effective operations in an organization Elements of information and security are clearly understood and applied in assessing the need of security Risk management strategies and plans are properly applied in securing information Cryptograpy methods and physical plan techniques are applied properly in protecting information oncepts of project life cycle are properly established. Feasibility study is properly done to gather

5.1

5.2

5.3

6.1

6.2

the user requirements 6.3 Application System is designed, documented and a final report is produced and assessed properly.

12.0 MODULES DESCRIPTION CODE: TCIT 511

NAME;

COMMUNICATION SKILLS 12

NUMEBER OF CREDITS:

SUB-ENABLING OUTCOMES: 1.2.1 Apply basic writing skills 1.2.2 Apply principles and theories involving business correspondence 1.2.3 Apply employment communication 1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business Presentations.

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Edition Royal Autralia college of general Practitioners. 2 3 4 5 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland. Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh. Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd. Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%

CODE: NAME;

TCIT 512 COMPUTING MATHEMATICS 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 1.11 Apply mathematical concepts calculation and preparation of databases 1.12 Solve basic problems relating to ICT using mathematical principles TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit. REFERENCES; 1 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA.

Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer verlag Berin Heideberg Germany, Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1 st Edition , AA Dordrecht the Netherlands Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd Edition springer Verlag Berin Heideberg Germany, Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% CODE: TCIT 513

NAME;

DATABASE SYSTEM DEVELOPMENT 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 2.3.1 Describe Databases and Transactions 2.3.2 DescribeData Models 2.3.3 Describe the Database Design 2.3.4 Describe the Relational Algebra and Calculus 2.3.5 Describe Constraints 2.3.6 Describe SQL

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2 nd Ed,Cengage Learning,Canada Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada. Rob P. et al (2009) Database systems design, implementation and management, 5th Edition Cengage, Learning EMEA. Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% TCIT 514

CODE:

NAME;

COMPUTER MAINTENANCE

NUMBER OF CREDITS:

12

SUB-ENABLING OUTCOMES:

2.4.1 Describe the Motherboard and its Components 2.4.2 Describe Storage Devices & its Interfacing 2.4.3 Describe Display Devices & Interfacing 2.4.4 Describe the Power Supplies of computers 2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools 2.4.6 Describe PC interfaces

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES 1 2 3 4 5 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc. Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison Wesley, NJ. Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.ButterworthHeinmann.UK

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%

CODE:

TCIT 515

NAME;

PROGRAMMING

NUMBER OF CREDITS:

12

SUB-ENABLING OUTCOMES:

3.1.4 Introduce Computer Programming concepts used in writing code 3.1.5 Describe the overview and Introduction to Java 3.1.6 Describe the Programming Fundamentals used in Java programs 3.2.4 Describe Java Control Structures used when writing a program 3.2.5 Work with the Java Class Library when conding programs 3.2.6 Describe Object-Oriented Programming

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES; 1 2 3 4 5 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4 th Edition, D. C. Heath and company 125 spring street, Lexington M. A. Oualline S. (2003) Practical C++ Programming 2nd Edition OReailly media Inc, 1005 Gravenstein Highway North , Sebastopol Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German. Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O Reilly media Inc, 1005 Gravenstein Highway North Sebastopol.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%

CODE: NAME;

TCIT 521 ADVANCED OFFICE AUTOMATION 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 4.1.6 identify windows basics applications 4.1.7 use Ms Word to Explore office applications 4.1.8 use ExelExplore office applications 4.1.9 use power point Explore office applications 4.1.10 xxxxxx addddddd

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke Publishing 980 East Circle Drive USA Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins

5 .

Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher Education

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%

CODE: NAME;

TCIT 522 WEB DESIGN 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 2.1.6 Start the Dreamweaver 2.1.7 Develop a Web Page 2.1.8 Work with Text and Graphics 2.1.9 Work with Links 2.1.10 Work with Tables

2.2.6 Start the Adobe Flash 2.2.7 Draw Objects in Adobe Flash 2.2.8 Work with Symbols and Interactivity 2.2.9 Create Animations 2.2.10 Create Special Effects

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.

REFERENCES; 1 2 3 4 5 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol. Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York Institution of Technology at Utica/Rome. Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition ORelly media inc. 1005,Gravenstain Highway North, Sebastopoll. Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology. Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment 40% End of semester examination 60%

CODE:

TCIT 523

NAME;

NETWORKING

NUMBER OF CREDITS:

12

SUB-ENABLING OUTCOMES: 4.2.1 Describe Networking Fundamentalals 4.2.2 Describe The OSI Model 4.2.3 Describe the TCP/IP Fundamentals 4.2.4 Describe the TCP/IP Utilities

4.3.1 4.3.2 4.3.3 4.3.4

Describe Describe Describe Describe

the Network Operating Systems Network Access and Security Fault Tolerance and Disaster Recovery Network Troubleshooting

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.

REFERENCES; 1 2 3 4 5 Barken L(2009) How secure is your wireless network your Wi-FLAN,2 nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice Hall of India, New Delh. Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada Mathew J. (2005) Computer Networks, Internet protocols in actionaddition Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment 40% End of semester examination 60%

CODE: NAME;

TCIT 524 PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 5.1.1 Describe Elements of Information and Web Security 5.1.2 describe Legal, Ethical, and Professional Issues in Information Security 5.1.3 Describe The Need for Security in information computing 5.2.1 Describe Risk Management 5.2.2 Describe Security Planning strategies 5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control 5.3.1 Describe Risk Management 5.3.2 Describe Security Planning strategies 5.3.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk. Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo . Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1 st ed,Jones&Bartlett Publishers,Massachussets.USA Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ Prentice- Hall New Delh India.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% TCIT 525

CODE:

NAME;

SYSTEM ANALYSIS AND DESIGN 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase

2.5.2 Determine System Requirements and Design Strategies 2.5.3 Structure systems requirements

TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit. REFERENCES; 1 2 3 4 5 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi. Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%

You might also like