Enabling and Sub Enabling Outcomes

105
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY. 1.0 SUMMARY FRAMEWORK QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION & COMMUNICATION TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine activities: develop database systems, design and analyze systems, prepare computer programs, connect peripherals, ports, maintain the computer , build and troubleshoot communication systems, and apply office automation software, under less supervision. NTA LEVEL 5 COMPETENCE LEVEL DESCRIPTOR The holder of the qualification will apply skills and knowledge in a range of ICT activities some of which are non-routine of developing database systems, designing and analyzing systems, preparing computer programs,

description

explain sets, relations and basic number theoretical functions. (e.g the MODE function, GCD, and LCM).1 Introduction 7.2 POST 7.3 Preventive Maintenance 7.4 Preventive Maintenance of Peripherals of PC7.5 Fault Finding and Troubleshooting of above Peripherals 7.6 ESD (Electrostatic Discharge) 7.7 Diagnostic Software

Transcript of Enabling and Sub Enabling Outcomes

Page 1: Enabling and Sub Enabling Outcomes

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION

TECHNOLOGY.

1.0 SUMMARY FRAMEWORK

QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION &

COMMUNICATION TECHNOLOGY

PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some

non-routine activities: develop database systems, design and

analyze systems, prepare computer programs, connect

peripherals, ports, maintain the computer , build and troubleshoot

communication systems, and apply office automation software,

under less supervision.

NTA LEVEL 5

COMPETENCE LEVEL

DESCRIPTOR

The holder of the qualification will apply skills and knowledge in a

range of ICT activities some of which are non-routine of developing

database systems, designing and analyzing systems, preparing

computer programs, connecting peripherals, ports ,maintaining the

computer ,building and troubleshooting communication systems,

applying office automation software, and assuming some

operational responsibilities.

CREDITS AT THIS LEVEL 120

Page 2: Enabling and Sub Enabling Outcomes

CUMULATIVE CREDITS AT

THIS LEVEL

0

MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL

0

DATE THE QUALIFICATION

STANDARD LAST REVIEWED

New

ENTRANCE

REQUIREMENTS

BTCIT level 4, or Form six with one principal pass either in

mathematics or physics.

Page 3: Enabling and Sub Enabling Outcomes

8.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA

S/N PRINCIPAL LEARNING OUTCOMES

CREDIT VALUES

ASSESSMENT CRITERIA

PLO 1 Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems.

18

1.1. Communication at the place of work is effectively done.

1.2 Business problems in an organization are identified properly

1.3 Computing mathematics skills areproperly applied on solving

business problems.

POL 2 Apply system design and maintenance technology In database development and web design 54

2.1 System design techniques is Properly applied in the analysis and designing or updating a system

2.2 Computer maintenance Technology is properly applied in maintain the computer.

2.3 Analysis and design stages are properly applied ithe the database development process

2.4 Analysis and design stages are properly applied the the website

Page 4: Enabling and Sub Enabling Outcomes

development process

PLO 3 Prepare computer programmes using different high level programming languages

12 3.1 Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly.

3.2 Principles underlying the design of high level programming languages are demonstrated properly .

3.3 Students acquired experience and confidence in the use of a high level programming language to implement algorithms.

PLO 4 Connect network resources ,troubleshoot network and apply office automation software for effective operations and communication in an

24

4.1 computer network resource are properly connected and tested for effective operations

4.2 office automation software are installed and applied properly for effective operations

Page 5: Enabling and Sub Enabling Outcomes

organization 4.3 network and office automation software are properly utilized and maintained for effective operations in an organization

PLO 5 Apply computer professional ethical and security principles in computer use For protecting against computer crimes

12

5.1 Elements of information and security are clearly understood and applied in assessing the need of security

5.2 Risk management strategies and plans are properly applied in securing information

5.3 Cryptograpy methods and physical plan techniques are applied properly in protecting information

PLO 6 Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.

-

6.1 concepts of project life cycle are properly established.

6.2 Feasibility study is properly done to gather the user requirements

6.3 Application System is designed,

Page 6: Enabling and Sub Enabling Outcomes

documented and a final report is produced and assessed properly.

120

NACTE STANDARDS AND RELATED ENABLING OUTCOMES :

PRINCIPAL OUTCOMES ENABLING OUTCOMES

1. Communicate effectively and

efficiently at the place of work and apply

Computing mathematics skills in solving

business problems.

1.1 Apply

mathematical

Concepts in ICT.

1.2 Apply basic communication skills.

Page 7: Enabling and Sub Enabling Outcomes

2.Apply system design and maintenance technology In database development and web design

2.1 Work With Adobe Dreamweaver CS3 to

create static websites

2.2 Work With Adobe Flash CS3 to in

designing websites

2.3 Prepare database application system

2.4 Configure peripherals,devices and

maintain PC systems.

2.5 Collect information, analyze and

evaluate existing system and develop or

update a sysm using system development

tools.

Page 8: Enabling and Sub Enabling Outcomes

3. Prepare computer programmes

using different high level

programming languages

3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems.

3.2 demonstrate the principles underlying the design of high level programming languages.

3.3 give students experience and confidence in the use of a high level programming language to implement algorithms.

4. Connect network

resources ,troubleshoot network

and apply office automation

software for effective operations

and communication in an

organization

4.1 Apply application software for

database and office automation

systems to enhance effective

operations of an office

4.2 Describe basic networking concepts and configurations, the OSI model,

Page 9: Enabling and Sub Enabling Outcomes

work with network-related hardware,

4.3 Describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.

5. Apply computer professional ethical and security principles in computer use For protecting against computer crimes

5.1.apply Elements of information and security are assessing the need of security in an organization

5.2 identify Risk management strategies and plans in securing information

5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information

6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.

6.1 Maintain computer

network systems

6.2 Make operational

Page 10: Enabling and Sub Enabling Outcomes

Services

6.3 Analyze computer system

communication

ENABLING AND SUBENABLING OUTCOMES

ENABLING OUTCOMES SUB-ENABLING OUTCOMES

1.1 Apply

mathematical

Concepts in ICT.

1.1.1 Apply mathematical concepts in calculation and

preparation of database

1.1.2 Solve basic problems relating to ICTusing mathematical principles

1.3 Apply basic communication skills. 1.3.1 Apply basic writing skills.

1.3.2 Apply principles and theories involving business

correspondences.

1.3.3 Apply employment communication.

1.3.4 Prepare simple research proposal and write effective

Page 11: Enabling and Sub Enabling Outcomes

memos, paper presentations and other business

presentations.

2.1 Work With Adobe Dreamweaver CS3 to

create static websites

2.1.1 Start the Dreamweaver2.1.2 Develop a Web Page2.1.3 Work with Text and Graphics2.1.4 Work with Links2.1.5 Work with Tables

2.2 Work With Adobe Flash CS3 to in designing websites

2.2.1 Start the Adobe Flash

2.2.2 Draw Objects in Adobe Flash

2.2.3 Work with Symbols and Interactivity

2.2.4 Create Animations

2.2.5 Create Special Effects

2.3 Prepare database application system 2.3.1 Describe Databases and Transactions

2.3.2 DescribeData Models

2.3.3 Describe the Database Design

2.3.4 Describe the Relational Algebra and Calculus

Page 12: Enabling and Sub Enabling Outcomes

2.3.5 Describe Constraints

2.3.6 Describe SQL

2.4 Configure peripherals,devices and

maintain PC systems.

2.4.1 Describe the Motherboard and its Components

2.4.2 Describe Storage Devices & its Interfacing

2.4.3 Describe Display Devices & Interfacing

2.4.4 Describe the Power Supplies of computers

2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools

2.4.6 Describe PC interfaces

2.5 Collect information, analyze and

evaluate existing system and develop or

update a sysm using system development

tools.

2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase

2.5.2 Determine System Requirements and Design Strategies

2.5.3 Structure systems requirements

3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems.

3.1.1 Introduce Computer Programming concepts used in

writing code

3.1.2 Describe the overview and Introduction to Java

3.1.3 Describe the Programming Fundamentals used in

Page 13: Enabling and Sub Enabling Outcomes

Java programs

3.2 demonstrate the principles underlying the design of high level programming languages.

3.2.1 Describe Java Control Structures used when writing a

program

3.2.2 Work with the Java Class Library when conding

programs

3.2.3 Describe Object-Oriented Programming

3.3 give students experience and confidence in the use of a high level programming language to implement algorithms.

5.1.1addddddddd

4.1 Apply application software for

database and office automation

systems to enhance effective

operations of ana office

4.1.1 identify windows basics applications

4.1.2 use Ms Word to Explore office applications

4.1.3 use ExelExplore office applications

4.1.4 use power point Explore office applications

Page 14: Enabling and Sub Enabling Outcomes

4.1.5 xxxxxx addddddd

4.2 Describe networking concepts,configurations, the OSI model, and work with network-related hardware .

4.2.1 Describe Networking Fundamentalals4.2.2 Describe The OSI Model4.2.3 Describe the TCP/IP Fundamentals

4.2.4 Describe the TCP/IP Utilities

4.3 describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.

4.3.1 Describe the Network Operating Systems4.3.2 Describe Network Access and Security4.3.3 Describe Fault Tolerance and Disaster Recovery4.3.4 Describe Network Troubleshooting

5.1..apply Elements of information and security are assessing the need of security in an organization

5.1.1 Describe Elements of Information and Web Security5.1.2 describe Legal, Ethical, and Professional Issues in Information Security5.1.3 Describe The Need for Security in information computing

5.2 identify Risk management strategies and plans in securing information

5.2.1 Describe Risk Management5.2.2 Describe Security Planning strategies5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control

5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information

5.3.1 Describe Cryptography5.3.2 Describe Physical Security and Implementing Information Security

Page 15: Enabling and Sub Enabling Outcomes

5.3.3 Describe Security and Personnel, and Information Security Maintenance

6.1 Maintain computer

network systems

6.1.1 Connect, Configure, run networked computers.

6.1.2 Analyze network systems

6.2 Make operational

Services

6.2.1 Maintain computer hardware

6.2.2 Connect computer hardware

6.2.3 Update computer software (e.g. operating

systems)

6.2.4 Manage computer networking

6.3 Analyze computer system

communication

6.3.1 Communicate effectively with organizational

Stakeholders (e.g.

INTRANET and EXTRANET)

6.3.2. Apply computing mathematics in solving computer

problems

Page 16: Enabling and Sub Enabling Outcomes

ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS

SUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT CRITERIA

ASSESSMENT METHODS

ASSESSMENT INSTRUMENTS

1.1.1 Apply mathematical concepts in calculation and preparation of database.

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems).

Explain sets and relations.

Explain basic number theoretical functions.(e.g

Mathematical concepts in calculation and preparation of database are properly

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Page 17: Enabling and Sub Enabling Outcomes

the MODE function, GCD, and LCM)

applied Chalk

Projector

Laptop

checklist

1.1.2 Solve basic problems relating to ICT using mathematical principles

Evaluate basic counting techniques and discrete probability

Explain important algorithms of graph theory.

Explain Boolean logic and techniques of mathematical proofs.

Basic problems relating to ICT are accurately solved using mathematical principles

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

1.2.1 Apply basic writing skills Apply grammar Construct sentences Write small texts

Basic writing skills are properly applied

Discussion

Presentation

Tests and

Whiteboard

Markerpen

Page 18: Enabling and Sub Enabling Outcomes

Quiz Assign

ment

Blackboard

Chalk

Projector

Laptop

checklist

1.2.2 Apply principles and theories involving business correspondence

Write business letters Write E-mail Write simple reports Write sales letters

Principles and theories involving business correspondence are appropriately applied

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

1.2.3 Apply employment Write employment Employment Discuss Whit

Page 19: Enabling and Sub Enabling Outcomes

communication application letters Write CV’s Participate in

employment interviews Search for jobs

communication is properly applied

ion Present

ation Tests

and Quiz

Assignment

eboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business presentations.

Prepare simple research proposal

Write effective memo’s Prepare paper and other

business presentations

Simple research proposal and effective memos, paper presentation and other business presentations are properly prepared

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

Page 20: Enabling and Sub Enabling Outcomes

checklist

2.1.1 Start with Dreamweaver a. Explore the DW Workspace

b. View a Web page and Use the Help feature

c. Plan and Define a Web Site

d. Add Folders and Pages to your Web Site

e. Create and View a Site Map

The dream weaver application program is started properly

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

2.1.2 Develop a Web Page a. Create Head Content and Set page properties

b. Create, Import, and FormatText

c. Add Links to Web pagesd. Use the History Panel

and the Code Inspectore. Modify and Test Web

pages

Website is developed properly using the Dreamweaver application programs

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Proje

Page 21: Enabling and Sub Enabling Outcomes

ctor Lapt

op chec

klist2.1.3 Work with Text and

Graphicsa. Create Unordered and

Ordered Listsb. Create, Apply, and Edit

Cascading Style Sheetsc. Insert and Align Graphicsd. Enhance an Image and

Use Alternate Texte. Insert a Background

Image and Perform Site maintenance

Text and graphics are properly applied in a well designed website

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

2.1.4 Work with Links a. Create External and Internal Links

b. Create Internal Links to Named Anchors

c. Insert Flash Textd. Create and Modify a

Navigation Bare. Manage Web Site Links

Links are properly utilized in designing a website

2.1.5 Work with Tables a. Create a Tableb. Resize, Split, and Merge

Tables are created,

Page 22: Enabling and Sub Enabling Outcomes

Cellsc. Insert and Align Graphics

in Table Cellsd. Insert Text and Format

Cell Contente. Perform Web Site

Maintenance

resized and utilized in a designed website

2.2.1 Start the Adobe Flash a. Understand the Adobe Flash CS3 Workspace

b. Open a Document and Play a Movie

c. Create and Save a Movied. Work with the Timelinee. Distribute an Adobe

Flash Movie

Adobe Flash is correctly started to design a website

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.2.2 Draw Objects in Adobe

Flash

a. Use the Flash Drawing Tools

b. Select Objects and Apply Colors

c. Work with Drawn Objectsd. Work with Text and Text

Objectse. Work with Layers and

Objects are drawn correctly using Adobe Flash in a website

Discussion

Presentation

Tests and Quiz

Assign

Whiteboard

Marker pen

Blackboa

Page 23: Enabling and Sub Enabling Outcomes

Objects ment rd Chal

k Proje

ctor Lapt

op Chec

klist2.2.3 Work with Symbols and

Interactivity

a. Create Symbols and Instances

b. Work with Librariesc. Create Buttonsd. Assign Actions to Frames

and Buttons

Symbols and buttons are correctly applied using Adobe flash.

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.2.4 Create Animations a. Create Frame-by-Frame Animations

b. Create Motion-Tweened Animations

c. Work with Motion Guidesd. Create animation effectse. Animate Text

Animations are correctly created using Adobe Flash

Discussion

Presentation

Tests and Quiz

Whiteboard

Marker pen

Blac

Page 24: Enabling and Sub Enabling Outcomes

Assignment

kboard

Chalk

Projector

Laptop

checklist

2.2.5 Create Special Effects a. Create Shape Tween Animations

b. Create a Mask Effectc. Add Soundd. Add Scenese. Create an Animated

Navigation Bar

Special effects are applied correctly in website using Adobe Flash

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.3.1 Describe Databases and Transactions

a) explain database system

b) Explain relational databases and database architecture

Database and transaction are correctly describe

Discussion

Presentation

Tests and

Whiteboard

Marker pen

Page 25: Enabling and Sub Enabling Outcomes

c) Describe transaction management

Quiz Assign

ment

Blackboard

Chalk

Projector

Laptop

checklist

2.3.2 Describe Data Models a) Explain data modelsb) Describe Basic building

blocks of data modelsc) Explain the Degrees of

data abstraction.

Database models are correctly described

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.3.3 Describe the Database Design

a) Explain the ER-Modelb) Describe the Logical

view of datac) Describe the features of

Database design is correctly

Discussion

Presentation

Tests

Whiteboard

Marker

Page 26: Enabling and Sub Enabling Outcomes

good relational database design

described and Quiz

Assignment

pen Blac

kboard

Chalk

Projector

Laptop

checklist

2.3.4 Describe the Relational Algebra and Calculus

a) Explain Selection and projection

b) Describe Operatorsc) Explain Tuple relational

calculus

Relational Algebra and Calculus are properly described

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.3.5 Describe Constraints a) Explain constraintsb) Introduce views, c) Apply SQL statements

Constraints, views and SQL commands

Discussion

Presentation

Whiteboard

Mark

Page 27: Enabling and Sub Enabling Outcomes

are correctly described and applied during the design of a database

Discussion

Presentation

Tests and Quiz

Assignment

er pen

Blackboard

Chalk

Projector

Laptop

checklist

2.3.6 Describe SQL a) Create Tablesb) Apply sql commands c) Apply Aggregate

functions

SQL tables are created and updated correctly

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.4.1 Describe the Motherboard and its

a) IdentifyDifferent types of PC configurations and

Motherboard and its

Discussion

Present

Whiteboard

Page 28: Enabling and Sub Enabling Outcomes

Components their comparison b) Outline the Overview

and features of ISA, PCI-X, PCI-Xpress, AGP, Processor Bus

c) Describe memory organization

Components are clearly described

ation Tests

and Quiz

Assignment

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.4.2 Describe Storage Devices & its Interfacing

a) Explain Recording Technique

b) Describe Hard disk constructionand working

c) Identify features of parallel AT attachment (PATA), Serial AT Attachment (SATA), External SATA

Storage Devices & its Interfacing are properly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.4.3 Describe Display a. Explain the CRT colour monitor including the

Display Devices &

Discussion

Whiteboa

Page 29: Enabling and Sub Enabling Outcomes

Devices & Interfacing Block diagram and function of each block and the Characteristics of CRT monitor

b. Identify theLCD monitor , functional blockdiagram of LCD monitor, working principal, advantages and disadvantages Types

c. Explain the Important characteristics of display screen

Interfacing are properly described

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

rd Mark

er pen

Blackboard

Chalk

Projector

Laptop

checklist

2.4.4 Describe the Power Supplies of computers

a) Explain Block diagram and working of SMPS

b) Power supply characteristics

c) Describe Power problems and Protection devices Interfaces

Power Supplies of computers are clearly Described

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

chec

Page 30: Enabling and Sub Enabling Outcomes

klist2.4.5 Describe PC Diagnostic,

Testing and Maintenance & Tools

a) Explain Preventive Maintenance

b) Describe Fault finding and troubleshooting of computer peripherals

c) Describe the Working of logic probe, logic purser, current (CRO).

PC Diagnostic, Testing and Maintenance & Tools are clearly described.

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.4.6 Describe PC interfaces a. Explain SCSI, SCSI cables and connectors, SCSI drive configuration;

b. Describe USB features; RS232 : (Voltages & 9 pinSignal description

c. Describe Centronics (interface diagram, signals and timing waveform)

d. Describe Firewire features.

PC interfaces are clearly described.

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

Page 31: Enabling and Sub Enabling Outcomes

checklist

2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase

a) Identify roles of systems analyst

b) Explain Structured Analysis &Structured Design

c) Explain Object-Oriented Analysis and Design

phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase are properly described

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

2.5.2 Determine System Requirements and Design Strategies

a) Initiate and Plan Information Systems Projects Structures as output parameters.

b) Apply CASE toolsc) Gather Information using

traditional and modern techniques.

System Requirements and Design Strategies are clearly determined

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Lapt

Page 32: Enabling and Sub Enabling Outcomes

op chec

klist2.5.3 Structure systems

requirementsa) Apply Process Modelingb) Apply Conceptual Data

Modellingc) Apply Object-Oriented

Analysisd) Apply Logical & Physical

Design in Designing Forms and Reports, Designing UserInterface Details

systems requirements are clearly structured

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

3.1.1 Introduce Computer

Programming concepts

used in writing code

a. Outline the basic Components of a Computer: Software & Hardware

b. Introduce an Overview of Computer Programming Languages

c. Describe Program development life cycle (algorithms)

d. Apply Number Systems and Conversions

Computer Programming concepts used in writing code are clearly introduced

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Page 33: Enabling and Sub Enabling Outcomes

Laptop

checklist

3.1.2 Describe the overview

and Introduction to Java

a. Explain the Java Background

b. Outline Phases of a Java Program

c. Write your First Java Program: “Hello World!”

d. Write programs by using a text editor and console

e. Deal with errors

overview and Introduction to Java are properly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

3.1.3 Describe the

Programming

Fundamentals used in

Java programs

a. Describe Java Comments, statements, blocks, identifiers, keywords, literals

b. Explain the Primitive data types

c. Define Java Variablesd. Explain Java

Operators(arithmetic, relational) and Operator Precedence

e. Explain Java

Programming Fundamentals used in Java programs are clearly described

Page 34: Enabling and Sub Enabling Outcomes

Operators(logical, conditional) and Operator Precedence

3.2.1 Describe Java Control

Structures used when

writing a program

a. Explain and apply the Decision control structures (if, else, switch)

b. Apply Java Repetition control structures (while, do-while, for)

c. Apply Java Branching statements (break, continue, return)

d. Describe Java Arrays and Command Line arguments

Java Control Structures used when writing a program are clearly described

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

3.2.2 Work with the Java Class

Library when conding

programs

a. Introduce the Object-oriented programming

b. Apply Encapsulationc. Apply Classes and

Objectsd. Apply Class variables

and methodse. Apply Casting,

Converting and Comparing Objects

Java Class Library used when conding programs are properly worked.

Discussion

Presentation

Discussion

Presentation

Tests and Quiz

Assign

Whiteboard

Marker pen

Blackboard

Chalk

Proje

Page 35: Enabling and Sub Enabling Outcomes

ment ctor Lapt

op chec

klist3.2.3 Describe Object-Oriented

Programminga. Define your own classesb. Declare attributes

(instance variables, static variables)

c. Declare methods (accessor, mutator)

d. Apply The this referencee. Apply the Overloading

methodsf. Declare constructorsg. Apply The this()

constructor call

Object-Oriented Programming is clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

3.3.1 Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Page 36: Enabling and Sub Enabling Outcomes

Projector

Laptop

checklist

3.3.2 Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

3.3.3 Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chal

Page 37: Enabling and Sub Enabling Outcomes

k Proje

ctor Lapt

op chec

klist4.1.1 identify windows basics

applications

a. Define windowsb. Introduce windows and

advance window versions

c. Operationize windows basic control

d. Work with programse. Manage files and foldersf. Customize windows and

explain accessories of windows

windows basics applications are clearly identified

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

4.1.2 use Ms Word to Explore

office applications

a. Type, Edit, Proof and Review typed document

b. Format Text & Paragraphs

c. Apply Automatic Formatting and Styles

d. Work with Tablese. Apply Graphics and

Frames

Ms Word to Explore office applications are properly used

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Page 38: Enabling and Sub Enabling Outcomes

f. Apply Mail Mergeg. Automate Your Work &

print Documents

Chalk

Projector

Laptop

checklist

4.1.3 use Exel to Explore office

applications

a. Work & Edit In Workbooks

b. Create Formats & Linksc. Format a Worksheet &

create graphic objectsd. Create Charts (Graphs),

format and analyze datae. Organize Data in a List

(Data Management)f. Share & Import Datag. Apply Printing

Exel to Explore office applications are properly used

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

4.1.4 use power point to

Explore office

applications

a. Get started with PowerPoint

b. Create a presentationc. Create & edit slidesd. Preview a slide showe. Add picture & graphf. Add sound & videog. Add auto shape

Power point to Explore office applications are properly used

Discussion

Presentation

Tests and Quiz

Assign

Whiteboard

Marker pen

Blackboa

Page 39: Enabling and Sub Enabling Outcomes

h. Animate objects ment rd Chal

k Proje

ctor Lapt

op chec

klist4.1.5 xxxxxx addddddd Discuss

ion Present

ation Discuss

ion Present

ation Tests

and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

4.2.1 Describe Networking Fundamentalals

a. Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring.

b. Specify the main

Networking FundamentalalsAre clearly described

Discussion

Presentation

Tests and Quiz

Whiteboard

Marker pen

Blac

Page 40: Enabling and Sub Enabling Outcomes

features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5

(Token Ring), 802.11 (wireless), and Fiber Distributed Data Interface (FDDI)

networking technologies, including: Speed, Access method (CSMA/CA [Carrier Sense Multiple Access/Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access /Collision Detection]), Topology, and Media.

c. Specify the characteristics (for example, speed, length, topology, and cable type) of the following cable standards: 10Base-T, 10Base-FL, 100Base-TX, 100Base-FX, 1000Base- TX, 1000Base-CX, 1000Base-SX, 1000Base-LX, 10GBase-SR, 10GBase-LR, and 10GBase-ER

d. Recognize the following media connectors and describe their uses: RJ11

Assignment

kboard

Chalk

Projector

Laptop

checklist

Page 41: Enabling and Sub Enabling Outcomes

(Registered Jack), RJ-45, F-Type, ST (Straight tip), SC (subscriber connector), IEEE 1394 (FireWire), LC (local connector), MTRJ (Mechanical Transfer Registered Jack), USB (Universal Serial Bus)

e. Recognize the following media types and describe their uses: Category 3, 5, 5e, and 6, UTP (Unshielded twisted-pair), STP (shielded twisted-pair), Coaxial cable, SMF (singlemode fiber) optic cable, and MMF (multimode fiber) optic cable.

f. Identify the purposes, features, and functions of the following network components: Hubs, Switches, Bridges, Routers, Gateways, CSU/DSU (Channel Service Unit/Data Service Unit), NICs (network interface cards, ISDN (integrated Services Digital Network) adapters, WAPs (wireless

Page 42: Enabling and Sub Enabling Outcomes

access points), Modems, Transceivers (media converters), and Firewalls.

4.2.2 Describe The OSI Model a. Identify a MAC (Media Access Control) address and its parts.

b. Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions.

c. Identify the OSI (Open Systems Interconnect) layers at which the following network components operate: Hubs, Switches, Bridges, Routers, NICs (network interface cards), and WAPs (wireless access points).

d. Differentiate between the following network protocols in terms of routing, addressing schemes, interoperability, and naming conventions; IPX/SPX (Internet-work Packet

OSI Model is clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

Page 43: Enabling and Sub Enabling Outcomes

Exchange/Sequenced Packet Exchange), NetBEUI (Network Basic Input/Output System Extended User Interface), AppleTalk/AppleTalk over IP (Internet Protocol), and TCP/IP (Transmission Control Protocol/Internet Protocol). Broad overview and understand the functions of the OSI Model and its seven layers: (Physical, Data Link, Network, Transport, Session, Presentation, and Application).

4.2.3 Describe the TCP/IP

Fundamentalsa. Describe the TCP/IP

family of protocols, IP Addressing, address classification, and name resolutions services. Discuss of how to setup and configure TCP/IP on Windows 2000 and a brief discussion of VLAN technologies

b. Identify the purpose of subnetting, the

TCP/IP Fundamentals are clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Proje

Page 44: Enabling and Sub Enabling Outcomes

differences between private and public network addressing schemes, the differences between IP addressing methods: Static, Dynamic, and Self-assigned (APIPA).

c. Define the purpose, function and use of the following protocol used in the TCP/IP suite: TCP, UDP, FTP, SFTP, TFTP, SMTP, HTTP, HTTPS, POP3/IMAP4, Telnet, SSH, ICMP. ARP/RARP, NTP, NNTP, SCP, LDAP, IGMP, LPR.

d. Define the function of TCP/UDO ports.

e. Identify the well-known ports associated with the following commonly used services and protocols: 20 FTP, 21 FTP, 22 SSH, 23 Telnet, 25 SMTP, 53 DNS, 69 TFTP, 80 HTTP, 110 POP3, 119 NNTP, 123 NTP, 143 IMAP4, 443 HTTPS.

ctor Lapt

op chec

klist

4.2.4 Describe the TCP/IP a. Learning how to use the TCP/IP Utilities Discuss Whit

Page 45: Enabling and Sub Enabling Outcomes

Utilities Address Resolution Protocol (ARP), the netstat Utility, the nbstat Utility, the File Transfer Protocol (FTP), the ping Utility, winipcfg, ipconfig, ifconfig, the tracert Utility, the Telnet Utility, and the nslookup Utility.

b. Given a troubleshooting scenario, select the appropriate network utility from the following: tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig

c. Given output from a network diagnostic utility, identify the utility and interpret the output.

are properly described.

ion Present

ation Tests

and Quiz

Assignment

eboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

4.3.1 Describe the Network Operating Systems

a. Identify the basic capabilities (for example, features, client support, interoperability authentication, Directory Structure, file and print services, application support and security) of the following server operating systems to access network

Network Operating Systems are properly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Page 46: Enabling and Sub Enabling Outcomes

resources:b. Unix/Linux/Mac OS X

Serverc. Novell Netwared. Microsoft Windowse. AppleShare IP (Internet

Protocol

Projector

Laptop

checklist

4.3.2 Describe Network Access and Security

a. Identify the following security protocols and describe their purpose and function: IPSec (Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x

b. Identify authentication protocols (for example, CHAP [Challenge Handshake Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication Protocol], PAP [Password Authentication Protocol], RADIUS [Remote Authentication Dial-In User Service], Kerberos,

Network Access and Security are clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

Page 47: Enabling and Sub Enabling Outcomes

and EAP [Extensible Authentication Protocol])

c. Identify the basic capabilities needed for client workstations to connect to and use network resources (for example, media, network protocols, and peer and server services).

d. Identify the purpose, benefits, and characteristics of using a firewall.

e. Identify the purpose, benefits, and characteristics of using a proxy service.

f. Giving a connectivity scenario, determine the impact on network functionality of a particular security implementation (for example, port blocking/filtering, authentication, and encryption

4.3.3 Describe Fault Tolerance

and Disaster Recoverya. Identify the purpose,

benefits, and characteristics of using

Fault Tolerance and Disaster

Discussion

Present

Whiteboard

Page 48: Enabling and Sub Enabling Outcomes

antivirus software for virus protection.

b. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery needs: for example, disk system fault tolerance methods, Power, Link redundancy, Storage, and Services.

c. Identify the purpose and characteristics of disaster recovery for backup consideration: Backup/restore,Offsite storage,Hot and cold spares;Hot, warm, and cold sites

Recovery are properly described.

ation Tests

and Quiz

Assignment

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

4.3.4 Describe Network Troubleshooting

a. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem.

b. Given a troubleshooting scenario involving a client accessing remote network services, identify the cause of the problem (for example,

Network Troubleshooting is properly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Lapt

Page 49: Enabling and Sub Enabling Outcomes

file services, print services, authentication failure, protocol configuration, physical connectivity, and SOHO [small office, home office] router).

c. Given a troubleshooting scenario between a client and the following server environments, identify the cause of a stated problem: UNIX/xMac OS X Server NetWare, Windows, AppleShare IP.

d. Given a scenario, determine the impact of modifying, adding, or moving network services (for example, DHCP [Dynamic Host Configuration Protocol], DNS {Domain Name Service] and WINS (Windows Internet Naming Service]) for network resources and users.

e. Given a troubleshooting scenario involving a network with a particular physical topology (for

op chec

klist

Page 50: Enabling and Sub Enabling Outcomes

example, bus, star, mesh, or ring) and including a network diagram, identify the network area affected and the cause of the stated failure

f. Given a network troubleshooting scenario involving an infrastructure (for example, wired or wireless) problem, identify the cause of a stated problem (for example, bad media, interference, network hardware, or environment).

g. Given a network problem scenario, select an appropriate course of action based on a logical troubleshooting strategy. This strategy can include the following steps: 1.Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish what has changed, 4. Select the most probable cause, 5.Implement an

Page 51: Enabling and Sub Enabling Outcomes

action plan and solution, including potential effects, 6.Test the Result, 7.Identify the results and effects of the solution, 8.Document the solution and process

5.1.1 Describe Elements of

Information and Web Security

a. Explain Security and its history

b. Explain NSTISSC Security Model

c. Explain Information system components

d. Explain Balancing security with access

Elements of Information and Web Security is clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

5.1.2 Describe Legal, Ethical, and Professional Issues in Information Security

a) Explain Security implementationb) Explain System and Security Development Life Cyclesc) Explain Law and Ethicsd) Explain Ethics ,privacy and Codes of Ethics

Legal, Ethical, and Professional Issues in Information Security are clearly described

Discussion

Presentation

Tests and Quiz

Assign

Whiteboard

Markerpen

Blackboa

Page 52: Enabling and Sub Enabling Outcomes

ment rd Chal

k Proje

ctor Lapt

op chec

klist5.1.3 Describe The Need for

Security in information computing

a. Explain the need of security in Business

b. Explain Threatsc. Explain Attacksd. Outline Top ten

security vulnerabilities

The Need for Security in information computing is clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

5.2.1 Describe Risk Management

a. Explain Risk management overview

b. Explain Risk identification

c. Explain Quantitative and

Risk Management is clearly described

Discussion

Presentation

Tests and Quiz

Whiteboard

Markerpen

Blac

Page 53: Enabling and Sub Enabling Outcomes

qualitative risk control

d. Explain Risk management

e. Explain Risk control practice

f. Explain Risk assessment

g. Explain Risk control strategies and selection

Assignment

kboard

Chalk

Projector

Laptop

checklist

5.2.2 Describe Security Planning strategies

a. Explain Security policy, standards and practices

b. Explain Information security blueprint

c. Explain Security education, training and awareness

d. Explain Continuity strategies

Security Planning strategies are clearly described.

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Marker pen

Blackboard

Chalk

Projector

Laptop

checklist

5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion

a. Describe Physical designb. Describe Firewallsc. Describe Protecting

Security Technology:

Discussion

Present

Whiteboard

Page 54: Enabling and Sub Enabling Outcomes

Detection and Access Control

remote connectionsd. Describe Intrusion

detection and prevention systems

e. Describe Honey pots, honey nets and padded cell systems

f. Describe Scanning and analysis tools, access control devices

Firewalls and VPN, and Intrusion Detection and Access Control are clearly described

ation Tests

and Quiz

Assignment

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

5.3.1 Describe Cryptography a. Describe Cryptography Foundations

b. Describe Cipher methodsc. Describe Cryptographic

algorithmsd. Describe Cryptographic

toolse. Describe Protocols for

secure communicationsf. Describe Attacks on

cryptosystems

Cryptography is clearly described

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

5.3.2 Describe Physical Security and

a. Explain Physical Physical Security and

Discussion

Whiteboa

Page 55: Enabling and Sub Enabling Outcomes

Implementing Information Security

access controlsb. Explain Fire

security and safetyc. Explain Supporting

utility failure and structural collapse

d. Explain Data interception

e. Explain Mobile and portable systems

f. Explain Special considerations for physical security threats

g. Explain Project management

h. Explain Technical implementation topics

i. Explain Nontechnical implementation topics

j. Explain Certification and accreditation

Implementing Information SecurityIs properly described

Presentation

Tests and Quiz

Assignment

rd Mark

erpen

Blackboard

Chalk

Projector

Laptop

checklist

5.3.3 Describe Security and Personnel, and Information Security Maintenance

a. Explain Positioning and staffing

b. Explain Information security

Security and Personnel, and Information Security

Discussion

Presentation

Tests

Whiteboard

Markerpe

Page 56: Enabling and Sub Enabling Outcomes

professional credentials

c. Explain Employment policies and practices

d. Explain Security for nonemployees

e. Explain Internal control strategies

f. Explain Privacy and security of personnel data

g. Explain Security management models

h. Explain Maintenance model

i. Explain Digital forensics

Maintenance is properly described

and Quiz

Assignment

n Blac

kboard

Chalk

Projector

Laptop

checklist

6.1.1 Connect,Configure,Run networked computers

Collect components Organize equipment and

tools Configure and run

computer network

Networked computers are correctly connected and configured

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Page 57: Enabling and Sub Enabling Outcomes

Projector

Laptop

checklist

6.1.2 Analyse network systems Manage computer networks

Monitor computer users Provide IP address to

users

Network systems are correctly analysed

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

6.2.1 Maintain Computer hardwares

Keep computer hardware

Store computer hardware

Organize computer hardware

Computer hardwares are properly maintained

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chal

Page 58: Enabling and Sub Enabling Outcomes

k Proje

ctor Lapt

op chec

klist6.2.2 Connect computer

hardwares Connect all hardwares to

obtain computer systems

Test the system and install operating systems

Computer hardwares are correctly connected

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

6.2.3 Update computer software

Install/Reinstall the operating system.

Install application software.

Run other application software

Computer software is properly updated

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Page 59: Enabling and Sub Enabling Outcomes

Chalk

Projector

Laptop

checklist

6.2.4 Manage computer networking

Control the server Manage other networked

computers Provide access rights to

nodes/workstations Describe the usage of

networked computers

Computer networking is properly managed

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

6.3.1 Communicate effectively with organizational stakeholder

Organize the servers Provide closed loop with

all nodes Organize different

computers in other organizarions

Organisational stakeholders are effectivelly communicated with

Discussion

Presentation

Tests and Quiz

Assign

Whiteboard

Markerpen

Blackboa

Page 60: Enabling and Sub Enabling Outcomes

ment rd Chal

k Proje

ctor Lapt

op chec

klist6.3.2 Apply Computing

mathematics in solving computer problems

Collect different equipments and tools

Apply mathematical rules in solving different computer problems

Computing mathematics is accurately applied in solving computer problems

Discussion

Presentation

Tests and Quiz

Assignment

Whiteboard

Markerpen

Blackboard

Chalk

Projector

Laptop

checklist

Page 61: Enabling and Sub Enabling Outcomes
Page 62: Enabling and Sub Enabling Outcomes

11.0 BENCHMARKING OF ASSESSMENT CRITERIA

S/NO ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT

1.1. Communication at the place of work is

1.2 Business problems in an organization are identified properly

1.3 Computing mathematics skills are properly applied on solving business problems.

2.1 System design techniques is Properly applied in the analysis and designing or updating

Page 63: Enabling and Sub Enabling Outcomes

a system

2.2 Computer maintenance Technology is properly applied in maintain the computer.

2.3 Analysis and design stages are properly applied ithe the database development process

2.4 Analysis and design stages are properly applied the the website development process

3.1 Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly.

3.2 Principles underlying the design of high level programming languages are demonstrated properly .

3.3 Students acquired

Page 64: Enabling and Sub Enabling Outcomes

experience and confidence in the use of a high level programming language to implement algorithms.

4.1 computer network resource are properly connected and tested for effective operations

4.2 office automation software are installed and applied properly for effective operations

4.3 network and office automation software are properly utilized and maintained for effective operations in an organization

5.1 Elements of information and security are clearly understood and applied in assessing the need of security

5.2 Risk management strategies and plans are

Page 65: Enabling and Sub Enabling Outcomes

properly applied in securing information

5.3 Cryptograpy methods and physical plan techniques are applied properly in protecting information

6.1 oncepts of project life cycle are properly established.

6.2 Feasibility study is properly done to gather the user requirements

6.3 Application System is designed, documented and a final report is produced and assessed properly.

Page 66: Enabling and Sub Enabling Outcomes

12.0 MODULES DESCRIPTION

CODE: TCIT 511

NAME; COMMUNICATION SKILLS

NUMEBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

1.2.1 Apply basic writing skills

Page 67: Enabling and Sub Enabling Outcomes

1.2.2 Apply principles and theories involving business correspondence

1.2.3 Apply employment communication

1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business

Presentations.

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Edition Royal Autralia college of general Practitioners.

2 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland.

3 Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh.

4 Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd.

5 Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh.

Page 68: Enabling and Sub Enabling Outcomes

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 512

NAME; COMPUTING MATHEMATICS

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

1.11 Apply mathematical concepts calculation and preparation of databases

Page 69: Enabling and Sub Enabling Outcomes

1.12 Solve basic problems relating to ICT using mathematical principles

TEACHING AIDS

Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit.

REFERENCES;

1 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA.2 Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer

verlag Berin Heideberg Germany,

3 Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1st Edition , AA

Dordrecht the Netherlands

4 Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd

Edition springer Verlag Berin Heideberg Germany,

5 Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 513

Page 70: Enabling and Sub Enabling Outcomes

NAME; DATABASE SYSTEM DEVELOPMENT

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

2.3.1 Describe Databases and Transactions

2.3.2 DescribeData Models

2.3.3 Describe the Database Design

2.3.4 Describe the Relational Algebra and Calculus

2.3.5 Describe Constraints

2.3.6 Describe SQL

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

Page 71: Enabling and Sub Enabling Outcomes

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2nd Ed,Cengage Learning,Canada

2 Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. 3 Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada.4 Rob P. et al (2009) Database systems design, implementation and management, 5th Edition

Cengage, Learning EMEA.5 Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 514

NAME; COMPUTER MAINTENANCE

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

Page 72: Enabling and Sub Enabling Outcomes

2.4.1 Describe the Motherboard and its Components

2.4.2 Describe Storage Devices & its Interfacing

2.4.3 Describe Display Devices & Interfacing

2.4.4 Describe the Power Supplies of computers

2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools

2.4.6 Describe PC interfaces

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES

1 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc.

2 Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM

Page 73: Enabling and Sub Enabling Outcomes

3 Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison Wesley, NJ.

4 Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. 5 Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.Butterworth-

Heinmann.UK

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 515

NAME; PROGRAMMING

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

3.1.4 Introduce Computer Programming concepts used in writing code

3.1.5 Describe the overview and Introduction to Java

3.1.6 Describe the Programming Fundamentals used in Java programs

Page 74: Enabling and Sub Enabling Outcomes

3.2.4 Describe Java Control Structures used when writing a program

3.2.5 Work with the Java Class Library when conding programs

3.2.6 Describe Object-Oriented Programming

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts

2 Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4th Edition, D. C. Heath and company 125 spring street, Lexington M. A.

Page 75: Enabling and Sub Enabling Outcomes

3 Oualline S. (2003) Practical C++ Programming 2nd Edition O’Reailly media Inc, 1005 Gravenstein Highway North , Sebastopol

4 Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German.

5 Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O’ Reilly media Inc, 1005 Gravenstein Highway North Sebastopol.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 521

NAME; ADVANCED OFFICE AUTOMATION

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

4.1.6 identify windows basics applications

4.1.7 use Ms Word to Explore office applications

4.1.8 use ExelExplore office applications

4.1.9 use power point Explore office applications

4.1.10xxxxxx addddddd

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

Page 76: Enabling and Sub Enabling Outcomes

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK2 Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke

Publishing 980 East Circle Drive USA3 Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK4 Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins5 Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher

Education.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 522

Page 77: Enabling and Sub Enabling Outcomes

NAME; WEB DESIGN

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

2.1.6 Start the Dreamweaver2.1.7 Develop a Web Page2.1.8 Work with Text and Graphics2.1.9 Work with Links2.1.10 Work with Tables

2.2.6 Start the Adobe Flash2.2.7 Draw Objects in Adobe Flash2.2.8 Work with Symbols and Interactivity2.2.9 Create Animations2.2.10 Create Special Effects

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.

Page 78: Enabling and Sub Enabling Outcomes

REFERENCES;

1 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol.

2 Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York Institution of Technology at Utica/Rome.

3 Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition O’Relly media inc. 1005,Gravenstain Highway North, Sebastopoll.

4 Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology.

5 Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

Page 79: Enabling and Sub Enabling Outcomes

CODE: TCIT 523

NAME; NETWORKING

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

4.2.1 Describe Networking Fundamentalals4.2.2 Describe The OSI Model4.2.3 Describe the TCP/IP Fundamentals

4.2.4 Describe the TCP/IP Utilities

4.3.1 Describe the Network Operating Systems4.3.2 Describe Network Access and Security4.3.3 Describe Fault Tolerance and Disaster Recovery4.3.4 Describe Network Troubleshooting

Page 80: Enabling and Sub Enabling Outcomes

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.

REFERENCES;

1 Barken L(2009) How secure is your wireless network your Wi-FLAN,2nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ

2 Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice –Hall of India, New Delh.3 Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada4 Mathew J. (2005) Computer Networks, Internet protocols in actionaddition5 Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

Page 81: Enabling and Sub Enabling Outcomes

CODE: TCIT 524

NAME; PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

5.1.1 Describe Elements of Information and Web Security5.1.2 describe Legal, Ethical, and Professional Issues in Information Security5.1.3 Describe The Need for Security in information computing

5.2.1 Describe Risk Management5.2.2 Describe Security Planning strategies5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control

Page 82: Enabling and Sub Enabling Outcomes

5.3.1 Describe Risk Management5.3.2 Describe Security Planning strategies5.3.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk

2 Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk.3 Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo .4 Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1st ed,Jones&Bartlett

Publishers,Massachussets.USA5 Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ

Prentice- Hall New Delh India.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE: TCIT 525

Page 83: Enabling and Sub Enabling Outcomes

NAME; SYSTEM ANALYSIS AND DESIGN

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase

2.5.2 Determine System Requirements and Design Strategies

2.5.3 Structure systems requirements

TEACHING AIDS

Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit.

REFERENCES;

1 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA

2 Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London

3 MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland4 Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi.

Page 84: Enabling and Sub Enabling Outcomes

5 Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%