Enabling and Sub Enabling Outcomes
-
Upload
ogakhan-nyamu -
Category
Documents
-
view
141 -
download
4
description
Transcript of Enabling and Sub Enabling Outcomes
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION
TECHNOLOGY.
1.0 SUMMARY FRAMEWORK
QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION &
COMMUNICATION TECHNOLOGY
PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some
non-routine activities: develop database systems, design and
analyze systems, prepare computer programs, connect
peripherals, ports, maintain the computer , build and troubleshoot
communication systems, and apply office automation software,
under less supervision.
NTA LEVEL 5
COMPETENCE LEVEL
DESCRIPTOR
The holder of the qualification will apply skills and knowledge in a
range of ICT activities some of which are non-routine of developing
database systems, designing and analyzing systems, preparing
computer programs, connecting peripherals, ports ,maintaining the
computer ,building and troubleshooting communication systems,
applying office automation software, and assuming some
operational responsibilities.
CREDITS AT THIS LEVEL 120
CUMULATIVE CREDITS AT
THIS LEVEL
0
MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL
0
DATE THE QUALIFICATION
STANDARD LAST REVIEWED
New
ENTRANCE
REQUIREMENTS
BTCIT level 4, or Form six with one principal pass either in
mathematics or physics.
8.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA
S/N PRINCIPAL LEARNING OUTCOMES
CREDIT VALUES
ASSESSMENT CRITERIA
PLO 1 Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems.
18
1.1. Communication at the place of work is effectively done.
1.2 Business problems in an organization are identified properly
1.3 Computing mathematics skills areproperly applied on solving
business problems.
POL 2 Apply system design and maintenance technology In database development and web design 54
2.1 System design techniques is Properly applied in the analysis and designing or updating a system
2.2 Computer maintenance Technology is properly applied in maintain the computer.
2.3 Analysis and design stages are properly applied ithe the database development process
2.4 Analysis and design stages are properly applied the the website
development process
PLO 3 Prepare computer programmes using different high level programming languages
12 3.1 Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly.
3.2 Principles underlying the design of high level programming languages are demonstrated properly .
3.3 Students acquired experience and confidence in the use of a high level programming language to implement algorithms.
PLO 4 Connect network resources ,troubleshoot network and apply office automation software for effective operations and communication in an
24
4.1 computer network resource are properly connected and tested for effective operations
4.2 office automation software are installed and applied properly for effective operations
organization 4.3 network and office automation software are properly utilized and maintained for effective operations in an organization
PLO 5 Apply computer professional ethical and security principles in computer use For protecting against computer crimes
12
5.1 Elements of information and security are clearly understood and applied in assessing the need of security
5.2 Risk management strategies and plans are properly applied in securing information
5.3 Cryptograpy methods and physical plan techniques are applied properly in protecting information
PLO 6 Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.
-
6.1 concepts of project life cycle are properly established.
6.2 Feasibility study is properly done to gather the user requirements
6.3 Application System is designed,
documented and a final report is produced and assessed properly.
120
NACTE STANDARDS AND RELATED ENABLING OUTCOMES :
PRINCIPAL OUTCOMES ENABLING OUTCOMES
1. Communicate effectively and
efficiently at the place of work and apply
Computing mathematics skills in solving
business problems.
1.1 Apply
mathematical
Concepts in ICT.
1.2 Apply basic communication skills.
2.Apply system design and maintenance technology In database development and web design
2.1 Work With Adobe Dreamweaver CS3 to
create static websites
2.2 Work With Adobe Flash CS3 to in
designing websites
2.3 Prepare database application system
2.4 Configure peripherals,devices and
maintain PC systems.
2.5 Collect information, analyze and
evaluate existing system and develop or
update a sysm using system development
tools.
3. Prepare computer programmes
using different high level
programming languages
3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems.
3.2 demonstrate the principles underlying the design of high level programming languages.
3.3 give students experience and confidence in the use of a high level programming language to implement algorithms.
4. Connect network
resources ,troubleshoot network
and apply office automation
software for effective operations
and communication in an
organization
4.1 Apply application software for
database and office automation
systems to enhance effective
operations of an office
4.2 Describe basic networking concepts and configurations, the OSI model,
work with network-related hardware,
4.3 Describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.
5. Apply computer professional ethical and security principles in computer use For protecting against computer crimes
5.1.apply Elements of information and security are assessing the need of security in an organization
5.2 identify Risk management strategies and plans in securing information
5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information
6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.
6.1 Maintain computer
network systems
6.2 Make operational
Services
6.3 Analyze computer system
communication
ENABLING AND SUBENABLING OUTCOMES
ENABLING OUTCOMES SUB-ENABLING OUTCOMES
1.1 Apply
mathematical
Concepts in ICT.
1.1.1 Apply mathematical concepts in calculation and
preparation of database
1.1.2 Solve basic problems relating to ICTusing mathematical principles
1.3 Apply basic communication skills. 1.3.1 Apply basic writing skills.
1.3.2 Apply principles and theories involving business
correspondences.
1.3.3 Apply employment communication.
1.3.4 Prepare simple research proposal and write effective
memos, paper presentations and other business
presentations.
2.1 Work With Adobe Dreamweaver CS3 to
create static websites
2.1.1 Start the Dreamweaver2.1.2 Develop a Web Page2.1.3 Work with Text and Graphics2.1.4 Work with Links2.1.5 Work with Tables
2.2 Work With Adobe Flash CS3 to in designing websites
2.2.1 Start the Adobe Flash
2.2.2 Draw Objects in Adobe Flash
2.2.3 Work with Symbols and Interactivity
2.2.4 Create Animations
2.2.5 Create Special Effects
2.3 Prepare database application system 2.3.1 Describe Databases and Transactions
2.3.2 DescribeData Models
2.3.3 Describe the Database Design
2.3.4 Describe the Relational Algebra and Calculus
2.3.5 Describe Constraints
2.3.6 Describe SQL
2.4 Configure peripherals,devices and
maintain PC systems.
2.4.1 Describe the Motherboard and its Components
2.4.2 Describe Storage Devices & its Interfacing
2.4.3 Describe Display Devices & Interfacing
2.4.4 Describe the Power Supplies of computers
2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools
2.4.6 Describe PC interfaces
2.5 Collect information, analyze and
evaluate existing system and develop or
update a sysm using system development
tools.
2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase
2.5.2 Determine System Requirements and Design Strategies
2.5.3 Structure systems requirements
3.1 introduce concepts and principles of problem solving by computer, and the construction of appropriate algorithms for the solution of problems.
3.1.1 Introduce Computer Programming concepts used in
writing code
3.1.2 Describe the overview and Introduction to Java
3.1.3 Describe the Programming Fundamentals used in
Java programs
3.2 demonstrate the principles underlying the design of high level programming languages.
3.2.1 Describe Java Control Structures used when writing a
program
3.2.2 Work with the Java Class Library when conding
programs
3.2.3 Describe Object-Oriented Programming
3.3 give students experience and confidence in the use of a high level programming language to implement algorithms.
5.1.1addddddddd
4.1 Apply application software for
database and office automation
systems to enhance effective
operations of ana office
4.1.1 identify windows basics applications
4.1.2 use Ms Word to Explore office applications
4.1.3 use ExelExplore office applications
4.1.4 use power point Explore office applications
4.1.5 xxxxxx addddddd
4.2 Describe networking concepts,configurations, the OSI model, and work with network-related hardware .
4.2.1 Describe Networking Fundamentalals4.2.2 Describe The OSI Model4.2.3 Describe the TCP/IP Fundamentals
4.2.4 Describe the TCP/IP Utilities
4.3 describe network configuration with TCP/IP, network operating system basics, fault tolerance and backup issues, and troubleshooting hardware and software.
4.3.1 Describe the Network Operating Systems4.3.2 Describe Network Access and Security4.3.3 Describe Fault Tolerance and Disaster Recovery4.3.4 Describe Network Troubleshooting
5.1..apply Elements of information and security are assessing the need of security in an organization
5.1.1 Describe Elements of Information and Web Security5.1.2 describe Legal, Ethical, and Professional Issues in Information Security5.1.3 Describe The Need for Security in information computing
5.2 identify Risk management strategies and plans in securing information
5.2.1 Describe Risk Management5.2.2 Describe Security Planning strategies5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control
5.3 describe Cryptograpy methods and physical plan techniques applied in protecting information
5.3.1 Describe Cryptography5.3.2 Describe Physical Security and Implementing Information Security
5.3.3 Describe Security and Personnel, and Information Security Maintenance
6.1 Maintain computer
network systems
6.1.1 Connect, Configure, run networked computers.
6.1.2 Analyze network systems
6.2 Make operational
Services
6.2.1 Maintain computer hardware
6.2.2 Connect computer hardware
6.2.3 Update computer software (e.g. operating
systems)
6.2.4 Manage computer networking
6.3 Analyze computer system
communication
6.3.1 Communicate effectively with organizational
Stakeholders (e.g.
INTRANET and EXTRANET)
6.3.2. Apply computing mathematics in solving computer
problems
ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS
SUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT CRITERIA
ASSESSMENT METHODS
ASSESSMENT INSTRUMENTS
1.1.1 Apply mathematical concepts in calculation and preparation of database.
Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems).
Explain sets and relations.
Explain basic number theoretical functions.(e.g
Mathematical concepts in calculation and preparation of database are properly
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
the MODE function, GCD, and LCM)
applied Chalk
Projector
Laptop
checklist
1.1.2 Solve basic problems relating to ICT using mathematical principles
Evaluate basic counting techniques and discrete probability
Explain important algorithms of graph theory.
Explain Boolean logic and techniques of mathematical proofs.
Basic problems relating to ICT are accurately solved using mathematical principles
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
1.2.1 Apply basic writing skills Apply grammar Construct sentences Write small texts
Basic writing skills are properly applied
Discussion
Presentation
Tests and
Whiteboard
Markerpen
Quiz Assign
ment
Blackboard
Chalk
Projector
Laptop
checklist
1.2.2 Apply principles and theories involving business correspondence
Write business letters Write E-mail Write simple reports Write sales letters
Principles and theories involving business correspondence are appropriately applied
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
1.2.3 Apply employment Write employment Employment Discuss Whit
communication application letters Write CV’s Participate in
employment interviews Search for jobs
communication is properly applied
ion Present
ation Tests
and Quiz
Assignment
eboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business presentations.
Prepare simple research proposal
Write effective memo’s Prepare paper and other
business presentations
Simple research proposal and effective memos, paper presentation and other business presentations are properly prepared
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
2.1.1 Start with Dreamweaver a. Explore the DW Workspace
b. View a Web page and Use the Help feature
c. Plan and Define a Web Site
d. Add Folders and Pages to your Web Site
e. Create and View a Site Map
The dream weaver application program is started properly
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
2.1.2 Develop a Web Page a. Create Head Content and Set page properties
b. Create, Import, and FormatText
c. Add Links to Web pagesd. Use the History Panel
and the Code Inspectore. Modify and Test Web
pages
Website is developed properly using the Dreamweaver application programs
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Proje
ctor Lapt
op chec
klist2.1.3 Work with Text and
Graphicsa. Create Unordered and
Ordered Listsb. Create, Apply, and Edit
Cascading Style Sheetsc. Insert and Align Graphicsd. Enhance an Image and
Use Alternate Texte. Insert a Background
Image and Perform Site maintenance
Text and graphics are properly applied in a well designed website
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
2.1.4 Work with Links a. Create External and Internal Links
b. Create Internal Links to Named Anchors
c. Insert Flash Textd. Create and Modify a
Navigation Bare. Manage Web Site Links
Links are properly utilized in designing a website
2.1.5 Work with Tables a. Create a Tableb. Resize, Split, and Merge
Tables are created,
Cellsc. Insert and Align Graphics
in Table Cellsd. Insert Text and Format
Cell Contente. Perform Web Site
Maintenance
resized and utilized in a designed website
2.2.1 Start the Adobe Flash a. Understand the Adobe Flash CS3 Workspace
b. Open a Document and Play a Movie
c. Create and Save a Movied. Work with the Timelinee. Distribute an Adobe
Flash Movie
Adobe Flash is correctly started to design a website
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.2.2 Draw Objects in Adobe
Flash
a. Use the Flash Drawing Tools
b. Select Objects and Apply Colors
c. Work with Drawn Objectsd. Work with Text and Text
Objectse. Work with Layers and
Objects are drawn correctly using Adobe Flash in a website
Discussion
Presentation
Tests and Quiz
Assign
Whiteboard
Marker pen
Blackboa
Objects ment rd Chal
k Proje
ctor Lapt
op Chec
klist2.2.3 Work with Symbols and
Interactivity
a. Create Symbols and Instances
b. Work with Librariesc. Create Buttonsd. Assign Actions to Frames
and Buttons
Symbols and buttons are correctly applied using Adobe flash.
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.2.4 Create Animations a. Create Frame-by-Frame Animations
b. Create Motion-Tweened Animations
c. Work with Motion Guidesd. Create animation effectse. Animate Text
Animations are correctly created using Adobe Flash
Discussion
Presentation
Tests and Quiz
Whiteboard
Marker pen
Blac
Assignment
kboard
Chalk
Projector
Laptop
checklist
2.2.5 Create Special Effects a. Create Shape Tween Animations
b. Create a Mask Effectc. Add Soundd. Add Scenese. Create an Animated
Navigation Bar
Special effects are applied correctly in website using Adobe Flash
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.3.1 Describe Databases and Transactions
a) explain database system
b) Explain relational databases and database architecture
Database and transaction are correctly describe
Discussion
Presentation
Tests and
Whiteboard
Marker pen
c) Describe transaction management
Quiz Assign
ment
Blackboard
Chalk
Projector
Laptop
checklist
2.3.2 Describe Data Models a) Explain data modelsb) Describe Basic building
blocks of data modelsc) Explain the Degrees of
data abstraction.
Database models are correctly described
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.3.3 Describe the Database Design
a) Explain the ER-Modelb) Describe the Logical
view of datac) Describe the features of
Database design is correctly
Discussion
Presentation
Tests
Whiteboard
Marker
good relational database design
described and Quiz
Assignment
pen Blac
kboard
Chalk
Projector
Laptop
checklist
2.3.4 Describe the Relational Algebra and Calculus
a) Explain Selection and projection
b) Describe Operatorsc) Explain Tuple relational
calculus
Relational Algebra and Calculus are properly described
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.3.5 Describe Constraints a) Explain constraintsb) Introduce views, c) Apply SQL statements
Constraints, views and SQL commands
Discussion
Presentation
Whiteboard
Mark
are correctly described and applied during the design of a database
Discussion
Presentation
Tests and Quiz
Assignment
er pen
Blackboard
Chalk
Projector
Laptop
checklist
2.3.6 Describe SQL a) Create Tablesb) Apply sql commands c) Apply Aggregate
functions
SQL tables are created and updated correctly
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.4.1 Describe the Motherboard and its
a) IdentifyDifferent types of PC configurations and
Motherboard and its
Discussion
Present
Whiteboard
Components their comparison b) Outline the Overview
and features of ISA, PCI-X, PCI-Xpress, AGP, Processor Bus
c) Describe memory organization
Components are clearly described
ation Tests
and Quiz
Assignment
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.4.2 Describe Storage Devices & its Interfacing
a) Explain Recording Technique
b) Describe Hard disk constructionand working
c) Identify features of parallel AT attachment (PATA), Serial AT Attachment (SATA), External SATA
Storage Devices & its Interfacing are properly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.4.3 Describe Display a. Explain the CRT colour monitor including the
Display Devices &
Discussion
Whiteboa
Devices & Interfacing Block diagram and function of each block and the Characteristics of CRT monitor
b. Identify theLCD monitor , functional blockdiagram of LCD monitor, working principal, advantages and disadvantages Types
c. Explain the Important characteristics of display screen
Interfacing are properly described
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
rd Mark
er pen
Blackboard
Chalk
Projector
Laptop
checklist
2.4.4 Describe the Power Supplies of computers
a) Explain Block diagram and working of SMPS
b) Power supply characteristics
c) Describe Power problems and Protection devices Interfaces
Power Supplies of computers are clearly Described
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
chec
klist2.4.5 Describe PC Diagnostic,
Testing and Maintenance & Tools
a) Explain Preventive Maintenance
b) Describe Fault finding and troubleshooting of computer peripherals
c) Describe the Working of logic probe, logic purser, current (CRO).
PC Diagnostic, Testing and Maintenance & Tools are clearly described.
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.4.6 Describe PC interfaces a. Explain SCSI, SCSI cables and connectors, SCSI drive configuration;
b. Describe USB features; RS232 : (Voltages & 9 pinSignal description
c. Describe Centronics (interface diagram, signals and timing waveform)
d. Describe Firewire features.
PC interfaces are clearly described.
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase
a) Identify roles of systems analyst
b) Explain Structured Analysis &Structured Design
c) Explain Object-Oriented Analysis and Design
phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase are properly described
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
2.5.2 Determine System Requirements and Design Strategies
a) Initiate and Plan Information Systems Projects Structures as output parameters.
b) Apply CASE toolsc) Gather Information using
traditional and modern techniques.
System Requirements and Design Strategies are clearly determined
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Lapt
op chec
klist2.5.3 Structure systems
requirementsa) Apply Process Modelingb) Apply Conceptual Data
Modellingc) Apply Object-Oriented
Analysisd) Apply Logical & Physical
Design in Designing Forms and Reports, Designing UserInterface Details
systems requirements are clearly structured
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.1.1 Introduce Computer
Programming concepts
used in writing code
a. Outline the basic Components of a Computer: Software & Hardware
b. Introduce an Overview of Computer Programming Languages
c. Describe Program development life cycle (algorithms)
d. Apply Number Systems and Conversions
Computer Programming concepts used in writing code are clearly introduced
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.1.2 Describe the overview
and Introduction to Java
a. Explain the Java Background
b. Outline Phases of a Java Program
c. Write your First Java Program: “Hello World!”
d. Write programs by using a text editor and console
e. Deal with errors
overview and Introduction to Java are properly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.1.3 Describe the
Programming
Fundamentals used in
Java programs
a. Describe Java Comments, statements, blocks, identifiers, keywords, literals
b. Explain the Primitive data types
c. Define Java Variablesd. Explain Java
Operators(arithmetic, relational) and Operator Precedence
e. Explain Java
Programming Fundamentals used in Java programs are clearly described
Operators(logical, conditional) and Operator Precedence
3.2.1 Describe Java Control
Structures used when
writing a program
a. Explain and apply the Decision control structures (if, else, switch)
b. Apply Java Repetition control structures (while, do-while, for)
c. Apply Java Branching statements (break, continue, return)
d. Describe Java Arrays and Command Line arguments
Java Control Structures used when writing a program are clearly described
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.2.2 Work with the Java Class
Library when conding
programs
a. Introduce the Object-oriented programming
b. Apply Encapsulationc. Apply Classes and
Objectsd. Apply Class variables
and methodse. Apply Casting,
Converting and Comparing Objects
Java Class Library used when conding programs are properly worked.
Discussion
Presentation
Discussion
Presentation
Tests and Quiz
Assign
Whiteboard
Marker pen
Blackboard
Chalk
Proje
ment ctor Lapt
op chec
klist3.2.3 Describe Object-Oriented
Programminga. Define your own classesb. Declare attributes
(instance variables, static variables)
c. Declare methods (accessor, mutator)
d. Apply The this referencee. Apply the Overloading
methodsf. Declare constructorsg. Apply The this()
constructor call
Object-Oriented Programming is clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.3.1 Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.3.2 Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
3.3.3 Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chal
k Proje
ctor Lapt
op chec
klist4.1.1 identify windows basics
applications
a. Define windowsb. Introduce windows and
advance window versions
c. Operationize windows basic control
d. Work with programse. Manage files and foldersf. Customize windows and
explain accessories of windows
windows basics applications are clearly identified
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
4.1.2 use Ms Word to Explore
office applications
a. Type, Edit, Proof and Review typed document
b. Format Text & Paragraphs
c. Apply Automatic Formatting and Styles
d. Work with Tablese. Apply Graphics and
Frames
Ms Word to Explore office applications are properly used
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
f. Apply Mail Mergeg. Automate Your Work &
print Documents
Chalk
Projector
Laptop
checklist
4.1.3 use Exel to Explore office
applications
a. Work & Edit In Workbooks
b. Create Formats & Linksc. Format a Worksheet &
create graphic objectsd. Create Charts (Graphs),
format and analyze datae. Organize Data in a List
(Data Management)f. Share & Import Datag. Apply Printing
Exel to Explore office applications are properly used
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
4.1.4 use power point to
Explore office
applications
a. Get started with PowerPoint
b. Create a presentationc. Create & edit slidesd. Preview a slide showe. Add picture & graphf. Add sound & videog. Add auto shape
Power point to Explore office applications are properly used
Discussion
Presentation
Tests and Quiz
Assign
Whiteboard
Marker pen
Blackboa
h. Animate objects ment rd Chal
k Proje
ctor Lapt
op chec
klist4.1.5 xxxxxx addddddd Discuss
ion Present
ation Discuss
ion Present
ation Tests
and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
4.2.1 Describe Networking Fundamentalals
a. Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring.
b. Specify the main
Networking FundamentalalsAre clearly described
Discussion
Presentation
Tests and Quiz
Whiteboard
Marker pen
Blac
features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5
(Token Ring), 802.11 (wireless), and Fiber Distributed Data Interface (FDDI)
networking technologies, including: Speed, Access method (CSMA/CA [Carrier Sense Multiple Access/Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access /Collision Detection]), Topology, and Media.
c. Specify the characteristics (for example, speed, length, topology, and cable type) of the following cable standards: 10Base-T, 10Base-FL, 100Base-TX, 100Base-FX, 1000Base- TX, 1000Base-CX, 1000Base-SX, 1000Base-LX, 10GBase-SR, 10GBase-LR, and 10GBase-ER
d. Recognize the following media connectors and describe their uses: RJ11
Assignment
kboard
Chalk
Projector
Laptop
checklist
(Registered Jack), RJ-45, F-Type, ST (Straight tip), SC (subscriber connector), IEEE 1394 (FireWire), LC (local connector), MTRJ (Mechanical Transfer Registered Jack), USB (Universal Serial Bus)
e. Recognize the following media types and describe their uses: Category 3, 5, 5e, and 6, UTP (Unshielded twisted-pair), STP (shielded twisted-pair), Coaxial cable, SMF (singlemode fiber) optic cable, and MMF (multimode fiber) optic cable.
f. Identify the purposes, features, and functions of the following network components: Hubs, Switches, Bridges, Routers, Gateways, CSU/DSU (Channel Service Unit/Data Service Unit), NICs (network interface cards, ISDN (integrated Services Digital Network) adapters, WAPs (wireless
access points), Modems, Transceivers (media converters), and Firewalls.
4.2.2 Describe The OSI Model a. Identify a MAC (Media Access Control) address and its parts.
b. Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions.
c. Identify the OSI (Open Systems Interconnect) layers at which the following network components operate: Hubs, Switches, Bridges, Routers, NICs (network interface cards), and WAPs (wireless access points).
d. Differentiate between the following network protocols in terms of routing, addressing schemes, interoperability, and naming conventions; IPX/SPX (Internet-work Packet
OSI Model is clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
Exchange/Sequenced Packet Exchange), NetBEUI (Network Basic Input/Output System Extended User Interface), AppleTalk/AppleTalk over IP (Internet Protocol), and TCP/IP (Transmission Control Protocol/Internet Protocol). Broad overview and understand the functions of the OSI Model and its seven layers: (Physical, Data Link, Network, Transport, Session, Presentation, and Application).
4.2.3 Describe the TCP/IP
Fundamentalsa. Describe the TCP/IP
family of protocols, IP Addressing, address classification, and name resolutions services. Discuss of how to setup and configure TCP/IP on Windows 2000 and a brief discussion of VLAN technologies
b. Identify the purpose of subnetting, the
TCP/IP Fundamentals are clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Proje
differences between private and public network addressing schemes, the differences between IP addressing methods: Static, Dynamic, and Self-assigned (APIPA).
c. Define the purpose, function and use of the following protocol used in the TCP/IP suite: TCP, UDP, FTP, SFTP, TFTP, SMTP, HTTP, HTTPS, POP3/IMAP4, Telnet, SSH, ICMP. ARP/RARP, NTP, NNTP, SCP, LDAP, IGMP, LPR.
d. Define the function of TCP/UDO ports.
e. Identify the well-known ports associated with the following commonly used services and protocols: 20 FTP, 21 FTP, 22 SSH, 23 Telnet, 25 SMTP, 53 DNS, 69 TFTP, 80 HTTP, 110 POP3, 119 NNTP, 123 NTP, 143 IMAP4, 443 HTTPS.
ctor Lapt
op chec
klist
4.2.4 Describe the TCP/IP a. Learning how to use the TCP/IP Utilities Discuss Whit
Utilities Address Resolution Protocol (ARP), the netstat Utility, the nbstat Utility, the File Transfer Protocol (FTP), the ping Utility, winipcfg, ipconfig, ifconfig, the tracert Utility, the Telnet Utility, and the nslookup Utility.
b. Given a troubleshooting scenario, select the appropriate network utility from the following: tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig
c. Given output from a network diagnostic utility, identify the utility and interpret the output.
are properly described.
ion Present
ation Tests
and Quiz
Assignment
eboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
4.3.1 Describe the Network Operating Systems
a. Identify the basic capabilities (for example, features, client support, interoperability authentication, Directory Structure, file and print services, application support and security) of the following server operating systems to access network
Network Operating Systems are properly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
resources:b. Unix/Linux/Mac OS X
Serverc. Novell Netwared. Microsoft Windowse. AppleShare IP (Internet
Protocol
Projector
Laptop
checklist
4.3.2 Describe Network Access and Security
a. Identify the following security protocols and describe their purpose and function: IPSec (Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x
b. Identify authentication protocols (for example, CHAP [Challenge Handshake Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication Protocol], PAP [Password Authentication Protocol], RADIUS [Remote Authentication Dial-In User Service], Kerberos,
Network Access and Security are clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
and EAP [Extensible Authentication Protocol])
c. Identify the basic capabilities needed for client workstations to connect to and use network resources (for example, media, network protocols, and peer and server services).
d. Identify the purpose, benefits, and characteristics of using a firewall.
e. Identify the purpose, benefits, and characteristics of using a proxy service.
f. Giving a connectivity scenario, determine the impact on network functionality of a particular security implementation (for example, port blocking/filtering, authentication, and encryption
4.3.3 Describe Fault Tolerance
and Disaster Recoverya. Identify the purpose,
benefits, and characteristics of using
Fault Tolerance and Disaster
Discussion
Present
Whiteboard
antivirus software for virus protection.
b. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery needs: for example, disk system fault tolerance methods, Power, Link redundancy, Storage, and Services.
c. Identify the purpose and characteristics of disaster recovery for backup consideration: Backup/restore,Offsite storage,Hot and cold spares;Hot, warm, and cold sites
Recovery are properly described.
ation Tests
and Quiz
Assignment
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
4.3.4 Describe Network Troubleshooting
a. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem.
b. Given a troubleshooting scenario involving a client accessing remote network services, identify the cause of the problem (for example,
Network Troubleshooting is properly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Lapt
file services, print services, authentication failure, protocol configuration, physical connectivity, and SOHO [small office, home office] router).
c. Given a troubleshooting scenario between a client and the following server environments, identify the cause of a stated problem: UNIX/xMac OS X Server NetWare, Windows, AppleShare IP.
d. Given a scenario, determine the impact of modifying, adding, or moving network services (for example, DHCP [Dynamic Host Configuration Protocol], DNS {Domain Name Service] and WINS (Windows Internet Naming Service]) for network resources and users.
e. Given a troubleshooting scenario involving a network with a particular physical topology (for
op chec
klist
example, bus, star, mesh, or ring) and including a network diagram, identify the network area affected and the cause of the stated failure
f. Given a network troubleshooting scenario involving an infrastructure (for example, wired or wireless) problem, identify the cause of a stated problem (for example, bad media, interference, network hardware, or environment).
g. Given a network problem scenario, select an appropriate course of action based on a logical troubleshooting strategy. This strategy can include the following steps: 1.Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish what has changed, 4. Select the most probable cause, 5.Implement an
action plan and solution, including potential effects, 6.Test the Result, 7.Identify the results and effects of the solution, 8.Document the solution and process
5.1.1 Describe Elements of
Information and Web Security
a. Explain Security and its history
b. Explain NSTISSC Security Model
c. Explain Information system components
d. Explain Balancing security with access
Elements of Information and Web Security is clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
5.1.2 Describe Legal, Ethical, and Professional Issues in Information Security
a) Explain Security implementationb) Explain System and Security Development Life Cyclesc) Explain Law and Ethicsd) Explain Ethics ,privacy and Codes of Ethics
Legal, Ethical, and Professional Issues in Information Security are clearly described
Discussion
Presentation
Tests and Quiz
Assign
Whiteboard
Markerpen
Blackboa
ment rd Chal
k Proje
ctor Lapt
op chec
klist5.1.3 Describe The Need for
Security in information computing
a. Explain the need of security in Business
b. Explain Threatsc. Explain Attacksd. Outline Top ten
security vulnerabilities
The Need for Security in information computing is clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
5.2.1 Describe Risk Management
a. Explain Risk management overview
b. Explain Risk identification
c. Explain Quantitative and
Risk Management is clearly described
Discussion
Presentation
Tests and Quiz
Whiteboard
Markerpen
Blac
qualitative risk control
d. Explain Risk management
e. Explain Risk control practice
f. Explain Risk assessment
g. Explain Risk control strategies and selection
Assignment
kboard
Chalk
Projector
Laptop
checklist
5.2.2 Describe Security Planning strategies
a. Explain Security policy, standards and practices
b. Explain Information security blueprint
c. Explain Security education, training and awareness
d. Explain Continuity strategies
Security Planning strategies are clearly described.
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Marker pen
Blackboard
Chalk
Projector
Laptop
checklist
5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion
a. Describe Physical designb. Describe Firewallsc. Describe Protecting
Security Technology:
Discussion
Present
Whiteboard
Detection and Access Control
remote connectionsd. Describe Intrusion
detection and prevention systems
e. Describe Honey pots, honey nets and padded cell systems
f. Describe Scanning and analysis tools, access control devices
Firewalls and VPN, and Intrusion Detection and Access Control are clearly described
ation Tests
and Quiz
Assignment
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
5.3.1 Describe Cryptography a. Describe Cryptography Foundations
b. Describe Cipher methodsc. Describe Cryptographic
algorithmsd. Describe Cryptographic
toolse. Describe Protocols for
secure communicationsf. Describe Attacks on
cryptosystems
Cryptography is clearly described
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
5.3.2 Describe Physical Security and
a. Explain Physical Physical Security and
Discussion
Whiteboa
Implementing Information Security
access controlsb. Explain Fire
security and safetyc. Explain Supporting
utility failure and structural collapse
d. Explain Data interception
e. Explain Mobile and portable systems
f. Explain Special considerations for physical security threats
g. Explain Project management
h. Explain Technical implementation topics
i. Explain Nontechnical implementation topics
j. Explain Certification and accreditation
Implementing Information SecurityIs properly described
Presentation
Tests and Quiz
Assignment
rd Mark
erpen
Blackboard
Chalk
Projector
Laptop
checklist
5.3.3 Describe Security and Personnel, and Information Security Maintenance
a. Explain Positioning and staffing
b. Explain Information security
Security and Personnel, and Information Security
Discussion
Presentation
Tests
Whiteboard
Markerpe
professional credentials
c. Explain Employment policies and practices
d. Explain Security for nonemployees
e. Explain Internal control strategies
f. Explain Privacy and security of personnel data
g. Explain Security management models
h. Explain Maintenance model
i. Explain Digital forensics
Maintenance is properly described
and Quiz
Assignment
n Blac
kboard
Chalk
Projector
Laptop
checklist
6.1.1 Connect,Configure,Run networked computers
Collect components Organize equipment and
tools Configure and run
computer network
Networked computers are correctly connected and configured
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
6.1.2 Analyse network systems Manage computer networks
Monitor computer users Provide IP address to
users
Network systems are correctly analysed
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
6.2.1 Maintain Computer hardwares
Keep computer hardware
Store computer hardware
Organize computer hardware
Computer hardwares are properly maintained
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chal
k Proje
ctor Lapt
op chec
klist6.2.2 Connect computer
hardwares Connect all hardwares to
obtain computer systems
Test the system and install operating systems
Computer hardwares are correctly connected
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
6.2.3 Update computer software
Install/Reinstall the operating system.
Install application software.
Run other application software
Computer software is properly updated
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
6.2.4 Manage computer networking
Control the server Manage other networked
computers Provide access rights to
nodes/workstations Describe the usage of
networked computers
Computer networking is properly managed
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
6.3.1 Communicate effectively with organizational stakeholder
Organize the servers Provide closed loop with
all nodes Organize different
computers in other organizarions
Organisational stakeholders are effectivelly communicated with
Discussion
Presentation
Tests and Quiz
Assign
Whiteboard
Markerpen
Blackboa
ment rd Chal
k Proje
ctor Lapt
op chec
klist6.3.2 Apply Computing
mathematics in solving computer problems
Collect different equipments and tools
Apply mathematical rules in solving different computer problems
Computing mathematics is accurately applied in solving computer problems
Discussion
Presentation
Tests and Quiz
Assignment
Whiteboard
Markerpen
Blackboard
Chalk
Projector
Laptop
checklist
11.0 BENCHMARKING OF ASSESSMENT CRITERIA
S/NO ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT
1.1. Communication at the place of work is
1.2 Business problems in an organization are identified properly
1.3 Computing mathematics skills are properly applied on solving business problems.
2.1 System design techniques is Properly applied in the analysis and designing or updating
a system
2.2 Computer maintenance Technology is properly applied in maintain the computer.
2.3 Analysis and design stages are properly applied ithe the database development process
2.4 Analysis and design stages are properly applied the the website development process
3.1 Concepts and principles of problem solving by computer are properly applied and the construction of appropriate algorithms for the solution of problems are utilized effectivelly.
3.2 Principles underlying the design of high level programming languages are demonstrated properly .
3.3 Students acquired
experience and confidence in the use of a high level programming language to implement algorithms.
4.1 computer network resource are properly connected and tested for effective operations
4.2 office automation software are installed and applied properly for effective operations
4.3 network and office automation software are properly utilized and maintained for effective operations in an organization
5.1 Elements of information and security are clearly understood and applied in assessing the need of security
5.2 Risk management strategies and plans are
properly applied in securing information
5.3 Cryptograpy methods and physical plan techniques are applied properly in protecting information
6.1 oncepts of project life cycle are properly established.
6.2 Feasibility study is properly done to gather the user requirements
6.3 Application System is designed, documented and a final report is produced and assessed properly.
12.0 MODULES DESCRIPTION
CODE: TCIT 511
NAME; COMMUNICATION SKILLS
NUMEBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
1.2.1 Apply basic writing skills
1.2.2 Apply principles and theories involving business correspondence
1.2.3 Apply employment communication
1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business
Presentations.
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Edition Royal Autralia college of general Practitioners.
2 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland.
3 Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh.
4 Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd.
5 Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 512
NAME; COMPUTING MATHEMATICS
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
1.11 Apply mathematical concepts calculation and preparation of databases
1.12 Solve basic problems relating to ICT using mathematical principles
TEACHING AIDS
Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit.
REFERENCES;
1 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA.2 Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer
verlag Berin Heideberg Germany,
3 Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1st Edition , AA
Dordrecht the Netherlands
4 Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd
Edition springer Verlag Berin Heideberg Germany,
5 Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 513
NAME; DATABASE SYSTEM DEVELOPMENT
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.3.1 Describe Databases and Transactions
2.3.2 DescribeData Models
2.3.3 Describe the Database Design
2.3.4 Describe the Relational Algebra and Calculus
2.3.5 Describe Constraints
2.3.6 Describe SQL
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2nd Ed,Cengage Learning,Canada
2 Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. 3 Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada.4 Rob P. et al (2009) Database systems design, implementation and management, 5th Edition
Cengage, Learning EMEA.5 Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 514
NAME; COMPUTER MAINTENANCE
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.4.1 Describe the Motherboard and its Components
2.4.2 Describe Storage Devices & its Interfacing
2.4.3 Describe Display Devices & Interfacing
2.4.4 Describe the Power Supplies of computers
2.4.5 Describe PC Diagnostic, Testing and Maintenance & Tools
2.4.6 Describe PC interfaces
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES
1 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc.
2 Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM
3 Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison Wesley, NJ.
4 Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. 5 Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.Butterworth-
Heinmann.UK
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 515
NAME; PROGRAMMING
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
3.1.4 Introduce Computer Programming concepts used in writing code
3.1.5 Describe the overview and Introduction to Java
3.1.6 Describe the Programming Fundamentals used in Java programs
3.2.4 Describe Java Control Structures used when writing a program
3.2.5 Work with the Java Class Library when conding programs
3.2.6 Describe Object-Oriented Programming
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts
2 Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4th Edition, D. C. Heath and company 125 spring street, Lexington M. A.
3 Oualline S. (2003) Practical C++ Programming 2nd Edition O’Reailly media Inc, 1005 Gravenstein Highway North , Sebastopol
4 Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German.
5 Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O’ Reilly media Inc, 1005 Gravenstein Highway North Sebastopol.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 521
NAME; ADVANCED OFFICE AUTOMATION
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
4.1.6 identify windows basics applications
4.1.7 use Ms Word to Explore office applications
4.1.8 use ExelExplore office applications
4.1.9 use power point Explore office applications
4.1.10xxxxxx addddddd
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK2 Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke
Publishing 980 East Circle Drive USA3 Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK4 Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins5 Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher
Education.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 522
NAME; WEB DESIGN
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.1.6 Start the Dreamweaver2.1.7 Develop a Web Page2.1.8 Work with Text and Graphics2.1.9 Work with Links2.1.10 Work with Tables
2.2.6 Start the Adobe Flash2.2.7 Draw Objects in Adobe Flash2.2.8 Work with Symbols and Interactivity2.2.9 Create Animations2.2.10 Create Special Effects
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.
REFERENCES;
1 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol.
2 Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York Institution of Technology at Utica/Rome.
3 Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition O’Relly media inc. 1005,Gravenstain Highway North, Sebastopoll.
4 Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology.
5 Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 523
NAME; NETWORKING
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
4.2.1 Describe Networking Fundamentalals4.2.2 Describe The OSI Model4.2.3 Describe the TCP/IP Fundamentals
4.2.4 Describe the TCP/IP Utilities
4.3.1 Describe the Network Operating Systems4.3.2 Describe Network Access and Security4.3.3 Describe Fault Tolerance and Disaster Recovery4.3.4 Describe Network Troubleshooting
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.
REFERENCES;
1 Barken L(2009) How secure is your wireless network your Wi-FLAN,2nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ
2 Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice –Hall of India, New Delh.3 Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada4 Mathew J. (2005) Computer Networks, Internet protocols in actionaddition5 Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 524
NAME; PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
5.1.1 Describe Elements of Information and Web Security5.1.2 describe Legal, Ethical, and Professional Issues in Information Security5.1.3 Describe The Need for Security in information computing
5.2.1 Describe Risk Management5.2.2 Describe Security Planning strategies5.2.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control
5.3.1 Describe Risk Management5.3.2 Describe Security Planning strategies5.3.3 Describe Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk
2 Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk.3 Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo .4 Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1st ed,Jones&Bartlett
Publishers,Massachussets.USA5 Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ
Prentice- Hall New Delh India.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE: TCIT 525
NAME; SYSTEM ANALYSIS AND DESIGN
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.5.1 Describe phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase
2.5.2 Determine System Requirements and Design Strategies
2.5.3 Structure systems requirements
TEACHING AIDS
Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit.
REFERENCES;
1 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA
2 Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London
3 MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland4 Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi.
5 Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%