Enabling and Sub Enabling Outcomes
Enabling and Sub Enabling Outcomes
Enabling and Sub Enabling Outcomes
0 SUMMARY FRAMEWORK QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION & COMMUNICATION TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine activities: develop database systems, design and analyze systems, prepare computer programs, connect peripherals, ports, maintain the computer , build and troubleshoot communication systems, and apply office automation software, under less supervision. NTA LEVEL COMPETENCE LEVEL DESCRIPTOR 5 The holder of the qualification will apply skills and knowledge in a range of ICT activities some of which are non-routine of developing database systems, designing and analyzing systems, preparing computer programs, connecting peripherals, ports ,maintaining the computer ,building and troubleshooting communication systems, applying office automation software, and assuming some operational responsibilities. CREDITS AT THIS LEVEL CUMULATIVE CREDITS AT 120 0
THIS LEVEL
New
ENTRANCE REQUIREMENTS
BTCIT level 4, or Form six with one principal pass either in mathematics or physics.
S/N PLO 1
PRINCIPAL LEARNING OUTCOMES Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems.
ASSESSMENT CRITERIA Communication at the place of work is effectively done. Business problems in an organization identified properly
POL 2
Apply system design and maintenance technology In database development and web design
2.1 System design techniques is Properly applied in the analysis and designing or updating a system 54 2.2 Computer maintenance Technology is properly applied in maintain the computer. 2.3 Analysis and design stages are properly applied ithe the database development process 2.4 Analysis and design stages are properly applied the the website development process
PLO 3
12
3.1 Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly. 3.2 Principles underlying the design of high level programming languages are demonstrated properly . 3.3 Students acquired experience and confidence in the use of a high level programming language to implement algorithms.
PLO 4
Connect network resources ,troubleshoot network and apply office automation software for effective operations and communication in an organization
4.1 computer network resource are properly connected and tested for effective operations 24 4.2 office automation software are installed and applied properly for effective operations 4.3 network and office automation software are properly utilized and maintained for effective operations in an organization
PLO 5
Apply computer professional ethical and security principles in computer use For protecting against computer crimes
12
5.1 Elements of information and security are clearly understood and applied in assessing the need of security 5.2 Risk management strategies and plans are properly applied in securing information 5.3 Cryptograpy methods and physical plan techniques are applied properly in protecting information
PLO 6
Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.
concepts of project life cycle are properly established. Feasibility study is properly done to gather the user requirements Application System is designed, documented and a final report is produced and assessed properly.
120
NACTE STANDARDS AND RELATED ENABLING OUTCOMES : PRINCIPAL OUTCOMES 1. Communicate effectively and ENABLING OUTCOMES 1.1 Apply mathematical Concepts in ICT.
efficiently at the place of work and apply Computing mathematics skills in solving business problems.
1.2
2.Apply system design and maintenance technology In database development and web design
2.1
create static websites 2.2 Work With Adobe Flash CS3 to in designing websites 2.3 Prepare database application system 2.4 Configure peripherals,devices and maintain PC systems. 2.5 Collect information, analyze and evaluate existing system and develop or update a sysm using system development tools.
3.
3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems. 3.2 demonstrate the principles underlying the design of high level programming languages. 3.3 give students experience and confidence in the use of a high level programming language to implement algorithms.
4.
Connect network resources ,troubleshoot network and apply office automation software for effective operations and communication in an organization
4.1
Apply application software for database and office automation systems to enhance effective operations of an office
4.2
Describe basic networking concepts and configurations, the OSI model, work with network-related hardware, Describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.
4.3
5.
Apply computer professional ethical and security principles in computer use For protecting against computer crimes
5.1.apply Elements of information and security are assessing the need of security in an organization 5.2 identify Risk management strategies and plans in securing information 5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information
6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.
6.1 Maintain computer network systems 6.2 Make operational Services 6.3 Analyze computer system communication
SUB-ENABLING OUTCOMES 1.1.1 Apply mathematical concepts in calculation and preparation of database 1.1.2 Solve basic problems relating to ICT using mathematical principles
1.3
1.3.1 Apply basic writing skills. 1.3.2 Apply principles and theories involving business correspondences. 1.3.3 Apply employment communication. 1.3.4 Prepare simple research proposal and write effective memos, paper presentations and other business presentations. Start the Dreamweaver Develop a Web Page Work with Text and Graphics Work with Links Work with Tables
2.1
designing websites
2.2.2 Draw Objects in Adobe Flash 2.2.3 Work with Symbols and Interactivity 2.2.4 Create Animations 2.2.5 Create Special Effects
2.3
2.3.1 Describe Databases and Transactions 2.3.2 DescribeData Models 2.3.3 Describe the Database Design 2.3.4 Describe the Relational Algebra and Calculus 2.3.5 Describe Constraints 2.3.6 Describe SQL
2.4.1 Describe the Motherboard and its Components 2.4.2 Describe Storage Devices & its Interfacing 2.4.3 Describe Display Devices & Interfacing 2.4.4 Describe the Power Supplies of computers 2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools
2.5 Collect information, analyze and evaluate existing system and develop or update a sysm using system development tools.
2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase 2.5.2 Determine System Requirements and Design Strategies 2.5.3 Structure systems requirements
3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems.
3.1.1 Introduce Computer Programming concepts used in writing code 3.1.2 Describe the overview and Introduction to Java 3.1.3 Describe the Programming Fundamentals used in Java programs
3.2 demonstrate the principles underlying 3.2.1 Describe Java Control Structures used when writing a the design of high level programming program languages. 3.2.2 Work with the Java Class Library when conding
programs 3.2.3 Describe Object-Oriented Programming 3.3 give students experience and confidence in the use of a high level programming language to implement algorithms. 4.1 Apply application software for database and office automation systems to enhance effective operations of ana office 5.1.1addddddddd
4.1.1 identify windows basics applications 4.1.2 use Ms Word to Explore office applications 4.1.3 use ExelExplore office applications 4.1.4 use power point Explore office applications 4.1.5 xxxxxx addddddd
4.2 Describe networking concepts,configurations, the OSI model, and work with network-related hardware .
4.2.1 Describe Networking Fundamentalals 4.2.2 Describe The OSI Model 4.2.3 Describe the TCP/IP Fundamentals 4.2.4 Describe the TCP/IP Utilities
4.3 describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.
the Network Operating Systems Network Access and Security Fault Tolerance and Disaster Recovery Network Troubleshooting
5.1..apply Elements of information and security are assessing the need of security in an organization
5.1.1 Describe Elements of Information and Web Security 5.1.2 describe Legal, Ethical, and Professional Issues in Information Security 5.1.3 Describe The Need for Security in information computing 5.2.1 Describe Risk Management 5.2.2 Describe Security Planning strategies 5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control 5.3.1 Describe Cryptography 5.3.2 Describe Physical Security and Implementing Information Security 5.3.3 Describe Security and Personnel, and Information Security Maintenance 6.1.1 Connect, Configure, run networked computers. 6.1.2 Analyze network systems 6.2.1 Maintain computer hardware 6.2.2 Connect computer hardware 6.2.3 Update computer software (e.g. systems) 6.2.4 Manage computer networking operating
5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information
organizational
communication
Stakeholders (e.g. INTRANET and EXTRANET) 6.3.2. Apply computing mathematics in problems solving computer
SUB-ENABLING OUTCOMES
RELATED TASK
ASSESSMEN
ASSESSMEN ASSESSM
T CRITERIA
T METHODS
ENT INSTRUM ENTS Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal
Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems). Explain sets and relations. Explain basic number theoretical functions.(e.g the MODE function, GCD, and LCM)
Evaluate basic counting techniques and discrete probability Explain important algorithms of graph theory. Explain Boolean logic and techniques of mathematical proofs.
Basic problems relating to ICT are accurately solved using mathematical principles
k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark
erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist
Write employment application letters Write CVs Participate in employment interviews Search for jobs
1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business presentations.
Prepare simple research proposal Write effective memos Prepare paper and other business presentations
Simple research proposal and effective memos, paper presentation and other business presentations are properly prepared
Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k
a. Explore the DW Workspace b. View a Web page and Use the Help feature c. Plan and Define a Web Site d. Add Folders and Pages to your Web Site e. Create and View a Site Map
2.1.2 Develop a Web Page a. Create Head Content and Set page properties b. Create, Import, and FormatText c. Add Links to Web pages d. Use the History Panel and the Code Inspector e. Modify and Test Web pages Website is developed properly using the Dreamweaver application programs Discuss ion Present ation Tests and Quiz Assign ment 2.1.3 Work with Text and Graphics a. Create Unordered and Ordered Lists b. Create, Apply, and Edit Cascading Style Sheets c. Insert and Align Graphics d. Enhance an Image and Use Alternate Text e. Insert a Background Image and Perform Site Text and graphics are properly applied in a well designed website Discuss ion Present ation Tests and Quiz Assign
Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa
maintenance
ment
a. Create External and Internal Links b. Create Internal Links to Named Anchors c. Insert Flash Text d. Create and Modify a Navigation Bar e. Manage Web Site Links a. Create a Table b. Resize, Split, and Merge Cells c. Insert and Align Graphics in Table Cells d. Insert Text and Format Cell Content e. Perform Web Site Maintenance a. Understand the Adobe Flash CS3 Workspace b. Open a Document and Play a Movie
c. Create and Save a Movie d. Work with the Timeline e. Distribute an Adobe Flash Movie
website
a. Use the Flash Drawing Tools b. Select Objects and Apply Colors c. Work with Drawn Objects d. Work with Text and Text Objects e. Work with Layers and Objects
Symbols and
Discuss
er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op Chec klist Whit
Interactivity
Instances b. Work with Libraries c. Create Buttons d. Assign Actions to Frames and Buttons
a. Create Frame-by-Frame Animations b. Create Motion-Tweened Animations c. Work with Motion Guides d. Create animation effects e. Animate Text
eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op
2.2.5 Create Special Effects a. Create Shape Tween Animations b. Create a Mask Effect c. Add Sound d. Add Scenes e. Create an Animated Navigation Bar Special effects are applied correctly in website using Adobe Flash Discuss ion Present ation Tests and Quiz Assign ment 2.3.1 Describe Databases and Transactions a) explain database system b) Explain relational databases and database architecture c) Describe transaction management Database and transaction are correctly describe Discuss ion Present ation Tests and Quiz Assign ment
chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje
2.3.2 Describe Data Models a) Explain data models b) Describe Basic building blocks of data models c) Explain the Degrees of data abstraction. Database models are correctly described Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 2.3.3 Describe the Database Design a) Explain the ER-Model b) Describe the Logical view of data c) Describe the features of good relational database design Database design is correctly described Discuss ion Present ation Tests and Quiz Assign ment
ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd
2.3.4 Describe the Relational Algebra and Calculus a) Explain Selection and projection b) Describe Operators c) Explain Tuple relational calculus Relational Algebra and Calculus are properly described Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 2.3.5 Describe Constraints a) Explain constraints b) Introduce views, c) Apply SQL statements Constraints, views and SQL commands are correctly described and applied during Discuss ion Present ation Discuss ion
Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen
a) Create Tables b) Apply sql commands c) Apply Aggregate functions SQL tables are created and updated correctly
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment
Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd
their comparison b) Outline the Overview and features of ISA, PCIX, PCI-Xpress, AGP, Processor Bus c) Describe memory organization
a) Explain Recording Technique b) Describe Hard disk constructionand working c) Identify features of parallel AT attachment (PATA), Serial AT Attachment (SATA), External SATA
Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
2.4.3
a. Explain the CRT colour monitor including the Block diagram and function of each block and the Characteristics of CRT monitor b. Identify theLCD monitor , functional blockdiagram of LCD monitor, working principal, advantages and disadvantages Types c. Explain the Important characteristics of display screen
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment
Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
a) Explain Block diagram and working of SMPS b) Power supply characteristics c) Describe Power problems and Protection devices Interfaces
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign
ment 2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools a) Explain Preventive Maintenance b) Describe Fault finding and troubleshooting of computer peripherals c) Describe the Working of logic probe, logic purser, current (CRO). PC Diagnostic, Testing and Maintenance & Tools are clearly described. Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 2.4.6 Describe PC interfaces a. Explain SCSI, SCSI cables PC interfaces and connectors, SCSI are clearly drive configuration; described. b. Describe USB features; RS232 : (Voltages & 9 pin Signal description c. Describe Centronics (interface diagram, Discuss ion Present ation Discuss ion Present ation Tests
ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd
2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase
a) Identify roles of systems analyst b) Explain Structured Analysis &Structured Design c) Explain Object-Oriented Analysis and Design
phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase are properly described
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment
a) Initiate and Plan Information Systems Projects Structures as output parameters. b) Apply CASE tools
Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen
determined
a) Apply Process Modeling b) Apply Conceptual Data Modelling c) Apply Object-Oriented Analysis d) Apply Logical & Physical Design in Designing Forms and Reports, Designing UserInterface Details
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment
Computer concepts
Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd
Hardware b. Introduce an Overview of Computer Programming Languages c. Describe Program development life cycle (algorithms) d. Apply Number Systems and Conversions
3.1.2 Describe
the
overview
a. Explain the Java Background b. Outline Phases of a Java Program c. Write your First Java Program: Hello World! d. Write programs by using a text editor and console e. Deal with errors
Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
the in
a. Describe Java Comments, statements, blocks, identifiers, keywords, literals b. Explain the Primitive data types c. Define Java Variables d. Explain Java Operators(arithmetic, relational) and Operator Precedence e. Explain Java Operators(logical, conditional) and Operator Precedence a. Explain and apply the Decision control structures (if, else, switch) b. Apply Java Repetition control structures (while, do-while, for) c. Apply Java Branching statements (break, continue, return) d. Describe Java Arrays and Command Line arguments
Java used
Control when
writing a program
Java Control Structures used when writing a program are clearly described
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment
Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec
klist
3.2.2 Work with the Java Class Library when conding programs
a. Introduce the Objectoriented programming b. Apply Encapsulation c. Apply Classes and Objects d. Apply Class variables and methods e. Apply Casting, Converting and Comparing Objects
Java Class Library used when conding programs are properly worked.
Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment
a. Define your own classes b. Declare attributes (instance variables, static variables)
Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark
c. Declare methods (accessor, mutator) d. Apply The this reference e. Apply the Overloading methods f. Declare constructors g. Apply The this() constructor call
described
3.3.1
3.3.2
Discuss
er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit
3.3.3
eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op
4.1.1 identify windows basics applications a. Define windows b. Introduce windows and advance window versions c. Operationize windows basic control d. Work with programs e. Manage files and folders f. Customize windows and explain accessories of windows windows basics applications are clearly identified Discuss ion Present ation Tests and Quiz Assign ment 4.1.2 use Ms Word to Explore office applications a. Type, Edit, Proof and Review typed document b. Format Text & Paragraphs c. Apply Automatic Formatting and Styles d. Work with Tables e. Apply Graphics and Frames f. Apply Mail Merge g. Automate Your Work & print Documents Ms Word to Explore office applications are properly used Discuss ion Present ation Tests and Quiz Assign ment
chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje
4.1.3 use Exel to Explore office applications a. Work & Edit In Workbooks b. Create Formats & Links c. Format a Worksheet & create graphic objects d. Create Charts (Graphs), format and analyze data e. Organize Data in a List (Data Management) f. Share & Import Data g. Apply Printing Exel to Explore office applications are properly used Discuss ion Present ation Tests and Quiz Assign ment 4.1.4 use power point to a. Get started with PowerPoint b. Create a presentation c. Create & edit slides d. Preview a slide show e. Add picture & graph f. Add sound & video g. Add auto shape h. Animate objects Power point to Explore office applications are properly used Discuss ion Present ation Tests and Quiz Assign ment
Explore applications
office
ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd
4.1.5 xxxxxx addddddd Discuss ion Present ation Discuss ion Present ation Tests and Quiz Assign ment 4.2.1 Describe Networking Fundamentalals a. Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring. Networking Fundamentala ls Are clearly described Discuss ion Present ation Tests and
Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen
b. Specify the main features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5 (Token Ring), 802.11 (wireless), and Fiber Distributed Data Interface (FDDI) networking technologies, including: Speed, Access method (CSMA/CA [Carrier Sense Multiple Access/Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access /Collision Detection]), Topology, and Media. c. Specify the characteristics (for example, speed, length, topology, and cable type) of the following cable standards: 10BaseT, 10Base-FL, 100BaseTX, 100Base-FX, 1000Base- TX, 1000Base-CX, 1000BaseSX, 1000Base-LX, 10GBase-SR, 10GBaseLR, and 10GBase-ER d. Recognize the following media connectors and
describe their uses: RJ11 (Registered Jack), RJ-45, F-Type, ST (Straight tip), SC (subscriber connector), IEEE 1394 (FireWire), LC (local connector), MTRJ (Mechanical Transfer Registered Jack), USB (Universal Serial Bus) e. Recognize the following media types and describe their uses: Category 3, 5, 5e, and 6, UTP (Unshielded twistedpair), STP (shielded twisted-pair), Coaxial cable, SMF (singlemode fiber) optic cable, and MMF (multimode fiber) optic cable. f. Identify the purposes, features, and functions of the following network components: Hubs, Switches, Bridges, Routers, Gateways, CSU/DSU (Channel Service Unit/Data Service Unit), NICs (network interface cards, ISDN (integrated Services Digital Network)
adapters, WAPs (wireless access points), Modems, Transceivers (media converters), and Firewalls. 4.2.2 Describe The OSI Model a. Identify a MAC (Media Access Control) address and its parts. b. Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions. c. Identify the OSI (Open Systems Interconnect) layers at which the following network components operate: Hubs, Switches, Bridges, Routers, NICs (network interface cards), and WAPs (wireless access points). d. Differentiate between the following network protocols in terms of routing, addressing schemes, interoperability, and naming conventions; IPX/SPX (Internet-work OSI Model is clearly described Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
Packet Exchange/Sequenced Packet Exchange), NetBEUI (Network Basic Input/Output System Extended User Interface), AppleTalk/AppleTalk over IP (Internet Protocol), and TCP/IP (Transmission Control Protocol/Internet Protocol). Broad overview and understand the functions of the OSI Model and its seven layers: (Physical, Data Link, Network, Transport, Session, Presentation, and Application). 4.2.3 Describe the TCP/IP Fundamentals a. Describe the TCP/IP family of protocols, IP Addressing, address classification, and name resolutions services. Discuss of how to setup and configure TCP/IP on Windows 2000 and a brief discussion of VLAN technologies b. Identify the purpose of TCP/IP Fundamentals are clearly described Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark er pen Blac kboa rd Chal
subnetting, the differences between private and public network addressing schemes, the differences between IP addressing methods: Static, Dynamic, and Selfassigned (APIPA). c. Define the purpose, function and use of the following protocol used in the TCP/IP suite: TCP, UDP, FTP, SFTP, TFTP, SMTP, HTTP, HTTPS, POP3/IMAP4, Telnet, SSH, ICMP. ARP/RARP, NTP, NNTP, SCP, LDAP, IGMP, LPR. d. Define the function of TCP/UDO ports. e. Identify the well-known ports associated with the following commonly used services and protocols: 20 FTP, 21 FTP, 22 SSH, 23 Telnet, 25 SMTP, 53 DNS, 69 TFTP, 80 HTTP, 110 POP3, 119 NNTP, 123 NTP, 143 IMAP4, 443 HTTPS.
a. Learning how to use the Address Resolution Protocol (ARP), the netstat Utility, the nbstat Utility, the File Transfer Protocol (FTP), the ping Utility, winipcfg, ipconfig, ifconfig, the tracert Utility, the Telnet Utility, and the nslookup Utility. b. Given a troubleshooting scenario, select the appropriate network utility from the following: tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig c. Given output from a network diagnostic utility, identify the utility and interpret the output. a. Identify the basic capabilities (for example, features, client support, interoperability authentication, Directory Structure, file and print services, application support and security) of the following server
Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
b. c. d. e.
operating systems to access network resources: Unix/Linux/Mac OS X Server Novell Netware Microsoft Windows AppleShare IP (Internet Protocol Network Access and Security are clearly described
ment Discuss ion Present ation Tests and Quiz Assign ment
a. Identify the following security protocols and describe their purpose and function: IPSec (Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x b. Identify authentication protocols (for example, CHAP [Challenge Handshake Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication Protocol], PAP [Password Authentication Protocol], RADIUS [Remote
rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
c.
d.
e.
f.
Authentication Dial-In User Service], Kerberos, and EAP [Extensible Authentication Protocol]) Identify the basic capabilities needed for client workstations to connect to and use network resources (for example, media, network protocols, and peer and server services). Identify the purpose, benefits, and characteristics of using a firewall. Identify the purpose, benefits, and characteristics of using a proxy service. Giving a connectivity scenario, determine the impact on network functionality of a particular security implementation (for example, port blocking/filtering, authentication, and encryption Fault Discuss Whit
benefits, and characteristics of using antivirus software for virus protection. b. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery needs: for example, disk system fault tolerance methods, Power, Link redundancy, Storage, and Services. c. Identify the purpose and characteristics of disaster recovery for backup consideration: Backup/restore,Offsite storage,Hot and cold spares;Hot, warm, and cold sites a. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem. b. Given a troubleshooting scenario involving a client accessing remote network services,
eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt op chec klist
identify the cause of the problem (for example, file services, print services, authentication failure, protocol configuration, physical connectivity, and SOHO [small office, home office] router). c. Given a troubleshooting scenario between a client and the following server environments, identify the cause of a stated problem: UNIX/xMac OS X Server NetWare, Windows, AppleShare IP. d. Given a scenario, determine the impact of modifying, adding, or moving network services (for example, DHCP [Dynamic Host Configuration Protocol], DNS {Domain Name Service] and WINS (Windows Internet Naming Service]) for network resources and users. e. Given a troubleshooting scenario involving a
network with a particular physical topology (for example, bus, star, mesh, or ring) and including a network diagram, identify the network area affected and the cause of the stated failure f. Given a network troubleshooting scenario involving an infrastructure (for example, wired or wireless) problem, identify the cause of a stated problem (for example, bad media, interference, network hardware, or environment). g. Given a network problem scenario, select an appropriate course of action based on a logical troubleshooting strategy. This strategy can include the following steps: 1.Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish what has changed, 4. Select
the most probable cause, 5.Implement an action plan and solution, including potential effects, 6.Test the Result, 7.Identify the results and effects of the solution, 8.Document the solution and process 5.1.1 Describe Elements of Information and Web Security a. Explain Security and its history b. Explain NSTISSC Security Model c. Explain Information system components d. Explain Balancing security with access Elements of Information and Web Security is clearly described Discuss ion Present ation Tests and Quiz Assign ment 5.1.2 Describe Legal, Ethical, and Professional Issues in Information Security a) Explain Security implementation b) Explain System and Security Development Life Cycles Legal, Ethical, and Professional Issues in Information Discuss ion Present ation Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe
c) Explain Law and Ethics d) Explain Ethics ,privacy and Codes of Ethics
a. Explain the need of The Need for security in Security in Business information b. Explain Threats computing is c. Explain Attacks clearly d. Outline Top ten described security vulnerabilities
Risk Management
Discuss ion
n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa
b. c.
d. e. f. g.
overview Explain Risk identification Explain Quantitative and qualitative risk control Explain Risk management Explain Risk control practice Explain Risk assessment Explain Risk control strategies and selection
is clearly described
rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist
5.2.2
a. Explain Security policy, standards and practices b. Explain Information security blueprint c. Explain Security education, training and awareness d. Explain Continuity strategies
Whit eboa rd Mark er pen Blac kboa rd Chal k Proje ctor Lapt
5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control a. Describe Physical design b. Describe Firewalls c. Describe Protecting remote connections d. Describe Intrusion detection and prevention systems e. Describe Honey pots, honey nets and padded cell systems f. Describe Scanning and analysis tools, access control devices Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control are clearly described Discuss ion Present ation Tests and Quiz Assign ment 5.3.1 Describe Cryptography a. Describe Cryptography Foundations Cryptography is clearly b. Describe Cipher methods described c. Describe Cryptographic algorithms d. Describe Cryptographic tools e. Describe Protocols for secure communications Discuss ion Present ation Tests and Quiz Assign ment
op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k
a. Explain Physical access controls b. Explain Fire security and safety c. Explain Supporting utility failure and structural collapse d. Explain Data interception e. Explain Mobile and portable systems f. Explain Special considerations for physical security threats g. Explain Project management h. Explain Technical implementation topics i. Explain
Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist
Nontechnical implementation topics j. Explain Certification and accreditation 5.3.3 Describe Security and Personnel, and Information Security Maintenance a. Explain Positioning and staffing b. Explain Information security professional credentials c. Explain Employment policies and practices d. Explain Security for nonemployees e. Explain Internal control strategies f. Explain Privacy and security of personnel data g. Explain Security management models h. Explain Maintenance model Security and Personnel, and Information Security Maintenance is properly described Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist
i. Explain Digital forensics 6.1.1 Connect,Configure,Run networked computers Collect components Organize equipment and tools Configure and run computer network Networked computers are correctly connected and configured Discuss ion Present ation Tests and Quiz Assign ment 6.1.2 Analyse network systems Manage computer networks Monitor computer users Provide IP address to users Network systems are correctly analysed Discuss ion Present ation Tests and Quiz Assign ment Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k
6.2.1 Maintain Computer hardwares Keep computer hardware Store computer hardware Organize computer hardware Computer hardwares are properly maintained Discuss ion Present ation Tests and Quiz Assign ment 6.2.2 Connect computer hardwares Connect all hardwares to obtain computer systems Test the system and install operating systems Computer hardwares are correctly connected Discuss ion Present ation Tests and Quiz Assign
Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa
ment 6.2.3 Update computer software Install/Reinstall the operating system. Install application software. Run other application software Computer software is properly updated Discuss ion Present ation Tests and Quiz Assign ment 6.2.4 Manage computer networking Control the server Manage other networked computers Provide access rights to nodes/workstations Computer networking is properly managed Discuss ion Present ation Tests
rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe
Organize the servers Provide closed loop with all nodes Organize different computers in other organizarions
Computing mathematics
Discuss ion
n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist Whit eboa
computer problems
rd Mark erpe n Blac kboa rd Chal k Proje ctor Lapt op chec klist
ASSESSMENT CRITERIA Communication at the place of work is Business problems in an organization are identified properly Computing mathematics skills are properly applied on solving business problems. System design techniques is Properly applied in the analysis and designing or updating a system Computer maintenance Technology is properly applied in maintain the computer. Analysis and design stages are properly applied ithe the database
SATISFACTORY
GOOD
EXCELLENT
1.3
2.1
2.2
2.3
development process 2.4 Analysis and design stages are properly applied the the website development process Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly. Principles underlying the design of high level programming languages are demonstrated properly . Students acquired experience and confidence in the use of a high level programming language to implement algorithms. computer network resource are properly connected and tested for effective operations office automation
3.1
3.2
3.3
4.1
4.2
software are installed and applied properly for effective operations 4.3 network and office automation software are properly utilized and maintained for effective operations in an organization Elements of information and security are clearly understood and applied in assessing the need of security Risk management strategies and plans are properly applied in securing information Cryptograpy methods and physical plan techniques are applied properly in protecting information oncepts of project life cycle are properly established. Feasibility study is properly done to gather
5.1
5.2
5.3
6.1
6.2
the user requirements 6.3 Application System is designed, documented and a final report is produced and assessed properly.
NAME;
COMMUNICATION SKILLS 12
NUMEBER OF CREDITS:
SUB-ENABLING OUTCOMES: 1.2.1 Apply basic writing skills 1.2.2 Apply principles and theories involving business correspondence 1.2.3 Apply employment communication 1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business Presentations.
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Edition Royal Autralia college of general Practitioners. 2 3 4 5 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland. Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh. Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd. Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%
CODE: NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 1.11 Apply mathematical concepts calculation and preparation of databases 1.12 Solve basic problems relating to ICT using mathematical principles TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit. REFERENCES; 1 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA.
Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer verlag Berin Heideberg Germany, Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1 st Edition , AA Dordrecht the Netherlands Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd Edition springer Verlag Berin Heideberg Germany, Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% CODE: TCIT 513
NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 2.3.1 Describe Databases and Transactions 2.3.2 DescribeData Models 2.3.3 Describe the Database Design 2.3.4 Describe the Relational Algebra and Calculus 2.3.5 Describe Constraints 2.3.6 Describe SQL
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2 nd Ed,Cengage Learning,Canada Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada. Rob P. et al (2009) Database systems design, implementation and management, 5th Edition Cengage, Learning EMEA. Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% TCIT 514
CODE:
NAME;
COMPUTER MAINTENANCE
NUMBER OF CREDITS:
12
SUB-ENABLING OUTCOMES:
2.4.1 Describe the Motherboard and its Components 2.4.2 Describe Storage Devices & its Interfacing 2.4.3 Describe Display Devices & Interfacing 2.4.4 Describe the Power Supplies of computers 2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools 2.4.6 Describe PC interfaces
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES 1 2 3 4 5 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc. Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison Wesley, NJ. Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.ButterworthHeinmann.UK
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%
CODE:
TCIT 515
NAME;
PROGRAMMING
NUMBER OF CREDITS:
12
SUB-ENABLING OUTCOMES:
3.1.4 Introduce Computer Programming concepts used in writing code 3.1.5 Describe the overview and Introduction to Java 3.1.6 Describe the Programming Fundamentals used in Java programs 3.2.4 Describe Java Control Structures used when writing a program 3.2.5 Work with the Java Class Library when conding programs 3.2.6 Describe Object-Oriented Programming
TEACHING AIDS
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES; 1 2 3 4 5 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4 th Edition, D. C. Heath and company 125 spring street, Lexington M. A. Oualline S. (2003) Practical C++ Programming 2nd Edition OReailly media Inc, 1005 Gravenstein Highway North , Sebastopol Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German. Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O Reilly media Inc, 1005 Gravenstein Highway North Sebastopol.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%
CODE: NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 4.1.6 identify windows basics applications 4.1.7 use Ms Word to Explore office applications 4.1.8 use ExelExplore office applications 4.1.9 use power point Explore office applications 4.1.10 xxxxxx addddddd
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke Publishing 980 East Circle Drive USA Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins
5 .
Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher Education
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%
CODE: NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 2.1.6 Start the Dreamweaver 2.1.7 Develop a Web Page 2.1.8 Work with Text and Graphics 2.1.9 Work with Links 2.1.10 Work with Tables
2.2.6 Start the Adobe Flash 2.2.7 Draw Objects in Adobe Flash 2.2.8 Work with Symbols and Interactivity 2.2.9 Create Animations 2.2.10 Create Special Effects
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.
REFERENCES; 1 2 3 4 5 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol. Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York Institution of Technology at Utica/Rome. Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition ORelly media inc. 1005,Gravenstain Highway North, Sebastopoll. Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology. Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey
CODE:
TCIT 523
NAME;
NETWORKING
NUMBER OF CREDITS:
12
SUB-ENABLING OUTCOMES: 4.2.1 Describe Networking Fundamentalals 4.2.2 Describe The OSI Model 4.2.3 Describe the TCP/IP Fundamentals 4.2.4 Describe the TCP/IP Utilities
the Network Operating Systems Network Access and Security Fault Tolerance and Disaster Recovery Network Troubleshooting
TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.
REFERENCES; 1 2 3 4 5 Barken L(2009) How secure is your wireless network your Wi-FLAN,2 nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice Hall of India, New Delh. Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada Mathew J. (2005) Computer Networks, Internet protocols in actionaddition Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)
CODE: NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 5.1.1 Describe Elements of Information and Web Security 5.1.2 describe Legal, Ethical, and Professional Issues in Information Security 5.1.3 Describe The Need for Security in information computing 5.2.1 Describe Risk Management 5.2.2 Describe Security Planning strategies 5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control 5.3.1 Describe Risk Management 5.3.2 Describe Security Planning strategies 5.3.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control
METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk. Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo . Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1 st ed,Jones&Bartlett Publishers,Massachussets.USA Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ Prentice- Hall New Delh India.
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% TCIT 525
CODE:
NAME;
NUMBER OF CREDITS:
SUB-ENABLING OUTCOMES: 2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase
2.5.2 Determine System Requirements and Design Strategies 2.5.3 Structure systems requirements
TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit. REFERENCES; 1 2 3 4 5 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi. Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin
INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%