Sei sulla pagina 1di 300

COLLEGE OF BUSINESS EDUCATION

ICT DEPARTMENT

CURRICULUM FOR LEVEL 4-8

2011

BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT)

NTA LEVEL 4

CURRICULUM INFORMATION REPORT FOR BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT) 1.0 BACKGROUND INFORMATION 2.0 MODULE CODING 3.0 GRADING SYSTEM 4.0 AWARDS 5.0 AWARDS CLASSIFICATION 6.0 SUMMARY FRAMEWORK 7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUE AND ASSESSMENT CRITERIA 8.0 PROGRAM STRUCTURE 9.0 NACTE STANDARDS AND RELATED OUTCOMES 10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS 11.0 BENCHMARKING OF ASSESSMENT CRITERIA 12.0 MODULES DESCRIPTION BTCIT 411 BTCIT 412 BTCIT 413 BTCIT 414 BTCIT 415 BTCIT 421 PC Fundamentals Introduction to Computer Networking Introduction to Communication Skills Basic Mathematics Office Automation Introduction to Programming 29 30 31 32 34 3 14 22 28 28 11 9 9 4 5 6 6 7 7

BTCIT 422 BTCIT 423 BTCIT 424 BTCIT 425

Introduction to Entrepreneurship Web Design Basics Introduction to Computer Maintenance Basic Database 38 39

36 37

1.0

BACKGROUND INFORMATION The philosophy behind the development of competence modular curricula is to comply with the Nations Vision and Mission, whic h require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.

Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.

The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.

The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization.

The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year. 5

The level has a minimum number of 120 credits as prescribed by NACTE

1.0

BACKGROUND INFORMATION The philosophy behind the development of competence modular curricula is to comply with the Nations Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.

Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.

The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.

The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization. 6

The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year.

The level has a minimum number of 120 credits as prescribed by NACTE 0

2.0

MODULE CODING The coding of modules follows logical sequence as in the following example for BTCIT 411

BTCIT

Stands for Basic Technician Certificate in Information Technology

The first digit for the NTA level, in this case Basic Certificate which is level Four.

The second digit stands for semester, i.e for semester one

The last digit stands for the order of the module in the semester. Module are arranged serially the highest number, depending upon the number for modules in the semester.

3.0

GRADING SYSTEM The grading of assessment results in conformity with the NACTE grading system as follows. NTA Level 4 Grade A B C F I Definition Excellence Good Average Failure Incomplete Score 80-100 65-79 50-64 0-49

4.0

AWARDS The awards shall be made to students who satisfy the following conditions. (a) Have completed modules for the award. (b) Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. (c) GPA shall be computed from cumulative scores earned by students using NACTE guideline.

5.0

AWARDS CLASSIFICATION: Awards Classification for NTA Level 4 Class of Award First Class Second Pass Cumulative GPA 3.5 to 4.0 3.0 to 3.4 2.0 to 2.9

6.0

SUMMARY FRAMEWORK 9

4.1 4.2

QUALIFICATION PURPOSE OF QUALIFICATION

BASIC TECHNICIAN CERTIFICATE IN ICT This qualification is intended for persons who will assist in performing routine operational activities with IT equipment and accessories: troubleshoot computer hardware and configure basis network; Install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers; under close supervision. Furthermore more they will assist IT users and solve their own day-to-day IT related challenges. 4 The holder of this qualification will assist in performing routine operational activities in IT troubleshoot computer hardware and configure basic network; install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers. 120 120 Form four with at least three passes including mathematics June 2011

4.3 4.4

NATIONAL TECHNICAL AWARD COMPETENCE LEVEL DESCRIPTOR

4.5 4.6 4.7 4.8

MINIMUM OVERALL CREDITS MINIMUM CREDIT AT THIS LEVEL MINIMUM ENTRY QUALIFICATIONS DATE OF DEVELOPMENT

10

7.0

PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA

S/N PLO 1

PRINCIPAL LEARNING OUTCOMES Trouble shoot computer hardware and configure basis network Install computer hardware and Software and maintain computers Design the web and implement relational database

CREDIT VALUES 24

ASSESSMENT CRITERIA 1.1 Computer hardware is properly trouble shot, and network properly configured. 2.1 Computer hardware and software are properly installed 2.2 Computers are properly maintained

PLO 2

12

PLO 3

24

3.1 The web is correctly designed 3.2 The web is clearly coded, evaluated and maintained 3.3 Relational database is properly implemented

PLO 4

Optimise Office Procedures

12

4.1 Ms word, excel are properly entered and formatted 4.2 Ms Power Point is properly applied

PLO 5

Prepare and test simple programs

12

5.1 Simple programs are properly prepared and tested by applying basic VB concepts. 6.1 Principles of communication are properly applied 6.2 Entrepreneurship principles are properly applied

PLO 6

Communicate efficiently and effectively at place of work and apply mathematical

36

Total credit

120

8.0

PROGRAM STRUCTURE SEMESTER I

11

S/N CODE 1. 2. 3. 4. 5. BTCIT 411 BTCIT 412 BTCIT 413 BTCIT 414 BTCIT 415

NAME OF MODULE PC Fundamentals Introduction to Computer Networking Introduction to Communication Basic Mathematics Office Automation

CREDITS 12 12 12 12 12 60

TOTAL CREDITS FOR NTA LEVEL 4 SEMESTER II

SEMESTER II S/N CODE 1. 2. 3. 4. 5. BTCIT 421 BTCIT 422 BTCIT 423 BTCIT 424 BTCIT 425 NAME OF MODULE Introduction to Programming Introduction to Entrepreneurship Web Design Basics Introduction to Computer Maintenance Basic Database CREDITS 12 12 12 12 12 60

TOTAL CREDITS FOR NTA LEVEL 4 SEMESTER II

12

9.0 NACTE STANDARDS AND RELATED OUTCOMES PRINCIPAL LEARNING ENABLING OUTCOMES OUTCOMES PLO 1 Troubleshoot computer hardware and configure basic network 1.1 Troubleshoot computer hardware

SUB-ENABLING OUTCOMES

1.1.1 Detect hardware faults 1.1.2 Correct and report faults

1.2 Configure basic network

1.2.1 Track network resources 1.2.2 Add hardware to existing network

PLO 2

Install computer hardware and software, and maintain computers

2.1 Install computer hardware

2.1.1 Identify different parts of hardware 2.1.2 Describe the functions of different parts of computer software 2.1.3 Connect various parts of computer hardware.

2.2 Install computer software

2.2.1 Describe different types of software 2.2.2 Install computer software

2.3 Maintain computers

2.3.1 Make back-ups 2.3.2 Clean hardware 2.3.3 Defragment files 2.3.4 Protect surging and viruses

PLO 3

Design the web, describe database concepts and implement the relational database design.

3.1 Describe the web

3.1.1 Describe the web and related basic terms 3.1.2 Identify the characteristics and parts of the web.

13

3.2 Identify basic concept of the web

3.2.1 Identify the requirements for design and contents of the web 3.2.2 Identify the classes and types of the web

3.3 Design the web

3.3.1 Plan and design the web 3.3.2 Code the web 3.3.3 Evaluate and maintain the web

3.4 Describe database concepts, Applications, data models, schemas and instances

3.4.1 Describe basic database concepts and applications 3.4.2 Describe data models and schemas

3.5 Describe storage organizations concepts and identify database languages and interfaces.

3.5.1 Describe storage organization concepts. 3.5.2 Identify database, languages and identify interfaces. 3.6.1 Implement relational database design 3.6.2 Implement data modelling using ER models 4.1.1 Describe word processing and a word processor 4.1.2 Start ms word 4.1.3 Enter and format text 4.2.1 Describe spread sheets 4.1.2 Start ms excel 4.3.3 Enter and format a spread sheet 14

3.6 Implement the relational database design and data

4.3.4 4.3.1 4.3.2 4.3.3 5.1.1 5.1.2 5.1.3 5.2.1 5.2.2 5.2.3 5.3.1 5.3.2 5.4.1 5.4.2 5.4.3 5.4.4 6.1.1 6.1.2 6.1.3 6.1.4 6.2.1 6.2.2 6.2.3 6.2.4 6.3.1 6.3.2

Apply formulae and functions Describe power point Start ms power point Enter and format slides Describe the structure of VB Apply basic concepts of VB Describe the code writing structures Identify various variables Identify constants Identify various data types Apply functions Apply sub-functions Describing objects Work with objects Create objects Relate objects to each other Apply communication concepts, processes and skills Take and make notes Make oral presentations Apply reading and writing skills Solve simple operations Work out ratios and conversion expressions Solve fractions and algebraic expressions Apply Business mathematics in real world Describe entrepreneurship Describe basic entrepreneurship issues

15

10.0

ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASK


RELATED TASKS ASSESS MENT CRITERIA ASSESSMENT METHODS ASSESSMENT INSTRUMENTS

SUB-ENABLING OUTCOME

1.1.1

Detect hardware faults

1.1.2

Correct and report hardware faults

1.2.1

Track network resources and add hardware to existing network Identify different parts of hardware

2.1.1

2.1.2

Describe the functions of different parts of computer hardware

2.1.3

Connect various parts of computer hardware

Describe hardware fault List possible sources of hardware faults Describe methods of detecting faults List different ways of correcting faults Describe contents of hardware fault Report hardware faults Describe network resources List network resources Add required hardware to the network Identify different parts of hardware Describe input devices Describe the CPU Describe Output devices Describe External storage devices Describe Communication devices List functions of Input devices List functions of the CPU List functions of External storage devices List functions of Communication devices Identify various parts of hardware Connect together power supply, CPU, screen, keyboard and mouse Test the system

Hardware faults are correctly detected

Class assignments and exercises

Questions and solutions

Faults are correctly corrected and reported

Class assignments and exercises

Questions and solutions

Network resources are correctly described

Class assignments and exercises

Questions and solutions

Different parts of hardware are clearly identified

Class assignments and exercises

Questions and solutions

The functions of different parts of computer hardware are clearly described Various parts computer hardware are correctly connected

Class assignments and exercises

Questions and solutions

Class assignments and exercises.

Questions and solutions

16

17

2.2.1

Describe different type of software

2.2.2

Install computer software

2.3.1

Make back-ups

Describe software Describe system software Describe application software Identify major classes of application software Explain advantages and disadvantages of the two types of application software. Explain the preconditions of installing software Installs software Customize software installation package Configure software restrictions Enforce properties Identify reasons for making back-ups Identify what is to be backed up Explain storage media to be applied Describe back methods (Manual versus Automatic)

Different types of software are clearly described

Class assignments and exercises

Questions and solutions

Computer software is properly installed

Class assignments and exercises

Questions and solutions

Back-up are properly made

Class assignments and exercises

Questions and solutions

2.3.2

Clean hardware

2.3.3

Defragment files

Identify various hardware that need cleaning Identify tools needed for hardware cleaning Clean mouse Clean keyboard Clean Screen Describe Fragment and Defragmentation Identify types of causes of fragmentation Preventing and eliminating

Hardware are properly cleaned

Class assignments and exercises

Questions and solutions

Files are correctly defragmented

Class assignments and exercises

Questions and solutions

18

fragmentation

2.3.4 Protect surging and viruses

3.1.1 Describe the web and related basis terms 3.1.2 Identify the characteristics and parts of the web 3.2.1 Identify requirement for design and contents of the web 3.2.2 Identify the classes and types of the web

3.3.1 Plan and design the web

3.3.2 Code the web

3.3.3 Evaluate and maintain the web 3.4.1 Apply Database concepts

Describe surging Protect surging Describe viruses Protect viruses Describe we List types of the web Describe the web terms Identify the characteristics of the web Identify the parts of the web Describe the contents of the web page Identify the requirement for design List contents of the web Describe the contents of the web page Describe the class of the web site Describe the types of the web site Identify the restrictions in web design Plan the web Design the web Review the design web Code the web program Test the web Review the web Evaluate the web Monitor the web Maintain the web Describe Management Information System

Surging viruses are securely protected

Class assignments and exercises

Questions and solutions

The web and related basic terms are clearly described The characteristics and parts of the web are clearly identified Requirement for the design and contents of the web are clearly identified The classes and types of the web are clearly described.

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

Class assignments and exercises

Questions and solutions

Class assignments and exercises

Questions and solutions

The web properly planned and designed The web is correctly coded

Class assignments and exercises Class assignments and exercises Class assignments and exercises Class assignments

Questions and solutions Questions and solutions. Questions and solutions Questions and 19

The web is properly evaluated and maintained Database concepts and applications are correctly

and application 3.4.2 Apply data models and schemas

Identify the advantages of Management Information System List data models Describe data models Describe schemas

applied Data models and data schemas are correctly described

and exercises Class assignments and exercises

solutions Questions and solutions.

3.5.1 Apply and implement storage organisation concept 3.5.2 Identify database language and interfaces

Describe data flow diagrams Implement data storage structure Evaluated storage structures Identify database language and interfaces Describe database language Describe the interfaces Describe the design process Identify the steps of the database design process Describe the steps of the design process Describe Entity Relationship Describe attributes Implement Relationships Describe the word processor Describe word processing Identify the features of a word processor Start Ms word Load documents Close Ms word

Data storage organisation concepts are properly applied Database language and interfaces are clearly identified Relational database is properly designed

Class assignments and exercises

Questions and solutions.

Class assignments and exercises

Questions and solutions.

3.6.1 Implement relational database design

Class assignments and exercises

Questions and solutions.

3.6.2 Implement data modelling using ER models 4.1.1 Describe word processing and a word processor

Data modelling is properly implemented using ER model Word processing and processor are clearly described Ms word is properly started

Class assignments and exercises

Questions and solutions.

Class assignments and exercises

Questions and solutions.

4.1.2 Start ms word

Class assignments and exercises

Questions and solutions. 20

4.1.3 Enter and format text

4.2.1 Describe Ms excel

4.2.2 Start ms excel

Enter text Format text Save the document Describe a spread sheet List the features of a speared sheet List advantages of excel Start Ms Excel Load Ms excel documents Close the spread sheet

Text is properly entered and formatted Ms excel is clearly described Ms excel is properly started

Class assignments and exercises Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions Questions and solutions

4.2.3 Enter and format a spread sheet 4.2.4 Apply formulae, and function 4.3.1 Describe power point

4.3.2 Start ms power point

4.3.3 Enter and format slides

5.1.1 Describe the structure of VB

Enter data Format the spread sheet Save the spread sheet Apply formulae Apply functions Apply charts Describe power point Identify various aspects of power point Exit Ms Power Point Start Ms power point Load power point documents List advantages of Power point Enter slides Add and delete slides Format slides Explain basic of VB List basic terminologies of VB Explain basic terminologies in VB

Ms excel is properly entered and formatted Formulae and functions are properly applied Ms Power point is clearly described

Class assignments and exercises Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions Questions and solutions

Ms Power point is properly started. Slides are properly entered and formatted The structure of VB is clearly described

Class assignments and exercises Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions Questions and solutions.

21

5.1.2 Apply basic concepts of VB

5.1.3 Describe the code writing structures

5.2.1 Identify various variables

Identify the structure of VB Star VB Configure environment options Identify code modules Apply the code editor Apply decision structures (If Then, If.Then Else, Select Case) Apply Loop structures (Do Loop Apply Loop structure (ForNext, For each ..Next) Identify various variables Describe various variables Apply various variables

Basic concepts of VB are properly applied

Class assignments and exercises

Questions and solutions.

The code writing structures are clearly described

Class assignments and exercises

Questions and solutions

Various variables are clearly identified

Class assignments and exercises

Questions and solutions

5.2.2

Identify constants

5.2.3

Identify various data types Apply functions

5.3.1

5.3.2

Apply sub-functions

5.4.1

Describe objects

Identify various constants Describe various constants Apply various constants Identify data types Describe various data types Apply various data types Describe a function Create a sub-function Passing data to a function Describe a sub-function Create a sub-function Passing data to a sub-function Describe objects Identify the source of Objects Differentiate between Objects and Classes

Constants are clearly identified Various data types are clearly identified Functions are properly applied Sub-function are properly applied Objects are clearly described

Class assignments and exercises Class assignments and exercises Class assignments and exercises Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions Questions and solutions Questions and solutions Questions and solutions

22

5.4.2

Work with objects

5.4.3

Create objects

5.4.4

Relate objects to each other Apply communication concepts, process and skills Take and make notes

6.1.1

Controlling Objects with their Properties Setting property values Apply Methods in Codes Apply object variables Declare object variables Assign object variables List types of objects Apply forms as objects Pass objects to procedures Describe Object Hierarchies Use a collection of Objects Make Objects communicate Identify correct tenses Write grammatical correct sentences Identify the voices (passive/active) Write simple sentences Copy different passages Summarise simple passages Read passage Respond to questions and answers verbally Makes short presentations

Objects are properly worked with

Class assignments and exercises

Questions and solutions

Objects are properly created

Class assignments and exercises

Questions and solutions

Objects are properly related to each other Communication concepts, process and skills are properly applied Notes are properly taken and made Oral presentations are properly made

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

6.1.2

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

6.1.3

Make oral presentations

6.1.4

6.2.1

Apply reading and writing Read selected passages Write letters skills Prepare e-mails Solve simple operations Perform fundamental arithmetic operations Calculate fractions and mixed numbers Calculate percentages

Reading and writing skills are properly applied Simple operations are correctly solved

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

23

6.2.2

Work out ratio and conversion problems Solve fractions and algebraic expressions

6.2.3

6.2.4

Apply business mathematics in real world problems Describe entrepreneurship Describe basic entrepreneurship issues

6.3.1

6.3.2

6.3.3

Describe the role of entrepreneurship in Tanzania

6.3.4

Run and operate a micro business Describe risks rewards and key personal entrepreneurship competences

6.3.5

Calculate ratios Calculate proportions Calculate unit analysis Calculate fractions Calculate algebraic expressions Apply fractions and algebraic expressions to business problems Apply business maths in calculating partnership profits Apply business mathematics in calculating discount, commission simple or compound interest Describe entrepreneurship Describe enterprise Describe an entrepreneur Describe entrepreneurial traits Describe entrepreneurial attitudes Describe entrepreneurial characteristics Identify the roles of entrepreneurship in Tanzania Identify the importance of entrepreneurship. Identify problems facing entrepreneurship Start a micro business Run a micro business Evaluate the micro business Identify entrepreneurship risks Identify entrepreneurship rewards Identify key personal competencies

Ratios and conversions are accurately worked out Fractions and algebraic expressions are correctly solved Business mathematics is properly applied in real world problems Entrepreneurship is clearly described Basic entrepreneurship issues are clearly described

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

Class assignments and exercises

Questions and solutions

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

The role entrepreneurship Tanzania is clearly described

Class assignments and exercises

Questions and solutions

Micro business is properly run and operated Risks, rewards and key personnel entrepreneurship competencies are clearly described

Class assignments and exercises Class assignments and exercises

Questions and solutions Questions and solutions

24

25

11.0 NO. 1.1.1

BENCHMARKING OF ASSESSMENT CRITERIA ASSESSMENT CRITERIA SATISFACTORY Hardware faults are correctly detected Describes hardware faults

GOOD Describe hardware faults and lists possible sources of hardware faults

EXCELLENT Describe hardware faults, lists possible sources of hardware faults and describes methods of detecting faults.

1.1.2

Faults are correctly corrected and reported

Lists different ways of correcting faults

List different ways of correcting List different ways of correcting faults and describes hardware faults, describe hardware faults faults and reports hardware faults Describes and lists network resources Describe, list network resources and adds required hardware to the network Identifies different parts of hardware, the CPU, input devices and output device external storage and communication devices. List functions of input devices, the CPU, Output devices, external storage units and the communication devices Identify various parts of hardware application software and explains advantages and disadvantages of application software.

1.2.1

Network resources are correctly tracked

Describes network resources

2.1.1

Different parts of hardware are clearly identified

Identifies different parts of hardware

Identifies different parts of hardware, describes the CPU, Input devices and output devices List functions of input devices, the CPU and output devices

2.1.2

The functions of different parts of computer hardware are clearly described

List functions of input devices and the CPU

2.1.3

Various parts of computer hardware are correctly connected

Identifies various parts of hardware

Identifies various parts of hardware and connects together hardware parts

26

2.2.1

Different types of software are clearly described

Describes Software and system software

Describes Software and System software and applications software

Describes software, system software, application software and explains advantages and disadvantages of application software Explains preconditions of installing software, installs software, customises software installations, configures software restrictions and enforces properties Identifies reasons for making backups, explains storage media to be applied and describe back up methods Identifies hardware to be cleaned and tools to be used and cleans all hardware parts. Describes, fragmentation and defragmentation and identifies types and causes of fragmentation, and prevents and eliminates fragmentation Describes, protects surging and describes viruses and protects viruses. Describes the web, parts of the web and describes characteristics 27

2.2.2

Computer software is properly installed

Explains preconditions of installing software and installs software

Explains preconditions of installing software installs software, customise software installations, and configure software restrictions Identifies reasons for making back-ups and explains storage media to be applied

2.3.1

Back-up are properly made

Identifies reasons for making back-ups

2.3.2

Hardware are properly cleaned

Identifies hardware to be cleaned

Identifies hardware to be cleaned and tools to be used

2.3.3

Files are correctly defragmented

Describes fragmentation and defragmentation

Described fragmentation and defragmentation and identifies types and causes of fragmentation

2.3.4

Surging and viruses are securely protected

Describe and protects surging

Describes, protects surging and describes viruses

3.1.1

The web and related basic

Describe the web

Describe the web and lists

terms are clearly described 3.1.2 Characteristics and parts of the web are clearly identified and described. Identifies characteristics of the web

types of the web. Identifies characteristics of the web and parts of the web

of the web Identifies characteristics of the web, parts of the web and describes characteristics of the web. Identifies requirement for design and lists contents of the web page and describes identifies requirements for the design and lists contents of the web page. Describes classes of the wed, types of the web and identifies the restrictions of the web design. Plans and design the web and reviews the designed web. Codes, tests the web and reviews the web Evaluates, monitors the web and maintains the web. Describe database, Management Information System and identifies advantages of a Management Information System Lists Data models, describes data models and describes schemas 28

3.2.1

Requirements for the design and contents of the web are Clearly listed

Identifies requirements for the design

Identifies requirements for the design and lists contents of the web page

3.2.2

Classes and types of the wed are clearly described

Describes classes of the wed

Describes classes of the wed and types of the web

3.3.1

The web is properly planned and designed The web is correctly coded

Plans the web

Plans and design the web

3.3.2

Codes the web

Codes the web and tests the web Evaluates and monitors the web Describes database, Management Information System

3.3.3

The web properly evaluated and maintained Apply Database concepts and applications

Evaluates the web

3.4.1

Describes database

3.4.2

Apply data models and schemas

List Data models

Lists Data models and describes data models

3.5.1

Apply and implement storage organisation concepts.

Describes Data flow diagrams properly

Describes Data flow diagrams and implements data storage structures properly. Identifies database language and interfaces and describes database languages Describes the design process and identifies the steps of the database design process

Describes Data flow diagrams, implements and evaluate data storage structures properly. Identifies database language and interfaces, and describes database languages and interfaces. Describe the design process, identifies steps of the design process describes the steps of the design process properly. Describes entity relationship, attributes and implements relationship properly. Describe Word processing and word processor and identifies features of a word processor. Starts, load and exists Ms word

3.5.2

Identify database languages and interfaces

Identifies database language and interfaces

3.6.1

Implement relational database design

Describes the design process

3.6.2

Implement data modelling using ER models

Describes entity relationship properly

Describes entity relationship and attributes properly

4.1.1

Word processing and processor clearly

Describes Word processing

Describes Word processing and word processor

4.1.2

Ms word is properly started

Starts Ms word

Starts and loads Ms word documents Enters and formats text

4.1.3

Text is entered and formatted

Enters text

Enters and formats text and save Ms word documents. Describes, lists features and advantages of excel Starts, loads Ms excel documents and exists Ms excel.

4.2.1

Ms excel is clearly described

Describes Ms Excel

Describes and lists features of Ms excel Starts Ms excel and loads Ms excel documents

4.2.2

Ms excel is properly started

Starts Ms excel

29

4.2.3

A spread sheet is properly entered and formatted Formulae and functions are properly applied Ms Power point is clearly described

Enters data into Ms excel

Enters and formats data

Enters and formats data and save Ms excel documents. Applies formulae, functions and charts. Describe Ms power point, identifies various aspects of power point and exits power point. Starts Ms Power point, loads Ms power point and lists advantages of power point Enters, add and deletes and formats slides Explains the basics of VB, lists and explain terminologies of VB Identifies basic concepts of VB, start configure environment options of VB, identifies code modules, and applies the code editor. Applies the code writing structures (Ifthen, IfthenElse, Select case) and loop structures (DoLoop, ForNext, For eachNext). Identifies, describes and applies 30

4.2.4

Applies formulae

Applies formulae and functions

4.3.1

Describes Ms power point

Describes Ms power point and identifies various aspects of power point. Starts Ms Power point, loads Ms power point

4.3.2

Ms Power point is properly started

Starts Ms Power point is

4.3.3

Slides are properly entered and formatted The structure of VB is clearly described Basic concepts of VB are properly applied

Enters slides

Enters, add and deletes slides

5.1.1

Explains the basics of VB

Explains the basics of VB and lists terminologies of VB Identifies basic concepts of VB, start and configure environment options of VB

5.1.2

Identifies basic concepts of VB

5.1.3

The code writing structures are clearly applied

Applies the code writing structures (If then, IfThenElse, Select case)

Applies the code writing structures (If then, IfThen Else, Select case) and loop structure (Do Loop)

5.2.1

Various variables are clearly

Identifies various variables

Identifies and describes various

identified 5.2.2 Constants are clearly identified Identifies constants

variables Identifies and describes constants Identifies and describes various data types correctly Describes and creates functions correctly Describes and creates Subfunctions correctly Describes Objects and identifies sources of objects clearly

various variables. Identifies, describes and applies constant Identifies, describes and applies various data types correctly. Describes, creates and passes data to Sub-functions correctly. Describes, creates and passes data to Sub-functions correctly. Describes Objects, identifies sources of objects and differentiates objects and classes clearly. Controls objects and their properties properly and sets properly and values and applies methods in codes. Applies objects variables, declares object variables, lists types of objects, apply forms as objects and passes objects to procedures correctly. Describes objects hierarchies correctly, uses a collection of objects and makes objects 31

5.2.3

Various data types are clearly identified Functions are properly applied

Identifies various data types

5.3.1

Describes functions correctly

5.3.2

Sub-functions are properly applied Objects are clearly described

Describes functions correctly

5.4.1

Described Objects clearly

5.4.2

Objects are properly worked with

Controls objects and their properties properly

Controls objects and their properties properly, and sets property values

5.4.3

Objects are properly created

Applies objects variables and declares object variables

Applies objects variables and declares object variables and lists types of objects correctly

5.4.4

Objects are properly related to each other

Describes objects hierarchies correctly

Describes objects hierarchies correctly and uses a collection of objects correctly

communicate correctly 6.1.1 Communication concepts, processes and skills are properly applied Identifies correct tenses Identifies correct tenses and writes correct grammatical sentences Identifies, correct tenses and writes correct grammatical sentences and identifies voices (passive/active) Writes simple sentences correctly, copies different passage and summarises simple passages. Reads passages correctly, responds to questions and answers orally, and makes short presentations correctly. Reads selected passages, writes letters and prepares e-mails correctly. Performs fundamental arithmetic operations, calculates fractions and mixed numbers correctly and calculates percentages. Calculates ratio, proportions and unit analysis correctly

6.1.2

Notes is properly taken and made

Writes simple sentences correctly

Writes simple sentences correctly and copies different passages Reads passages correctly and responds to questions and answers orally

6.1.3

Oral presentations are properly made

Reads passages correctly

6.1.4

Reading and writing skills are properly applied

Reads selected passages correctly

Reads selected passages and writes letters correctly

6.2.1

Simple operations are correctly solved

Performs fundamental arithmetic operations

Performs fundamental arithmetic operations and calculates fractions and mixed numbers correctly Calculates ratios and proportions correctly

6.2.2. Ratios and conversions and problems are accurately worked out 6.2.3 Fractions and algebraic expressions are correctly solved

Calculate ratios correctly

Calculates fractions correctly

Calculates fractions and algebraic expressions correctly

Calculates fractions and algebraic expressions and applies functions and algebraic expressions to business problems correctly. 32

6.2.4

Business mathematics is properly applied in real world problems

Calculates business profits correctly

Calculates business profits and applies ratios in calculating partnership profits correctly

Calculates fractions and algebraic expressions and applies ratios in calculating partnership profits, discounts, commission and simple/compound inters correctly. Describe entrepreneur, enterprise and entrepreneurship correctly. Describe entrepreneurship traits and attitudes correctly and describe entrepreneurial characteristics. Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship and identifies the problems facing entrepreneurship Start, run and evaluates a micro business Identifies entrepreneurship risks, reward and key personal competencies correctly.

6.3.1

Entrepreneurship is clearly described Basic entrepreneurship issues are clearly described

Describe entrepreneur correctly Describe entrepreneurship traits correctly

Describe entrepreneur and enterprise correctly Describe entrepreneurship traits and attitudes correctly

6.3.2

6.3.3

The role of entrepreneurship in Tanzania is clearly described

Describes the roles of entrepreneurship in Tanzania

Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship

6.3.4

Micro business is properly run and operated Risks, rewards and key personnel entrepreneurship competencies are clearly described

Starts a micro business

Starts and run a micro business

6.3.5

Identifies entrepreneurship risks.

Identifies entrepreneurship risks and rewards correctly.

33

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 412 Introduction to Computer Networking 12

TEACHING AIDS METHODS OF INSTRUCTION

: :

1.2.1 Track network resources 1.2.2 Add hardware to existing network Chalk board, flip chart stand, overhead projectors and computer This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES 1. 2. 3. 4. 5. Christo J.P. Moschovitis, History of the Internet: a chronology, 2009, Prentice Hall Michael A. Banks, On the way to the web. 2008, A press Plattner B, Computer Networks, 2008, Prentice Hall Stallings W, Wireless Communication and Networks, 2008, Prentice Hall Tanenbaum A.S, Computer Networks, 2005, Prentice Hall

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%

34

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 413 Introduction to Communication Skills 12

6.1.1. 6.1.2. 6.1.3. 6.1.4.

Apply communication concepts, processes and skills Take and make notes Make oral presentations Apply reading and writing skills work

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES 1. Davis M, Communication Skills, 2008, New Herbinger Publications, USA 2. James C, Mc Coskey, Richmond P, An Introduction to Communication in the classroom: the role of the communication in Teaching and Training, 2008, Alley and Baco. 3. Mahundu C M A, A Manual on Communication Skills Toward improving Communication Skills in English Language, 2008, Benedict Fathers, Ndanda, Tanzania. 4. Pual P and Korthali J S, Essentials of Business Communication, 2009, Sultan Chand and Sons 5. Shumbusho, Mwaijande, Business Communication Skills Hand book, 2003, Mzumbe University.

INTEGRATED METHOD OF ASSESSMENT 35

Continuous assessment End of semester examination

40% 60%

36

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 414 Basic Mathematics 12

6.2.1 6.2.2 6.2.3 6.2.4

Solve simple operations Work out ratios and conversion problems Solve fractions and algebraic expressions Apply Business mathematics in real world

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES 1. 2. 3. 4. 5. Haemstock, H, Elements of Business Mathematics, 2008, Harrp Hughe, R J and Richard, D, Business Maths Essentials, 2008, Irwin Inc Mc Keague, C P, Pre Algebra, 2009, Brooke Cole Publishing Company Streete, R J, Basic Mathematics Skills with Geometry, 2007, McGraw Hill Willace, M, Pills, C, Mathematics for Business, 2008, Gage Education Publish Ltd.

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60% 37

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 415 office Automation 12

4.1.1 4.1.2 4.1.3 4.2.1 4.2.2 4.2.3 4.2.4 4.3.1 4.3.2 4.3.3

Describe word processing and a word processor Start Ms word Enter and format text Describe spread sheets Start Ms excel Enter and format a spread sheet Apply formulae and functions Describe power point Start Ms power point Enter and format slides

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Birton P, Introduction to Computers, 2009 2. Cox J. Lambert J, Frye C, Microsoft Office Professional 2010 Step, 2010, Microsoft press 3. Doyle S, Understanding information and Communication technology, 2009, Delta Place Thornes 4. McManus S, Microsoft Office for the Older and Wiser: GetUp and Run with Office 2010, 2010 John Wiley. 5. Shelly/Cashman/Vermaat, Introduction, Concepts and Techniques, 2008, Microsoft Office 38

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 422 Introduction to Entrepreneurship 12

6.3.1 6.3.2 6.3.3 6.3.4 6.3.5 6.2.4

Describe entrepreneurship Describe basic entrepreneurship Describe the role of entrepreneurship Tanzania Start and run micro business Describe risk, rewards and key personal entrepreneurship competencies Apply Business mathematics in real world

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Backet M, Small Business-Guide to starting your Business, 2008, Macmillan 39

2. 3. 4. 5.

Burns P, Entrepreneurship and small Business, 2009, Palgrave Owen J, How to Sell, 2011, Prentice Hall Robson C, Confession of an Entrepreneur, 2010, Prentice Hall William S, Financial Times Guide to Business Plan Start up, 2011, Prentice Hall

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 423 Web design Basics 12

40

3.1.1 3.1.2 3.2.1 3.2.2 3.3.1 3.3.2 3.3.3

Describe the web and related basic terms Identify the characteristics and parts of the web Identify the requirements for design and contents of the web Identify the classes and types of the web Plan and design the web Code the web Evaluate and maintain the web

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Fisel C, Freelance Design in Practice, 2009, Wiley 2. Hardy J A, Carneiro C Jr, Beginning Rails 2: Freom Novice to Professionals, 2009, Wioley 3. Marks T, Good Design: Deconstruction Form and What Makes Design Work, 2009 Wiley 4. Toague J C, Speaking in Styles: Fundamentals of CSS foe Web Designers, 2009, Wiley 5. Wiedemann J, Web Design Navigation, 2009, Wiley

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%

41

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 424 Introduction to Computer Maintenance 12

2.3.1 2.3.2 2.3.3 2.3.4

Make back-ups Clean hardware Defragment files Protect surging and viruses

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Ballew J, Computer problems solved for the over 50s in Simple Steps, 2011, HP Indigo Digital Press 2. 3. 4. 5. Ballew J, Computer Basics, 2010, HP Indigo Digital Press Beales R P, PC Systems, Installation and Maintenance, 2020, Prentice Hall Johnson S, Brilliant Office 2010, 2010, Prentice Hall Resonthan J, PC Repair and Maintenance, 2010, Media Publications

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60% 42

CODE NAME NUMBER OF CREDITS SUB-ENABLING OUTCOMES

: : :

BTCIT 425 Basic Database 12

7.1.1 7.1.2 7.2.1 7.2.2 7.3.1 7.3.2

Describe basic database concepts and applications Describe data models and schemas Describe storage organisation concepts Identify database languages and interfaces Implement relational database design Implement data modelling using ER models

TEACHING AIDS

Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION

This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Desai B P, An Introduction to Database Systems, 2008, West Publication Company 2. Group I, Introduction to Database management System, 2008, McGraw Hill 3. Henry F, Silberschatz, Database system Concepts, 2009, McGraw Hill 4. IT Education Solutions Limited, Introduction to Database Systems, Pearson Education India 5. Ullman J D, Principles of Database and knowledge Base Systems, 2009, Computer Systems Press

43

INTEGRATED METHOD OF ASSESSMENT Continuous assessment End of semester examination 40% 60%

44

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

1.0 BACKGROUND INFORMATION The philosophy behind the development of competent modular curricular is to comply with the Nations Vision and mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs. Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are the problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills. The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that given Appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. maintain computers, process files, manage computer networks, apply mathematics in solving computer problems, develop website, develop database. etc). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 5 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization. The qualification comprises of a number of modules, each module will be covered in one semester. For this course, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each semester and accounts for 34 weeks for a year. This qualification has 120 credits which is the minimum prescribed by NACTE. 45

2.0

MODULE CODING

The coding of modules follows logical sequence as in the following example for TCIT 511.

TCIT

Stands for Technician Certificate in Information Technology

The first digit stands for the NTA level, in this case Technician Certificate which is level five.

The second digit stands for semester, i.e. for semester one.

The last digit stands for the order of the module in the semester. Modules are arranged serially

from 1 to the highest number, upon the number of modules in the semester

46

3.0

GRADING OF ASSESSMENT RESULTS

The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 5

Grade A B C D F I

Definition Excellent Good Average Poor Failure Incomplete

Score 80 100 65 79 50 64 40 49 00 39

4.0

AWARDS

The award shall be made to students who satisfy the following conditions. Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines. 47

5.0

AWARDS CLASSIFICATION: Awards Classification for NTA level 5 Class of Awards First Class Second Class Pass Cumulative GPA 3.5 to 4.0 3.0 to 3.4 2.0 to 2.9

48

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY. 6.0 SUMMARY FRAMEWORK QUALIFICATION TECHNICIAN TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine activities: develop database systems, design and analyze systems, prepare simple computer programs, connect peripherals, ports and network hardware CERTIFICATE IN INFORMATION & COMMUNICATION

communication systems, and apply office automation software, under less supervision. NTA LEVEL COMPETENCE LEVEL DESCRIPTOR 5 The holder of the qualification will apply skills and knowledge in a range of ICT activities some of which are non-routine of developing database systems, designing and analyzing systems, preparing simple computer programs, connecting

peripherals, ports and network hardware communication systems, applying office automation software, and assuming some operational responsibilities. CREDITS AT THIS LEVEL CUMULATIVE CREDITS AT THIS LEVEL MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL 120 0

0 49

DATE THE QUALIFICATION STANDARD LAST REVIEWED

New

ENTRANCE REQUIREMENTS

BTCIT level 4, or Form six with one principal pass either in mathematics or physics.

50

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 7.0 S/N PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA PRINCIPAL LEARNING OUTCOMES CREDIT VALUES 1.1. 24 1.2 ASSESSMENT CRITERIA

PLO 1

Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems. Apply system design and maintenance technology in database system development, web design, and analysis and design.

Communication at the place of work is effectively done. Computing mathematics skills are properly applied on solving business problems. System design technology is Properly applied.

POL 2

2.1

48

2.2

Computer maintenance Technology is properly applied.

2.3

Database system development is properly applied

2.4 PLO 3 Prepare simple computer programmes using programming languages Connect peripherals and ports to computer network hardware communication system and apply office 12 3.1

Web is properly designed. Simple computer programs are properly prepared using computer languages.

PLO 4

4.1 Computer peripherals and ports are correctly connected to the network hardware communication system. 51

automation software.

24

4.2

Office automation software is properly applied. Computer professional ethical security principles are properly applied. Knowledge, skills and techniques of all modules learned in the course are properly applied in a real life situation.

PLO 5

Apply professional ethical security principles in computer use. Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.

5.1 12 6.1 -

PLO 6

120

52

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 8.0 PROGRAM STRUCRTURE SEMESTER I S/NO 1 2 3 4 5 CODE TCIT 511 TCIT 512 TCIT 513 TCIT 514 TCIT 515 NAME OF MODULE Communication Skills Computing Mathematics Database System Development Computer Maintenance Programming TOTAL CREDITS SEMESTER I SEMESTER II 1 2 3 4 5 6 TCIT 521 TCIT 522 TCIT 523 TCIT 524 TCIT 525 TCIT 526 Advanced Office Automation Web Design Networking Professional Ethics and Security in Computer use System Analysis and Design Practical Project TOTAL CREDITS SEMESTER II GRAND TOTAL CREDITS FOR NTA LEVEL 5 12 12 12 12 12 -60 120 CREDITS 12 12 12 12 12 60

53

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES : PRINCIPAL OUTCOMES 1. Communicate effectively ENABLING OUTCOMES 1.1 Apply mathematical Concepts in ICT. 1.1.2 SUB-ENABLING OUTCOMES 1.1.1 Apply mathematical concepts in calculation and preparation of database Solve basic problems relating to ICT using mathematical principles

and efficiently at the place of work and apply Computing mathematics skills in solving business problems.

1.2

Apply basic communication skills.

1.2.1 1.2.2

Apply basic writing skills. Apply principles and theories involving business correspondences.

1.2.3 1.2.4

Apply employment communication. Prepare simple research proposal and write effective memos, paper presentations and other business presentations.

54

2.

Apply system design

2.1

Detect and correct Computer faults.

2.1.1 2.1.2 2.1.3

Identify conditions of faults. Correct computer faults Analyze the conditions of computer systems.

and maintenance technology in database system development, web design, and system analysis and design 2.2

Improve image and other features in the website.

2.2.1 2.2.2

Diagnose problems Design web site that is easy and effective to use.

2.2.3 2.3 Prepare database systems,

Maintain a website.

2.3.1 Design data models 2.3.2 Install and test database system 2.3.3 Update existing database.

2.4 Collect information, analyze and evaluate existing system.

2.4.1 Prepare system models 2.4.2 Document system problems and resolution for future reference.

55

3.

Prepare simple computer programs using programming languages

3.1.

Prepare new application programs from beginning to end.

3.1.1 Create

codes

that

meet

system

standards. 3.1.2 3.1.3 Maintain system application Innovate techniques. data visualization

4.

Connect peripherals and ports to

4.1

Apply software for database and office automation

4.1.1 4.1.2 4.1.3

Describe types of computer software Apply file processes Apply data traffic flow and

computer hardware

network

coordination 4.1.4 apply Apply communication equipment and systems communication channels

communication system office software 4.2 Build simple network. and

automation

4.2.1

Identify tools for building network

4.2.2 Connect workstation 4.2.3 Configure network 4.2.4 Test communication between workstations 4.3. Create queries and generate simple reports 4.3.1 4.3.2 4.3.3 4.3.4 Work with queries in database Create queries in design view Prepare simple reports Save and print simple reports 56

4.4

Administer user Accounts

4.4.1 Maintain user accounts 4.4.2 Delete/Update user accounts 4.4.3 Assign access right (e.g. Guest, Administrator, Students)

5.

Apply professional ethical and security principles in computer use.

5.1.

Maintain computer systems

5.1.1

Explain computer crime (e.g. Hacking, cracking)

5.1.2

Solve computer virus problems.

5.1.3. Update/Install antivirus packages 5.1.4 Apply authentication methodologies in Computer use. 5.2 Apply computer ethical principles. 5.2.2 5.2.1 Maintain access right in computer use. Maintain accuracy 5.2.3 Detect/prevent (e.g. intruders) 6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation. 6.1 Maintain computer network systems 6.1.1 Connect, Configure, run networked computers. 6.1.2 Analyze network systems 57 unauthorized users. information privacy and

6.2 Make operational Services

6.2.1 Maintain computer hardware 6.2.2 Connect computer hardware 6.2.3 Update computer software (e.g.

operating systems) 6.2.4 Manage computer networking 6.3 Analyze computer system communication 6.3.1 Communicate effectively with organizational Stakeholders (e.g. INTRANET and EXTRANET) 6.3.2. Apply computing mathematics in

solving computer problems

58

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY

10.0

ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS

SUB-ENABLING OUTCOMES

RELATED TASK

ASSESSMENT CRITERIA Mathematical concepts in calculation and preparation of database are properly applied

ASSESSMENT METHODS Discussion Presentation Tests and Quiz Assignment

ASSESSMENT INSTRUMENTS Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

1.1.1

Apply mathematical concepts in calculation and preparation of database.

1.1.2

Solve basic problems relating to ICT using mathematical principles

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems). Explain sets and relations. Explain basic number theoretical functions.(e.g the MODE function, GCD, and LCM) Evaluate basic counting techniques and discrete probability Explain important

Basic problems relating to ICT are accurately solved using mathematical

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop 59

1.2.1

Apply basic writing skills

algorithms of graph theory. Explain Boolean logic and techniques of mathematical proofs. Apply grammar Construct sentences Write small texts

principles

checklist

Basic writing skills are properly applied

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

1.2.2

Apply principles and theories involving business correspondence

Write business letters Write E-mail Write simple reports Write sales letters

Principles and theories involving business correspondence are appropriately applied

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

1.2.3

Apply employment communication

1.2.4

Prepare simple research proposal and write effective

Write employment application letters Write CVs Participate in employment interviews Search for jobs Prepare simple research proposal

Employment communication is properly applied

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Simple research proposal and

Discussion Presentation

Whiteboard Markerpen 60

memos, paper presentations and other business presentations.

Write effective memos Prepare paper and other business presentations Define faults Mention condition of faults Identify different types of faults

effective memos, paper presentation and other business presentations are properly prepared Conditions of faults are correctly identified

Tests and Quiz Assignment

Blackboard Chalk Projector Laptop checklist

2.1.1

Identify conditions of faults

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector 61

2.1.2

Correct computer faults

Mention types of instrument used Explain steps of correcting faults Fix the faults

computer faults are properly corrected

Discussion Presentation Tests and Quiz Assignment

2.1.3

Analyze the conditions of computer systems

2.2.1

Diagnose problems

Define the computer system Identify types of computer system Explain parts of computer system Define problems Describe the process of fixing problems Fix problems

The conditions of computer systems are clearly analyzed

Discussion Presentation Tests and Quiz Assignment

Problems are correctly diagnosed

Discussion Presentation Tests and Quiz Assignment

2.2.2

Design website that is easy and effective to use

Define website Explain types of websites Prepare a simple website

Website that is easy and effective to use is correctly designed

Discussion Presentation Tests and Quiz Assignment

2.2.3

Maintain a website

Run website Update website Secure website

Website is properly maintained

Discussion Presentation Tests and Quiz Assignment

2.3.1

Design data models

Describe data models Explain types of data models Give ways of designing data models Explain database system Describe ways of installing and testing database system Install and run database system Describe the features of databases Explain methods of updating

Data models are correctly designed

Discussion Presentation Tests and Quiz Assignment

2.3.2

Install and test database system.

Database system is properly installed and tested

2.3.3 Update existing database

Discussion Presentation Discussion Presentation Tests and Quiz Assignment Discussion Presentation Tests and Quiz Assignment

Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop Checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector 62

Existing database is properly updated

2.4.1

Prepare system models

2.4.2

Document system problems and resolutions for future reference.

3.1.1

Create codes that meet system standard

databases Apply the methods to update databases Define system models Identify the types of system models Describe methods of preparing system models Apply the methods to prepare system models Explain system problems Describe resolutions of system problems Describe methods of system documentation Define codes Explain types of codes Describe methods of creating codes using programming languages (e.g

Laptop checklist

System models are correctly prepared

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

System problems and resolutions are correctly documented for future reference

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

Codes that meet system standards are properly prepared

Discussion Presentation Tests and Quiz Assignment

63

3.1.2 Maintain system application

Access,VB,Java, C++) Apply methods of creating codes Define system application Update new features Troubleshoot system application. Define data visualization Apply data visualization techniques Apply data visualization techniques Define computer software Identify types of computer software Identify the use of each computer software Define computer file Identify functions of computer files Describe operational functions of computer file Apply processes

System application is properly maintained

Discussion Presentation Tests and Quiz Assignment

3.1.3

Innovate data visualization techniques

Data visualization techniques are appropriately innovated

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist 64

4.1.1

Describe types of computer software

Types of computer software are clearly described

Discussion Presentation Tests and Quiz Assignment

4.1.2

Apply file processes

File processes are properly applied

Discussion Presentation Tests and Quiz Assignment

4.1.3

Apply data traffic flow and coordination

4.1.4

Apply communication equipment and systems communication channels

4.2.1

Identify tools for building network

to prepare computer files Define data flow Identify parts of data flow Prepare data flow hardware communication Test dataflow hardware communication Define of communication channels Describe communication equipment(e.g. Access point, network routers,hubs,swit chers and servers) Identify types of communication channels and equipment Prepare communication channels Describe network tools Prepare tool kit(e.g. Tester, ripping tool, Combination pliers) Prepare trunking

Data traffic flow and coordination are properly applied

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

Communication equipment and systems communication channels are properly applied

Discussion Presentation Tests and Quiz Assignment

Tools for building network are correctly identified

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist 65

4.2.2

Connect workstations

4.2.3

Configure Network

Define workstation/node s Describe types of workstations Identify types of topologies(e.g. Star,Bus,Ring) Prepare and Test UTP cables Connect different work stations Define network configuration Describe the use of ping command Troubleshoot network Define computer communication Describe processes of testing communication between workstations Use the ping command to check if your TCP/IP software is correctly configured.

Workstations are properly connected

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

Network is properly configured

Discussion Presentation Tests and Quiz Assignment

4.2.4

Test communication between workstations

Communications between workstations is correctly tested

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

66

4.3.1

Work with queries in database

4.3.3 Prepare simple reports in database

4.3.2

Create queries in design view

Define queries in database Describe function of queries in database Identify types of objects in database Define queries in design view Describe data types entered in design view Identify data types Define report object in database Describe functions of reports in database Prepare simple report from the database system Create interface between table, query and report. Produce files and save the report Produce folder and save the file into folder Produce hardcopy of the

Queries are properly worked with

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

Queries in design view are properly created.

Discussion Presentation Tests and Quiz Assignment

Simple reports in database are correctly prepared

Discussion Presentation Tests and Quiz Assignment

4.3.4

Save and print simple reports

Simple reports are correctly saved and printed

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist 67

4.4.1

Maintain user accounts

report by printing the report Define user account Describe the functions of user account Prepare user account Describe the process of deleting user accounts Describe the process of updating user accounts Apply the process for deleting user account Apply the process for updating user account Define access right Describe the function of access right Maintain access right Define computer crime Describe types of computer crime(e.g

User accounts are properly maintained

Discussion Presentation Tests and Quiz Assignment

4.4.2

Delete/Update user account

User accounts are correctly Deleted or Updated

Discussion Presentation Tests and Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.4.3

Assign access right(e.g Guest,Adminstrator,Students)

Access rights are properly assigned

Discussion Presentation Tests and Quiz Assignment

5.1.1

Explain computer crime(e.g Hacking and Cracking)

Computer crime is clearly explained

Discussion Presentation Tests and Quiz

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk 68

5.1.2

Solve Computer virus problems

5.1.3

Install/Update antivirus packages

5.1.4

Apply authentication methodologies in computer use

Hacking and Cracking) Describe ways of protecting computer from crime Define computer viruses Describe types of computer viruses Describe the effect of computer viruses Describe ways of dealing with computer viruses Define antivirus packages Define types of antivirus Describe ways of installing/updatin g computer antivirus Define the term authentication Identify types of authentication Explain the authentication methodologies.( e.g Domain name, passwording, access right)

Assignment

Projector Laptop checklist

Computer virus problems are properly solved

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Antivirus packages are correctly installed and updated

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Authetification methodologies are properly applied

Discussion Presentation Tests and Quiz Assignment

69

5.2.1

Maintain access right in computer use

5.2.2 Maintain information privacy and accuracy

5.2.3

Detect/Prevent unauthorized users(e.g intruders)

6.1.1

Connect,Configure,Run networked computers

Assign the access code to access the server Create password and IP addresses Protect password Define information privacy Define information accuracy Describe the function of information privacy Describe the use of information privacy Define unauthorized user Describe the types of unauthorized users Describe the ways of preventing computer intruders Collect components Organize

Access right in computer use is properly maintained

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

Information privacy and accuracy is appropriately maintained

Discussion Presentation Tests and Quiz Assignment

Unauthorized users are properly detected and prevented

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Networked computers are correctly

Discussion Presentation Tests and

Whiteboard Markerpen Blackboard 70

6.1.2

Analyse network systems

6.2.1

Maintain Computer hardwares

equipment and tools Configure and run computer network Manage computer networks Monitor computer users Provide IP address to users Keep computer hardware Store computer hardware Organize computer hardware Connect all hardwares to obtain computer systems Test the system and install operating systems Install/Reinstall the operating system. Install application software. Run other application software

connected and configured

Quiz Assignment

Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Network systems are correctly analysed

Discussion Presentation Tests and Quiz Assignment

Computer hardwares are properly maintained

Discussion Presentation Tests and Quiz Assignment

6.2.2

Connect computer hardwares

Computer hardwares are correctly connected

Discussion Presentation Tests and Quiz Assignment

6.2.3

Update computer software

Computer software is properly updated

Discussion Presentation Tests and Quiz Assignment

71

6.2.4

Manage computer networking

6.3.1

Communicate effectively with organizational stakeholder

6.3.2

Apply Computing mathematics in solving computer problems

Control the server Manage other networked computers Provide access rights to nodes/workstatio ns Describe the usage of networked computers Organize the servers Provide closed loop with all nodes Organize different computers in other organizarions Collect different equipments and tools Apply mathematical rules in solving different computer problems

Computer networking is properly managed

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Organisational stakeholders are effectivelly communicated with

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

Computing mathematics is accurately applied in solving computer problems

Discussion Presentation Tests and Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

72

73

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

11.0

BENCHMARKING OF ASSESSMENT CRITERIA

S/NO 1.1.1

ASSESSMENT CRITERIA Mathematical concepts in calculation and preparation of database are properly applied.

SATISFACTORY Converts various base number system

GOOD Converts various base number sytems and explains sets and relations

EXCELLENT Converts various base number systems, explain sets and relations and basic number theoretical functions Evaluates basic counting techniques , discrete probability and explains important algorithms of graph theory, Boolean logic and techniques of mathematical proof . Applies grammar , construct sentences and writes small texts Writes business letter,emails,simple report and sales letter correctly Writes employment letters, CVs ,participate in employment interviews 74

1.1.2

Basic problems relating to ICT are accurately solved using mathematical principles

Evaluates basic counting techniques and discrete probability

Evaluates basic counting techniques , and explains important algorithms of graph theory

1.2.1

Basic writing skills are properly applied

Applies grammar

Applies grammar and construct sentences

1.2.2

Principles and theories involving business correspondence are appropriately applied. Employment communication is properly applied

Writes business letter and emails correctly

Write business letter, emails and simple reports

1.2.3

Writes employment letters and CVs

Writes employment letters, CVs and participates in

employment interviews 1.2.4 Simple research proposal effective memos, paper presentations and other business presentations are properly prepared Conditions of faults are correctly identified Prepares simple research proposal Prepares simple research proposal and write effective memo

and search for jobs Prepares simple research proposals , writes effective memos ,paper and other business presentations

2.1.1

Defines faults

Defines faults and mentions conditions of faults

Define faults, mentions conditions of faults and identifies different types of faults. Mention types of instrument used, explain steps of correcting faults,and fixes the faults Defines computer systems ,identify types of computer systems and explains parts of computer systems Define problem , describe the process of fixing problems and fix problems Explain website ,types of websites and prepare simple Run, update and secure website

2.1.2

Computer faults are properly corrected

Mentions types of instrument used

Mentions types of instrument used and explain steps of correcting faults Defines computer system and identify types of computer systems

2.1.3

The conditions of computer systems are clearly analysed.

Defines computer systems

2.2.1

Problems correctly diagnosed

Defines problems

Defines problem and describes the process of fixing problems Explains website and types of websites

2.2.2

Website that is easy and effective to use is correctly designed Website is properly maintained

Explain website

2.2.3

Run website

Run and update website

75

2.3.1

Data models are correctly designed

Describes data models

Describes data models and explain types of data models.

Describes data models, explain types of data models and give ways of designing data models . Explains database system ,describe ways of installing and testing database system, and install and run database system Describes features , explain methods of updating database and apply methods to update database Defines, identify, describe methods of preparing system models and apply the methods to prepare system models Explains system problems ,describe resolutions of system problems and methods of system documentation Defines codes, explain types of codes , describe the methods of creating codes using programming languages and apply 76

2.3.2

Database system is properly installed and tested

Explains database system

Explains database system and describe ways of installing and testing database system

2.3.3

Existing database is properly updated

Describes features of database

Describes features and explain methods of updating database

2.4.1

System models are correctly prepared

Defines and identify types of system models

Defines, identify and describe methods of preparing system models

2.4.2

System problems and resolutions are correctly documented for future reference

Explains system problems

Explains system problems and describe resolutions of system problems

3.1.1

Codes that meet system standards are properly prepared

Defines codes and explain types of codes

Defines codes, explain types of codes and describe the methods of creating codes using programming languages

methods to create codes that meet system standard 3.1.2 System application is properly maintained Defines system application Defines system application and update new features Defines system application, update new features and troubleshoot system application . Defines data visualization, apply data visualization techniques and apply data visualization techniques properly. Defines computer software, identify types of computer software and the use of each software , Defines computer file, identify functions of computer file, describe operational functions of computer file and apply process to prepare computer files. Defines , identify parts of data flow and prepare and test dataflow hardware communication Defines communication channels, describe communication equipment, 77

3.1.3

Data visualization techniques are appropriately innovated

Defines data visualization properly

Defines data visualization and apply data visualization techniques properly.

4.1.1

Types of computer software are clearly described

Defines computer software

Defines computer software and identify types of computer software , Defines computer file, identify functions of computer files and describe operational functions of computer files ,

4.1.2

File processes are properly applied

Defines computer file and identify functions of computer file m

4.1.3

Data traffic flow and coordination Defines and identify parts of are properly applied data flow.

Defines , identify parts of data flow and prepare dataflow hardware communicationDefines communication channels, describe communication

4.1.4

Communication equipment and systems communication

Defines communication channels and describe

channels are properly applied

communication equipment

equipment and identify types of communication channels and equipment.

identify types of communication channels and equipment and communication channels. Describes network tools and prepare tool kit and trunking. Defines workstation/node, describe types of workstation, identify types of topologies and prepare and test UTP cables and connect different workstations. Defines computer communication and describe the processes of testing communication between workstations use of ping command and troubleshoot network. Defines computer communication and use ping command to check if your TCP/IP software . configured and some more examples Defines quarries , describe functions of quarries in 78

4.2.1

Tools for building network are correctly identified

Describes network tools.

Describes network tools and prepare tool kit.

4.2.2

Workstations are properly connected

Defines workstation/node and describe types of workstations.

Defines workstation/node, describe types of workstation, identify types of topologies and prepare and test UTP cables. Defines network configuration and describe the use of ping command.

4.2.3

Network is properly configured

Defines network configuration.

4.2.4

Communication between workstations is correctly tested

Defines computer communication.

Defines computer communication and describe the processes of testing communication between workstations

4.3.1

Quarries in database are properly worked

Defines quarries in database.

Defines quarries and describe functions of

quarries in database properly

database and identify types of object in database properly Defines quarries in design view, describe data type entered in design view and identify data types. Defines report object, describe functions of report in, prepare simple report in database and create interface between table, query and report in database. Produce and save file, produce folder and save files into folder and print.

4.3.2

Quarries in design view are properly created

Defines quarries in design view.

Defines quarries in design view and describe data type entered in design view. Defines report object, describe functions of report in and prepare simple report in database.

4.3.3

Simple reports in database are correctly prepared

Defines report object and describe functions of report in database.

4.3.4

Simple reports are correctly saved and printed

Produce and save file.

Produce and save file, produce folder and save files into folder.

4.4.1

User accounts are properly maintained

Defines user accounts.

Defines user account and Defines user account, describe functions of describe functions of user user accounts. accounts and prepare user accounts. Describes the process of deleting or updating user account . Defines access right and describe the functions of access right . Apply the process of deleting or updating user account. Defines access right, describe the functions of access right and maintain access right . 79

4.4.2

User accounts are correctly deleted or updated

Describes the process of deleting user account .

4.4.3

Access rights are properly assigned

Defines access right properly

5.1.1

Computer crime is clearly explained

Defines computer crime .

Defines computer crime and describe types of computer crime .

Defines computer crime ,describe types of computer crime and describe ways of protecting computer from crime . Defines computer viruses, describe types and effect of computer viruses ,and describe ways of dealing with computer viruses m Defines antivirus and types of antivirus, describe ways of installing/updating antivirus , Defines the term authentification ,identify types of authentification and explain authentification methodologies and give some examples , Assigns access code to access the server correctly and create password and IP addresses protect password ,

5.1.2

Computer virus problems are properly solved

Defines computer viruses and describe types of computer viruses .

Defines computer viruses and describe types and effect of computer viruses

5.1.3

Antivirus packages are correctly installed and updated

Defines antivirus packages m

Defines antivirus and types of antivirus

5.1.4

Authentification methodologies are properly applied

Defines the term authentification ,

Defines the term authentification and identify types of authentification

5.2.1

Access rights in computer use is properly maintained

Assigns access code to access the server ,

Assigns access code to access the server correctly and create password and IP addresses,

5.2.2

Informarion privacy and accuracy is approprietly

Defines information privacy and accuracy ,

Defines information Defines information privacy privacy and accuracy and and accuracy and describe 80

maintained

describe the functions of information accuracy , Defines unauthorized user , Defines unauthorized user and describe types of unauthorized users ,

the functions of information accuracy and privacy , Defines unauthorized user, describe types of unauthorized users and describe ways of preventing computer from unauthorized users , Collects computer components and organize equipments and tools, adding more examples. Manages computer network, monitor computer and provide IP address tousers, Organizes computer hardware and connect all the hardware to obtain computer system and adding more examples. Connects all the hardware to obtain computer system. and testing the system and install operating system and adding more examples Install/Reinstall the operating system , install application software and 81

5.2.3

Unauthorized users are properly detected and prevented

6,1,1

Networked computers are correctly connected and configured

Collects computer components,

Collects computer components and organize equipments and tools Manages computer network and monitor computer users.

6.1.2

Network systems are correct analyzed practically

Manages computer network

6.2.1

Computer hardware are properly maintained

Organizes computer hardware

Organizes computer hardware and connect all the hardware to obtain computer system.

6.2.2

Computer hardware is correctly connected

Connects all the hardwares to obtain computer system.

Connects all the hardware to obtain computer system. and testing the system and install operating system. Install/Reinstall the operating system and install application

6.2.3

Computer software are properly updated

Install/Reinstall the operating system

software

run other application software Control the server ,manage other networked computers , provide access right to nodes/workstations and describe the usage of networked computers Organizes the servers , provide closed loop with all nodes and organize different computers in other organizations Collects different equipment and tools, apply mathematical rules in solving different computer problems and adding more examples.

6.2.4

Computer networking are properly managed

Control the server and manage other networked computers

Control the server ,manage other networked computers and provide access right to nodes/workstations

6.3.1

Communication with stakeholders is effectively done

Organizes the servers

Organizes the servers and provide closed loop with all nodes

6.3.2

Computing mathematics is accurately applied in solving computer problems.

Collects different equipment and tools

Collects different equipment and tools ,apply mathematical rules in solving different computer problems

82

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY

12.0 MODULES DESCRIPTION CODE: TCIT 511

NAME;

COMMUNICATION SKILLS 12

NUMEBER OF CREDITS:

SUB-ENABLING OUTCOMES: 1.2.1 1.2.2 1.2.3 1.2.4 Apply basic writing skills Apply principles and theories involving business correspondence Apply employment communication Prepare simple research proposal and write effective memos, paper presentations and other business Presentations.

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. 83

REFERENCES; 1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Autralia college of general Practitioners. 2 3 4 5 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland. Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh. Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd. Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh. Edition Royal

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60%

84

CODE: TCIT 512 NAME; COMPUTING MATHEMATICS 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 1.11 1.12 Apply mathematical concepts calculation and preparation of databases Solve basic problems relating to ICT using mathematical principles

TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit. REFERENCES; 1 2 3 4 5 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA. Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer verlag Berin Heideberg Germany, Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1st Edition , AA Dordrecht the Netherlands Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd Edition springer Verlag Berin Heideberg Germany, Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 85

CODE: TCIT 513 NAME; DATABASE SYSTEM DEVELOPMENT 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 2.3.1 2.3.2 2.3.3 2.3.4 2.3.5 2.3.6 2.3.7 Design data models Install and test database system Update existing database Work with quarries in database Create quarries in design view Prepare simple reports Save and print simple reports

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2nd Ed,Cengage Learning,Canada Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada. Rob P. et al (2009) Database systems design, implementation and management, 5th Edition Cengage, Learning EMEA. Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 86

CODE: TCIT 514

NAME;

COMPUTER MAINTENANCE

NUMBER OF CREDITS:

12

SUB-ENABLING OUTCOMES:

2.1.1 2.1.2 2.1.3 2.1.4

Identify conditions of faults Correct computer faults Analyse the conditions of computer systems Diagnose problems

TOPICS Define faults Mention condition of faults Identify different types of faults Mention types of instrument used Explain steps of correcting faults Fix the faults Define the computer system Identify types of computer system 87

Explain parts of computer system Define problems Describe the process of fixing problems Fix problems

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES 1 2 3 4 5 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc. Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison Wesley, NJ. Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.Butterworth-Heinmann.UK

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 88

CODE: TCIT 515

NAME;

PROGRAMMING

NUMBER OF CREDITS:

12

SUB-ENABLING OUTCOMES:

3.1.1 3.1.2 3.1.3

Create codes that meet system standards Maintain system application Innovate data visualization techniques

TOPICS Define codes Explain types of codes Describe methods of creating codes using programming languages Apply methods of creating codes Define system application Update new features Troubleshoot system application. (e.g Access,VB,Java, C++)

89

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES; 1 2 3 4 5 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4th Edition, D. C. Heath and company 125 spring street, Lexington M. A. Oualline S. (2003) Practical C++ Programming 2nd Edition OReailly media Inc, 1005 Gravenstein Highway North , Sebastopol Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German. Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O Reilly media Inc, 1005 Gravenstein Highway North Sebastopol.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 90

CODE: TCIT 521 NAME; ADVANCED OFFICE AUTOMATION 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 4.1.1 4.1.2 4.1.3 4.1.4 Describe types of computer software Apply file processes Apply data traffic flow and coordination Apply communication equipment and system communication channels

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 . Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke Publishing 980 East Circle Drive USA Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher Education

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 91

CODE: TCIT 522 NAME; WEB DESIGN 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 2.2.1 2.2.2 2.2.3 Diagnose problems Design website that is easy and effective to use Maintain a website

TOPICS Define website Explain types of websites Prepare a simple website Run website Update website Secure website

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.

92

REFERENCES; 1 2 3 4 5 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol. Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York Institution of Technology at Utica/Rome. Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition ORelly media inc. 1005,Gravenstain Highway North, Sebastopoll. Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology. Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment 40% End of semester examination 60%

93

CODE: TCIT 523

NAME;

NETWORKING

NUMBER OF CREDITS:

12

SUB-ENABLING OUTCOMES:

4.2.1 4.2.2 4.2.3 4.2.4 4.2.5

Identify tools for building network Connect workstations Configure network Test communication between workstations Apply communication equipment and systems communication channels

TOPICS Define of communication channels Describe communication equipment(e.g. Access point, network routers,hubs,switchers and servers) Identify types of communication channels and equipment Prepare communication channels Describe network tools Prepare tool kit(e.g. Tester, ripping tool, Combination pliers) 94

Prepare trunking Define workstation/nodes Describe types of workstations Identify types of topologies(e.g. Star,Bus,Ring) Prepare and Test UTP cables Connect different work stations Define network configuration Describe the use of ping command Troubleshoot network Define computer communication Describe processes of testing communication between workstations Use the ping command to check if your TCP/IP software is correctly configured.

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.

95

REFERENCES; 1 2 3 4 5 Barken L(2009) How secure is your wireless network your Wi-FLAN,2nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice Hall of India, New Delh. Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada Mathew J. (2005) Computer Networks, Internet protocols in actionaddition Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment 40% End of semester examination 60%

96

CODE: TCIT 524 NAME; PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 5.1.1 5.1.2 5.1.3 5.1.4 5.2.1 5.2.2 5.2.3 Explain computer crime Solve computer virus problems Update/Install antivirus packages Apply authentication methodologies in computer use Maintain access right in computer use Maintain information privacy and accuracy Detect/prevent unauthorized users

TEACHING AIDS Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit. REFERENCES; 1 2 3 4 5 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk. Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo . Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1st ed,Jones&Bartlett Publishers,Massachussets.USA Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ Prentice- Hall New Delh India.

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 97

CODE: TCIT 525

NAME;

SYSTEM ANALYSIS AND DESIGN 12

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES: 2.4.1 2.4.2 Prepare system models Document system problems and resolution for future reference

TEACHING AIDS Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist METHODS OF INSTRUCTION This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit. REFERENCES; 1 2 3 4 5 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi. Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin

INTEGRATED METHOD OF ASSESSMENT; Continuous assessment 40% End of semester examination 60% 98

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY

1.0 BACKGROUND INFORMATION The philosophy behind the development of competent modular curricular is to comply with the Nati ons Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs. Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills. The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result o f the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 6 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization. The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.

This qualification has 120 credits which is the minimum prescribed by NACTE.
99

2.0 MODULE CODING

The coding of modules follows logical sequence as in the following example for ODIT 614. ODIT 6 1 1 1 to = = = = Stands for Ordinary Diploma in Information and Communications Technology The first digit stands for the NTA level, in this case Ordinary Diploma which is level six. The second digit stands for semester, i.e. for semester one. The last digit stands for the order of the module in the semester. Modules are arranged serially from the highest number, upon the number of modules in the semester.

3.0 GRADING OF ASSESSMENT RESULTS The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 6 Grade A B+ C D F I Definition Excellent Very Good Good Average Failure Incomplete Score 75 100 65 74 55 64 40 54 00 39

100

4.0 AWARDS

The award shall be made to students who satisfy the following conditions. Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.

5.0 AWARDS CLASSIFICATION:

Awards Classification for NTA level 6 Class of Awards First Class Upper Second Class Lower Second Class Pass Cumulative GPA 4.4 to 5.0 3.5 to 4.3 2.7 to 3.4 2.0 to 2.6

101

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT) 6.0 SUMMARY FRAMEWORK QUALIFICATION PURPOSE OF QUALIFICATION ORDINARY DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT) This qualification is intended for persons who will be able to develop and test programs, program web based applications, manage information systems resources, plan and manage networks, develop business plans focusing on entrepreneurship and perform audit assignments, analyze how computer components work and communicate under less supervision.

NTA LEVEL COMPETENCE LEVEL DESCRIPTOR

6 The holder of this qualification will be able to apply skills and knowledge to develop and test programs, program web based applications, manage information systems resources, plan and manage networks, develop business plans focusing on entrepreneurship and perform audit assignments, analyze how computer components work and communicate in a broad range of ICT work activities, most of which are non-routine and be able to assume operational and some managerial responsibilities.

CREDITS AT THIS LEVEL 120

102

CUMULATIVE CREDITS AT THIS LEVEL MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL DATE QUALIFICATION NEW STANDARD LAST RVIEWED ENTRANCE REQUIREMENTS TCIT Level 5 30 240

103

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT) 7.0 PRINCIPAL LEARNING OUTCOMES AND CREDIT VALUES SUMMARY S/NO PRINCIPAL LEARNING OUTCOMES CREDIT VALUES 1 Develop, test, debug and run programs using object oriented programming language, C++. ASSESSMENT CRITERIA

15

1.1 Programs using object oriented programming language C++ are properly developed, tested, debugged, and run.

Design and develop database driven Web Applications

15

2.1 Database driven web applications are properly designed and developed

Manage Information System Resources in an organization, evaluate a range of information systems solutions and examine the social and legal impacts of developing and implementing information systems and the role played by Information Systems (IS) professionals in addressing such issues.

30

3.1 Information systems resources in an organization and a range of information systems solutions are well managed and evaluated. 3.2 Social and legal impacts of developing and implementing information systems and the
104

role played by information systems (IS) professional in addressing such issues are well examined. 4 Plan, administer, troubleshoot and manage computer Networks and network equipment.

15

Computer networks and network equipment are properly planned, administered, and troubleshot.

Analyze the working of computer components and their communication to each other.

15

The working of computer components and their communication to each other are well analyzed

Apply information systems assurance in developing business plans focusing on entrepreneurship and perform audit assignments.

30

6.1 Information systems assurance in developing business plans focusing on entrepreneurship is well applied 6.2 Audit assignments are well performed.

TOTAL CREDITS

120

105

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY 8.0 PROGRAM STRUCTURE SEMESTER I S/NO 1 2 3 4 CODE ODIT 611 ODIT 612 ODIT 613 ODIT 614 NAME OF MODULE Computer Architecture Programming in C++ Business Information Systems Entrepreneurship TOTAL CREDITS FOR SEMESTER I CREIDT 15 15 15 15 15

SEMESTER II S/NO 1 2 3 4 CODE ODIT 621 ODIT 622 ODIT 623 ODIT 624 NAME OF MODULE Information systems assurance Database driven website design Fundamentals of network administration Project development TOTAL CREDITS FOR SEMESTER I GRAND TOTAL CREDITS FOR NTA LEVEL 6 120
106

CREIDT 15 15 15 15 15

9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES PRINCIPAL OUTCOMES (NACTE Standards) ENABLING OUTCOMES (As Identified and formulated by Curriculum Developers) Apply Basic principles of C++ program 1.1.1 Describe Structure of a program 1.1.2 types. 1.1.3 Apply Constants 1.1.4 Assign Operators in C++ programs 1.1.5 Declare Basic Input/ Output 1.2 Apply Control Structures 1.2.1 Apply Control Structures in a Declare Variables and Data SUB-ENABLING OUTCOMES

1. Develop, test ,debug and 1.1 run programs using object oriented programming language, C++

C++ program 1.2.2 Declare different types of C++ programs 1.3 Identify different data types 1.3.1 Declare arrays in C++ program 1.3.2 Declare character sequences in c++ program 1.3.3 Declare pointers in C++ program
107

1.3.4 Allocate dynamic memory in C++ program 1.3.5 Declare data structures in C++ program 1.4 Apply Object Oriented Programming techniques 1.4.1 Declare Classes in C++ program 1.4.2 Declare Friendship and inheritance 1.4.3 Apply Polymorphism in C++ program 1.4.4 Pass message in C++ program

108

2. Design and develop database driven Web Applications

2.1

Set up and use a web server

2.1.1 Download and save Apache, PHP, Mysql or Wamp/ Xamp 2.1.2 Install Apache,PHP, Mysql or Wamp / Xamp 2.1.3 Use the web server

2.2

Construct file and directory handling in PHP

2.2.1 Read and write files 2.2.2 Manipulate API files 2.2.3 Upload and exit file

2.3

Write and test PHP program and Connect it to the database

2.3.1 Apply PHP syntax 2.3.2 Declare variables 2.3.3 Declare arrays 2.3.4 Declare functions

109

2.3.5 Declare classes and objects 2.3.6 Declare string operations in PHP 2.4 Develop dynamic interactive website 2.4.1 Declare website structure 2.4.2 Prepare graphic resources 2.4.3 Design templates, upload templates and resources 2.4.4 Create all modules and add to templates 2.4.5 Create pages and forms

3. Manage Information System Resources in an organization, evaluate a range of information systems solutions and examine

3.1 Evaluate the roles of various types of management information systems in business organisations. .

3.1.1 Discuss the relationship between the business organization ,processes, functions and the associated supporting management information systems.
110

the social and legal impacts of developing and implementing information systems and the role played by Information Systems (IS) professionals in addressing such issues. 3.2 Asses the emerging business technologies,environments and practices, and their impact on management information systems.

3.1.2 Explain appropriate management information systems for the range of business functions and organizational levels. 3.2.1 Assess the impact of new technology on business processes and associated management information systems. 3.2.2 Explain the emerging business technologies environments and practices of management information systems. 3.3 Discuss the relationship between the decision making process, the organizational hierarchy and the supporting management information systems. 3.3.1 Discuss the managerial decision making process in business. 3.3.2 Explain the relationship between decision making and management information systems at different levels of the organization. 3.3.3 Evaluate the importance of collaborative decision making environments and review

111

group management information systems. 3.3.4 Apply the concepts and knowledge in the management information systems context. 3.4 Develop awareness of the key role of management information systems in facilitating competitive advantage in business. 3.4.1 Explain the key requirement of competitive advantage. 3.4.2 Explain competitive advantage in business 3.4.3 Relate information systems to business competitive advantages 3.5 Apply Knowledge of security and control aspects of management information systems. 3.5.1 Discuss the risk, security and control issues associated with management information systems. 3.5.2 Discuss the control measures for the risks associated with managing information systems. 3.6 Apply professional approach to relating management information 3.6.1 Review the range of professional issues, which are associated with business activities and management
112

systems to business environments

information systems. 3.6.2 Evaluate business activities that needs information systems support for better performance

4.Plan, administer ,troubleshoot and Manage computer Networks and network equipment

4.1.

Describe network hardware and software tools

4.1.1 Configure Network Adapter, Modem 4.1.2 Set Repeater and Bridge 4.1.3 Set Hub and Switch 4.1.4 Connect Wireless Access Point 4.1.5 Configure Router

4.2 Configure network resources

4.2.1 Configure Address Resolution Protocol (ARP) 4.2.2 Configure Internet Control Message Protocol (ICMP) 4.2.3 Configure BootStrap Protocal(BOOTP
113

) 4.2.4 Configure(Dynamic Host Control Protocal) DHCP 4.2.5 Configure Domain Name System( DNS) 4.2.6 configure Lightweight Directory Access Protocol ( LDAP) 4.3 Manage network resources 4.3.1 Troubleshoot problems with computer systems 4.3.2 Assist users to resolve problems with equipment and data 4.3.3 Plan, design, acquire new or upgraded hardware and software 4.3.4 Install LAN/WAN and maintain Computer 4.3.5 Apply ISO management model 5. Analyze the working of computer components and their
114

5.1

Describe the Central Processing

5.1.1 Explain the role of CPU

communication to each other

Unit (CPU)

5.1.2 Describe the component parts of CPU 5.1.3 Describe purpose of instruction pointer 5.1.4 Describe steps of processing an instruction

5.2

Describe computer storage

5.2.1 Explain the purpose of memory cell 5.2.2 Apply RAM and ROM 5.2.3 Identify different types of ROM 5.2.4 Describe storage capacities 5.2.5 Differentiate between internal and external buses

capacities and memory devices

5.3

Describe computer peripherals

5.3.1 Identify different Character recognition devices 5.3.2 Explain the role of barcodes

devices

115

5.3.3 Identify different types of Tapes 5.3.4 Identify different types of magnetic disks 5.3.5 Assess hard disk performance 6. Apply information systems assurance in develop business plan focusing on entrepreneurship and perform audit assignments 6.1 Apply Auditing standards, procedures and guideline of auditing Information Systems Audit assignments 6.1.1Audit Information Systems according to required procedures 6.1.2 Conduct an information systems Risk Assessment and arrange sequence of functions 6.1.3 Perform audit assignment 6.2 Assess effectiveness and efficiency of, Information Technology Governance, and Information System Life Cycle Management in supporting business operations and continuity. 6.2.1Assess Information Technology Governance 6.2.2 Assess adherence of Information Systems development life cycle management 6.2.3 Conduct Tests to check Business continuity Management 6.2.4 Conduct test to check effectiveness of

116

Disaster recovery planning

6.3 Relate concepts of security in ensuring information assets of the business organizations are protected 6.4 Analyze how information systems affect/effect the concepts of entrepreneurship in business organization

6.3.1 Ensure Security of Information assets 6.3.2 Conduct test Security of procedures and components 6.4.1 Describe objectives of entrepreneurship 6.4.2 Analyze entrepreneurship in business organization 6.4.3 Discuss the importance of information system in entrepreneurship 6.4.4 Discuss the role of entrepreneurship concepts in developing business
117

10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS


SUB ENABLING OUTCOME RELATED TASK ASSESMENT CRITERIA ASSESMENT METHOD ASSESMENT INSTRUMENTS

1.1.1 Describe Structure of a program

Declare comments in a C++ program eg; // my first program in C++ Declare a library function #include <iostream> Declare and use namespace std; Declare the main function ;int main () Declare a display function; cout << "Hello World!"

Structure of a program is clearly described

Exercise, assignment

Questions and model answer.

1.1.2 types.

Declare

Identify reserved key words Describe and declare integers, boolean, float, character, double Initialize variables

Variables and Data types are correctly declared

Assignments and class in demonstrations

Written assignments, model answer

Variables and Data

118

1.1.3 Apply Constants in C++ program 1.1.4 Assign Operators in C++ program

Identify and declare literals, integer numbers, float pointers constants.

Constants are properly applied

Assignments and class in demonstrations

Written assignments, model answer

Identify different types of operators; assignment, arithmetic, compound, increase and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff, precedence operators.

Operators in C++ program are properly assigned. Assignments and class in demonstrations Written assignments, model answer

Assign different types of operators; assignment, arithmetic, compound, increase and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff , precedence operators.

1.1.5 Declare Basic Input/ Output in C++ program

Identify and Declare Standard Output (cout) Identify Standard Input (cin).

Basic Input/ Output are correctly


119

Declare Standard Input (cin)

declared

Assignments and class in demonstrations

Written assignments, model answer

1.2.1

Apply

Declare conditional structures while, dowhile, forloop),jump statements, continue and go to statements.

Control C++ program are properly applied and used Assignments and class in demonstrations Written assignments, model answer

Control Structures in a C++ program

(if..else), iteration structure ( loops: structures in

Apply conditional structures (if..else), iteration structure ( loops: while, dowhile, forloop),jump statements, continue and go to statements.

1.2.2

Declare different types of C++ Functions

Identify and declare different types of Different types of functions: exit, selective switch, void, passing arguments, overloaded, inline, recursivity. C++ program are correctly declared. Assignments and class in demonstrations Written assignments, model answer
120

1.3.1 Declare Arrays

Initialize arrays Describe multi-dimension arrays Pass parameters Access values of an array

Arrays in C++ program are correctly declared Assignments and class in demonstrations Written assignments, model answer Written assignments, model answer

1.3.2 Declare Character Sequences

Initialize null-terminated character sequence Apply null-terminated character sequence

Character sequence are correctly declared Pointers are correctly declared

Assignments and class in demonstrations

1.3.3 Declare Pointers

Apply reference operator Apply deference operators Apply variables of pointer types Initialize pointers; arithmetic, void, pointer to pointer, pointer to function and nully-pointers

Assignments and class in demonstrations Dynamic memory Assignments in C++ program are properly allocated and class in demonstrations

Written assignments, model answer Written assignments, model answer

1.3.4 Allocate Dynamic Memory

Apply operators new and new[] Apply operators delete and delete[] Apply memory in ANSI-C

121

1.3.5 Declare Data Structures

Apply structure_name, object_name. Apply pointer to pointer Apply nesting structure Apply other data types( typedef) Apply class_name Apply object_name Apply class functions: constructors and destructors ,overloading and default

Data structures in C++ program are correctly declared Classes in C++ program are declared

Assignments and class in demonstrations

Written assignments, model answer

1.4.1 Declare Classes

Assignments and class in demonstrations

Written assignments, model answer

Specify private, public/protected class correctly

1.4.2 Declare Friendship and inheritance 1.4.3 Apply Polymorphism

Apply friend functions Apply friend class Apply inheritance between classes Apply multiple inheritance. Declare pointers to base class Declare virtual members and abstract base

Friendship and inheritance are correctly declared Polymorphism in C++ program are properly applied

Assignments and class in demonstrations

Written assignments, model answer

Assignments and class in demonstrations

Written assignments, model answer

1.4.4 Pass message in C++

declare message find object(s) to pass message

Message in C++ program is

Assignments and class in

Written assignments,
122

program 2.1.1 Download and save Apache, PHP, Mysql or Wamp/ Xamp

find a function to be invoked connect to the internet Download PHP for free : http://www.php.net/downloads.php Download MySQL for free : http://www.mysql.com/downloads/ Download Apache for free : http://httpd.apache.org/download.cgi

correctly passed Apache, PHP, Mysql or Wamp/ Xamp are properly downloaded and saved in a computer Apache, PHP, Mysql or Wamp/ Xamp are properly installed

demonstrations Demonstration and observation

model answer Written materials and list of links for downloading

2.1.2 install Apache,PHP, Mysql or Wamp / Xamp

open the Apache/php/mysql install file you downloaded, click yes and ok and next and so forth until you reach the Server Information screen, then

Demonstration and observation

Written materials.

Choose the complete installation button

2.1.3 Use the web server

install the web server software on the The web server computer. assign a domain name. install antivirus software apply PHP-file open: write Files are read is properly used

Assignments and class in demonstrations Assignments

Written assignments, model answer Written


123

2.2.1 Read and

write files

apply file fwrite function apply file-write:overwrite function view and modify file attributes read and list directory contents, alter file permissions, retrieve file contents into a variety of native data structures, search for files based on specific patterns. create table upload upload the data/files apply fclose() function apply PHP scripting block apply PHP output text: echo, print apply HTML tags

and written properly API files are properly manipulated

and class in demonstrations Assignments and class in demonstrations

assignments, model answer Written assignments, model answer

2.2.2 Manipulate API file

2.2.3 Upload and exit file

Files are uploaded and exit successfully PHP syntax is properly applied

Assignments and class in demonstrations

Written assignments, model answer

2.3.1 Apply PHP syntax

Assignments and class in demonstrations

Written assignments, model answer Written assignments,

2.3.2 Declare variables

identify the variable name and value apply $ to each variable name declare $var_name = value;

Variables are properly

Assignments and class in

124

2.3.3 Declare arrays

apply Predefined variables apply Variable scope Apply Variables from outside PHP identify different types of arrays; Numeric array , Associative array, Multidimensional array

declared

demonstrations

model answer

Arrays are correctly declared

Assignments and class in demonstrations

Written assignments, model answer

2.3.4 Declare functions

initialize array apply array declaration identify built-in functions and user defined functions apply the PHP syntax for functions: Functions are correctly declared Assignments and class in demonstrations Written assignments, model answer

function functionName() { code to be executed; }


2.3.5 Declare classes apply function calling User-defined functions Apply Function arguments Apply Returning values Apply Variable functions Autoload Objects Classes and Assignments Written
125

and objects

Apply Constructors and Destructors Apply Visibility Apply Scope Resolution Operator (::) Apply Static Keyword Apply Object Constants Apply Object Abstraction Apply Object Interfaces Apply Overloading Apply Object Iteration Apply Patterns Apply Magic Methods Apply Final Keyword Apply Object cloning Apply Comparing objects Apply Reflection

Objects are correctly declared

and class in demonstrations

assignments, model answer

2.3.6 Declare string operations in PHP

Apply string concatenation Apply strlen() function Apply strps() function Identify different operators

Strings operations in PHP are correctly

Assignments and class in demonstrations

Written assignments, model answer

126

:arithmetic, assignment, comparison, and logic operators Apply different operators :arithmetic, assignment, comparison, and logic operators

declared

2.4.1 Declare website structure

Prepare homepage( index page) Prepare main section ( site index) Prepare subsection( content) Link between sections. Explain graphics Differentiate graphics Find graphics

Web site structure is correctly declared Graphic resources are properly prepared

Assignments and class in demonstrations

Written assignments, model answer

2.4.2 Prepare graphic resources

Assignments and class in demonstrations

Written assignments, model answer

2.4.3 Design templates, upload templates and resources

Explain template Differentiate templates Locate template resources

Templates are properly designed and template resources are correctly Assignments and class in demonstrations Written assignments, model answer
127

uploaded 2.4.4 Create all modules and add to templates Define modules Differentiate modules Attach modules All modules are correctly created and added to templates 2.4.5 Create pages and form Define form Find contents Explain HTML Tags Pages and forms are correctly created Assignments and class in demonstrations Written assignments, model answer Assignments and class in demonstrations Written assignments, model answer

3.1.1 Discuss the relationship between the business organization, processes ,functions, and the associated supporting management information systems.

Apply the Business Organization and Supporting Management Information Systems by: Identify Systems and Systems Thinking. Outline Information systems in modern organizations. Discuss Types and characteristics of systems. Describe Business processes and information systems.

The relationship between the business organization ,processes functions, and the associated supporting management information systems are

Assignments and class in demonstrations

Written assignments, model answer

128

Describe Customer Relationship Management (CRM) and SCM. Discuss Collaborative commerce. Discuss Enterprise systems. Outline Organizations and information systems. Discuss Organizations, procedures, politics and culture. Discuss Organizational structures and environments. Discuss the changing role of information systems in organizations. Discuss Economic and behavioral effects of information systems on organizations.

thoroughly discussed

3.1.2 Explain appropriate

Discus Types of Management Information Systems by analyzing the types of

Appropriate management

Assignments and class in

Written assignments,
129

management information systems for the range of business functions and organizational levels.

management information systems by level and function: operational level knowledge level management level strategic level.

information systems for the range of business functions and organizational levels are clearly explained

demonstrations

model answer

3.2.1 Assess the impact of new technology on business processes and associated management information systems.

Discus E-commerce, e-business and information systems. Discus Internet technology and the digital firm. Discus New business models. Discus Categories of e-commerce. Analyse Customer-centred retailing.

The impact of new technology on business processes and associated management information systems is correctly assessed.

Assignments and class in demonstrations

Written assignments, model answer

3.2.2 Explain the emerging business technologies

Discus Business-to-Business (B2B). Discus E-business and the digital firm.

The emerging business technologies

Assignments and class in

Written assignments,

130

environments and practices of management information systems

Discus Challenges and opportunities of e-commerce.

environments and practices of management information systems are clearly explained

demonstrations

model answer

3.3.1 Discuss the managerial decision making process in business.

Discuss how to Manage the organization. Discuss Models and roles of management. Discuss Management decision making. Discuss Process, stages and models of decision making. Discuss Information systems and business strategy. Discuss Strategic information systems. Discuss the value chain model. Discuss Firm and industry level strategy and information systems.

The Managerial decision making process in business is thoroughly discussed.

Assignments and class in demonstrations

Written assignments, model answer

131

3.3.2 Explain the relationship between decision making and management information systems at different levels of the organization.

Discuss the Decision Making and Management Information Systems at Different Levels in the Organization: Decision Support Systems (DSS),Types of DSS, Components of a DSS,DSS applications, Modeling, planning and control, Executive support systems (ESS),Role, benefits and success factors of ESS.

The relationship between decision making and management information systems is clearly explained at different levels of an organization The importance of collaborative decision making environments is correctly evaluated and review group management information

Assignments and class in demonstrations

Written assignments, model answer

3.3.3 Evaluate the importance of collaborative decision making environments and review group management information

Discuss the Collaborative Decision Making Processes: Collaborative working, Group Decision Support Systems (GDSS), Factors for success in enhanced collaborative decision making.

Assignments and class in demonstrations

Written assignments, model answer

132

systems.

Systems is correctly evaluated

3.3.4 Apply concepts and knowledge management in the management information systems context.

Discuss Knowledge and knowledge management. Discuss Systems and infrastructure for knowledge management. Discuss Information and knowledge work systems. Discuss Enterprise knowledge environments. Discus Business intelligence and enterprise reporting and analysis. Discuss the Competitive Advantage as a Driver for Management Information Systems: Information systems for competitive advantage, SCM and ERP, Organizational design, Business value of information ,Managing change and

The concepts and knowledge management are properly applied in the management information systems context .

Assignments and class in demonstrations

Written assignments, model answer

3.4.1 Explain the key requirement of competitive advantage .

The key requirements of competitive advantage are clearly explained

Assignments and class in demonstrations

Written assignments, model answer

133

implementation. 3.5.1 Discuss the risk, security and control issues associated with management information systems. 3.5.2 Discuss the control measures for the risks associated with managing information systems. Discus Systems integrity and risk assessment. Discuss Information systems security and control. Discuss Systems vulnerability and abuse. Discuss Systems quality problems. Discuss Control environments. Discuss Internet security challenges. Discuss Ensuring systems quality. Discus Disaster recovery and business continuity planning. Discuss risk control measures Discuss information systems vulnerability control Discuss information system security control The control measures for the risks associated with managing information systems are thoroughly discussed Assignments Model answers The risk, security and control issues associated with management information systems are thoroughly discussed. Assignments and class in demonstrations Written assignments, model answer

134

3.6.1 Review the range of professional issues, which are associated with business activities and management information systems.

Discuss Privacy and how this is managed. Discuss Intellectual property issues. Discus Codes of conduct and professional practice.

The range of professional issues, which are associated with business activities and management information systems are correctly reviewed

Assignments and class in demonstrations

Written assignments, model answer

3.6.2 Evaluate business activities that needs information systems support for better performance

Discuss business activities Discuss information systems Relate business activities to the information systems supporting them Discuss organizational performance

The business activities that needs information systems support for better performance are correctively evaluated

assignments

Model answers

135

4.1.1 Configure Network Adapter and Modem

Identify Compatible modem, Ethernet card, sound card or other PCI card. Cross-point (Philips) Screwdriver suitable for your PC case. Use Fixing screw (usually comes with the case). Use Anti-Static Wrist-strap (if available) Locate the PCI slots

Network Adapter and Modem are correctly configured

Assignments and class in demonstrations

Written assignments, model answer

4.1.2 Set up Repeaters and Bridges

Enter global configuration mode. Enter interface configuration mode for the radio interface Create the SSID that the repeater uses to associate to a root access point Designate the SSID as an infrastructure SSID Exit SSID configuration mode and return to radio interface configuration mode Set the access point's role in the wireless LAN to repeater.

Repeaters and bridges are correctly set up

Assignments and class in demonstrations

Written assignments, model answer

136

Return to privileged EXEC mode.

4.1.3 Set up Hub and Switch

Find the WAN or uplink port of the Ethernet hub. Connect an Ethernet cable from the WAN port of the hub to either the Ethernet port of the internet modem or, if expanding a network, to an empty LAN port on the existing networks router, switch or hub.

Hubs and switches are correctly set up

Demonstration and observation

Written materials.

Plug an Ethernet cable into one of the LAN ports on the Ethernet hub and connect the other end of cable to the computer

Power up the Ethernet hub and the computers or other devices attached to it.

Configure the network settings on each connected computer. Verify that all computers can access the network and the Internet if
137

connected 4.1.4 Connect Wireless Access Point and configure 4.1.5 configure Router Find the IP addresses of your existing Wireless Access gateway/router and clients Connect to your router administration interface to find the DHCP range Connect a computer to the wireless router/AP Configure the wireless router / AP Test admin page is reachable and secure the AP Test the AP wireless connection IDENTIFY different modes; user EXEC ,privileged EXEC, global config ,interface config, setup Enter the model ;user ,privileged EXEC Enter the configuration mode Configure the IP address Configure the routing protocol Open shortest path first (OSPF) Create the IGRP Routing Process Router is correctly configured Demonstration and observation Written materials. Point is correctly connected and configured Demonstration and observation Written materials.

138

Enable and configure BGP Routing

4.2.1 Configure ARP

Define a Static ARP Cache Entry, Enable Proxy ARP, Configure DAGR, Configure ARP purge-delay Configure ARP timeout

ARP is correctly configured

Demonstration and observation

Written materials.

4.2.2 Configure ICMP

Allow ping ICMP Echo-Request outbound and Echo-Reply messages inbound.

ICMP is correctly configured

Demonstration and observation

Written materials.

4.2.3 Configure BOOTP

Allow traceroute TTL-Exceeded and Port-Unreachable messages inbound. Allow path MTU ICMP FragmentationDF-Set messages inbound. Block other types of ICMP traffic Chose and Decide the values that you BOOTP is want in the BOOTP packet reply fields: Choose and Decide the list of options
139

Demonstration and observation

Written materials.

correctly configured

and their values that you want returned to the BOOTP client Set values in the policy you want associated with the BOOTP request: Enable the associated scope or scopes for BOOTP processing. Enable dynamic BOOTP processing if you want to have this scope provide an address for any BOOTP client that requests one 4.2.4 Configure DHCP 4.2.5 Configure DNS 4.2.6 Configure LDAP Configure a database agent and disable conflict loggins Exclude IP addresses Configure a DHCP address pool Choose a Domain name Enable The Boot File Start the named Daemon Test the DNS Configuration Locate the LDAP configuration files add the appropriate files to your server configuration Restart the server
140

DHCP is correctly configured

Demonstration and observation

Written materials.

DNS is correctly configured

Demonstration and observation

Written materials.

LDAP is correctly configured

Demonstration and observation

Written materials.

Edit the containers.ldif file in order to include the correct LDAP suffix for your directory

Use the ldapadd command to add the containers. Use a bind DN that has the appropriate permissions.

4.3.1 Troubleshoot problems with computer systems

Verify connections Ensure compatibilities of added devices in a network Verify functionalities of network devices Verify correct protocols are installed in a computer Ensure the firewall ports are open Use troubleshooting tools: ping, ifconfig ,arp, snoop, ndd,netstat, traceroute

Problems with computer systems are properly troubleshot.

Demonstration and observation

Written materials.

4.3.2 Assist users to resolve problems with equipment and data

Set up the same IP scheme (e.g. 192.168.0.x). Mask, Gateway, and DNS IP addresses

Users are assisted to with equipment and data

Demonstration and observation

Written materials.

Make sure you have the same Subnet resolve problems

141

Make sure you can ping the other computers by IP ADDRESS and name

satisfactorily

Make sure you have the same workgroup name (watch for trailing spaces)

With Windows2000, XP and Vista, make sure you have the same username and password as the person logging onto the other computers. The default setting for all but the Home Versions is to require a password for network access

Remove any unnecessary firewalls, protocols or other configurations the complicate the troubleshooting process. You can add them back in later after you get things working.

4.3.3 Plan, design, acquire new or upgraded hardware

Identify different versions of software to be used in upgrading the network Identify different hardware to be

New upgraded hardware and software are

Exercise, assignment

Questions and model answer.

142

and software

used in the upgrading Plan and design the network

properly planned, designed and acquired.

4.3.4 Install LAN/WAN and maintain Computer

Choose LAN/WAN design considerations Identify hub, switch, repeater, router to be used Identify cables: UTP/STP ,Coax, macro wave Identify IP address, subnet mask, default gateway, DHCP, proxy server Design a switched LAN Describe application layer Describe presentation layer Describe session layer Describe transport layer Describe network layer Describe data link layer Describe physical layer

LAN/WAN is correctly installed and computer properly maintained

Demonstration and observation

Written materials.

4.3.5 Apply ISO management model

ISO management model is properly applied

Exercise, assignment

Questions and model answer.

143

5.1.1 Explain the role of CPU

Describe the functions of CPU

The role of CPU explained

Exercise, assignment

Questions and model answer.

Describe different types of processors is clearly

5.1.2 Describe the component parts of CPU

Identify control unit Identify ALU Identify RAM Identify registers Identify how the computer is in instruction instruction sequence

The CPU components are clearly described

Exercise, assignment

Questions and model answer.

5.1.3 Describe purpose of instruction pointer

The purpose of instruction pointer is clearly described

Exercise, assignment

Questions and model answer.

5.1.4 Describe steps in processing an instruction

Identify and describe instruction fetch Identify and describe instruction decode Identify and describe instruction

Steps of processing an instruction are clearly described

Exercise, assignment

Questions and model answer.

144

execution 5.2.1 explain the purpose of memory cell Identify and describe instruction/data storage Identify cache memory Identify flash BIOS memory Describe memory address The purpose of memory cell is clearly described. Exercise, assignment Questions and model answer.

5.2.2 apply RAM and ROM

Describe the functions and uses of RAM Describe the functions and use of ROM

RAM and ROM are properly applied.

Exercise, assignment

Questions and model answer.

5.2.3 Identify different types of ROM

Describe Mask-Programmed ROM (MROM) Describe Erasable-Programmable ROM (EPROM). Describe Electrically Erasable PROM (EEPROM) Analyse the storage capacity of bit

Different types of Exercise, ROM are identified. assignment

Questions and model answer.

Describe Programmable ROM (PROM) correctly

5.2.4 Describe

Storage

Exercise,

Questions and
145

storage capacities

Analyse the storage capacity of byte Analyse the storage capacity of word Analyse the storage capacity of kilobyte(KB) Analyse the storage capacity of megabyte (MB) Analyse the storage capacity of gigabyte (GB) Analyse the storage capacity of terabyte (TB)

capacities are clearly described

assignment

model answer.

5.2.5 differentiate internal and external buses

Describe internal/external parallel bus Internal and Describe internal/external serial bus Describe self-repaired internal bus Describe: PCI,PCIEXPRESS,AGP,USB,FIREWIRE PS/2 Describe the OCR Describe the MCR Describe the MICR Different character recognition devices are correctly external buses are clearly differentiated

Exercise, assignment

Questions and model answer.

5.3.1 Identify different Character recognition devices

Exercise, assignment

Questions and model answer.

146

identified. 5.3.2 Explain the role of barcodes 5.3.3 Identify different types of magnetic Tapes discus different barcode symbols discuss different scanning devices Discuss the functions of barcode readers Describe open pool tape Describe cassette tapes Describe tape cartridges Different types of Exercise, magnet tapes are clearly identified 5.3.4 Identify different types of magnetic disks Describe hard disk Describe floppy disks Different types of Exercise, magnetic disks are correctly identified 5.3.5 Asses hard disk performance Explain latency Explain seek time Explain transfer rates Hard disk performance is correctly assessed. 6.1.1Audit Information Systems Explain different categories of Audit assignment Information systems are
147

The role of bar code reader is clearly explained.

Exercise, assignment

Questions and model answer.

Questions and model answer.

assignment

Questions and model answer.

assignment

Exercise, assignment

Questions and model answer.

Exercise,

Questions and

according to required procedures

Obtaining and recording an understanding of the audit area/subject

properly audited according to required procedures.

assignment

model answer.

Explain sources of information for tests.

6.1.2 Conduct information systems Risk Assessment and arrange sequence of functions

Perform Compliance test Perform Substantive test Develop Audit plan according to risk level Gather and assess Evidence Produce report Present report to Communicate results

Risk assessment for information systems is properly conducted and sequence of functions properly arranged.

Exercise, assignment

Questions and model answer.

6.1.3 Perform audit assignment

Produce detailed audit plan Preliminary review of the audit area/subject Evaluating the audit area/subject

Audit assignments are correctly performed

Exercise, assignment

Questions and model answer.

148

6.2.1Assess Information Technology Governance

Reporting (communicating results) Explain existing standards for effective Information Technology Governance Evaluate sufficiency of Information systems policy and Procedures Evaluate adherence of the procedures to the to regulatory standards Information Technology Governance is correctly assessed Exercise, assignment Questions and model answer.

Assess effectiveness of available resources to satisfy required obligations.

6.2.2 Assess adherence of Information Systems development life cycle management

Evaluate procedures for Information Systems Life Cycle Management Explain procedures for Explain procedures for systems testing Evaluate sufficiency of real life test to the standard test procedure

Adherence of Information Systems development life cycle management is correctly assessed.

Exercise, assignment

Questions and model answer.

149

6.2.3 Conduct Tests to check Business continuity Management

Explain components of business continuity plan Develop a business continuity plan Explain decision criteria of levels of risk for business continuity. Test business continuity plan Explain components of Disaster recovery plan Evaluate roles of key players of disaster recovery plan Explain recovery strategy Test practical disaster recovery plan

Business continuity Management tests are properly conducted Test to check effectiveness of disaster recovery planning is properly conducted

Exercise, assignment

Questions and model answer.

6.2.4 Conduct test to check effectiveness of Disaster recovery planning

Exercise, assignment

Questions and model answer.

6.3.1Ensure Security of Information assets

Explain concepts of Confidentiality, Integrity, and Availability Assess different categories of physical and logical access controls. Explain Public Key Infrastructures

Security of information assets is correctly assessed

Exercise, assignment

Questions and model answer.

150

and applicability to information assets protection 6.3.2 Conduct test of Security procedures and components Test controls to evaluate sufficiency of security of real business case Develop procedures for classifying information assets Test on Security procedures and components are properly conducted. Exercise, assignment Questions and model answer.

6.4.1 Describe objectives of entrepreneurship

Explain background to entrepreneurship Define entrepreneurship

Objectives of entrepreneurship are properly described

Assignment, class exercises

Model answers, checklist

6.4.2 Analyze entrepreneurship in business organization

List categories of businesses Mention characteristics of entrepreneurship

Entrepreneurship in business organization is properly analyzed

Assignment, class exercises

Model answers, checklist

6.4.3 Discuss the importance of

Define information system Assess relationship between

The importance of information

Assignment, class exercises

Model answers, checklist


151

information system in entrepreneurship

information systems and the activities system in of the business entrepreneurship is properly discussed

6.4.4 Discuss the role of entrepreneurship concepts in developing business

Describe entrepreneurship concepts Discuss different types of businesses Identify sources of business finance

The role of entrepreneurship concepts in developing business is properly discussed

Assignment, class exercises

Model answers, checklist

152

11.0 BENCHMARKING OF ASSESMENT CRITERIA ASSESMENT CRITERIA 1.1.1 Structure of a program is clearly described. SATISFACTORY Declares comments in a C++ program , library function and use namespace std; GOOD Declares comments in a C++ program ,library function and gives example #include <iostream>,declares and uses namespace std;and declares the main function ;int main () EXCELLENT Declares comments, library function #include <iostream> in a C++ std;main function ;int main (), and displays function; cout << "Hello World!"

program declares and uses namespa

1.1.2

Variables and data types are correctly declared

Identifies reserved key words, describes and declares integers.

Identifies reserved key words, Describe and declare integers, Boolean, float, character, double.

Identifies reserved key words, describes and declare integers, initializes variables

boolean, float, character, double, and

1.1.3

Constants are correctly identified and declared

Identifies and declare literals

Identifies and declare literals, integer numbers. Identifies different types of operators; assignment, arithmetic, compound,

Identifies and declare literals, intege numbers, float pointers constants.

1.1.4

Operators in C++ program are Identifies different types of correctly assigned. operators; e.g. assignment, arithmetic, compound, increase

Identifies different types of operators assignment, arithmetic, compound,

increase and decrease, relational and


153

and decrease.

increase and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff, and precedence operators.

equity, logic, conditional, comma,

bitwise, sizeoff, precedence operator Assign different types of operators; assignment, and decrease, relational and equity, logic, conditional, comma, bitwise, sizeoff, and precedence operators.

arithmetic, compound, increas

1.1.5

Basic Input/ Output are correctly identified and declared

Identifies Standard Output (cout).

Identifies Standard Output (cout) and Standard Input (cin).

Identifies and declares Standard Standard input (cin). Declares wide range of conditional structures (if..else), iteration structure (loops: while, dowhile, and go to statements, and applies
154

Output (cout), identifies and declares

1.2.1

Control structures in C++ program are properly applied and used

Declares some conditional structures (if..else), iteration structure ( loops: while, dowhile, forloop.

Declares more conditional structures (if..else), iteration structure (loops: while, dowhile, forloop), jump statements, continue

forloop), jump statements, continu

and go to statements.

conditional structures (if..else), iteration structure (loops: while, continue and go to statements.

dowhile, forloop), jump statemen

1.2.2

Different types of C++ program are correctly declared.

Identifies some types of functions: exit, selective switch, void.

Identifies more different types of functions: exit, selective switch, void, passing arguments, overloaded, inline, recursivity.

Identifies and declares more differen types of functions: exit, selective switch, void, passing arguments, overloaded, inline, recursivity.

1.3.1

Arrays in C++ program are properly declared

Initializes arrays and describes multi-dimension arrays

Initializes arrays, describes multi-dimension arrays, and passes parameters

Initializes arrays, describes multi-

dimension arrays, Pass parameters a Accesses values of an array

1.3.2

Character sequences are correctly declared

Initializes null-terminated character sequence

Initializes null-terminated character sequences, and applies null-terminated character sequence

Initialize null-terminated character

sequence thoroughly, and Applies n correctly

terminated character sequence very

155

1.3.3

Pointers are correctly declared

Applies reference operator, and deference operators

Applies reference operator, and deference operators and variables of pointer types

Applies: reference operator, deferen operators, variables of pointer types and initializes pointers; arithmetic, void, pointer to pointer, pointer function and nully-pointers to

1.3.4

Dynamic memory in C++ program are properly allocated

Applies operators new and new[]

Applies operators new and new[], and operators delete, and delete[]

Applies operators new and new[], operators delete, and delete[], and also memory in ANSI-C

1.3.5

Data structures in C++

Applies structure_name, pointer

Applies structure_name, object_name, pointer to pointer and also nesting structure

Applies structure_name, object_nam pointer to pointer, nesting structure also Applies other data types( typedef)

program are correctly declared object_name, and pointer to

1.4.1

Classes in C++ program are correctly declared

Applies class_name, object_name, and specifies private class

Applies class_name, object_name, and specifies private, public/protected

Applies class_name, object_name, and also class functions: and destructors

Specifies private, public/protected cla

construct

, overloading an
156

classes

default.

1.4.2

Friendship and inheritance are correctly declared

Applies friend functions, and friend class

Applies friend functions, friend class, and inheritance between classes

Applies friend functions, friend class, applies multiple inheritance.

inheritance between classes, and als

1.4.3

Polymorphism in C++ program are correctly applied

Declares pointers to base class

Declares pointers to base class, virtual members

Declare pointers to base class, virtua members and also abstract base

1.4.4

Message in C++ program are correctly passed

declares message

declares message, and finds object(s) to pass method

declares message, finds object(s) to be invoked

pass message, and finds a function t

2.1.1

Apache, PHP, Mysql or Wamp/ Xamp are properly downloaded and saved in a computer

Connects to the internet, downloads PHP for free : http://www.php.net/downloads.p hp

Connects to the internet, downloads PHP for free : http://www.php.net/downlo ads.php, MySQL for free : http://www.mysql.com/dow nloads/

Connects to the internet downloads PHP for free :

http://www.php.net/downloads.php, Downloads MySQL for free : http://www.mysql.com/downloads/,


157

and Downloads Apache for free :

http://httpd.apache.org/download.cg 2.1.2 Apache, PHP, Mysql or Wamp/ Xamp are properly installed opens the Apache/php/mysql installs file downloaded, opens the Apache/php/mysql installs file downloaded, reaches the Server Information screen during downloading opens the Apache/php/mysql and installs the file downloaded, reaches the Server Information screen, then chooses the complete installation button.

2.1.3

The web server is properly used

Installs the web server software on the computer.

installs the web server software on the computer, and assigns a domain name.

installs the web server software and also installs antivirus software

on

the computer, assigns a domain nam

2.2.1

Files are read and written properly

applies PHP-file open: write, file fwrite function

applies PHP-file open: write, file fwrite function, file-

applies PHP-file open: write, file fwrit

function, file-write:overwrite function

158

write:overwrite function

and also

applies the above in reading t

2.2.2

API files are properly manipulated

views and modifies file attributes, views and modifies file reads and lists directory contents, attributes, reads and lists permissions,

views and modifies file attributes, reads and lists directory contents,

directory contents, alters file alters file permissions, retrieves file

contents into a variety of native data specific patterns.

structures, searches for files based o

2.2.3

Files are uploaded and exited successfully

creates table upload

creates table upload, uploads the data/files

creates table upload, uploads the

data/files, and applies fclose() functi

2.3.1

PHP syntax is properly applied

applies general PHP scripting block

applies PHP scripting block, applies PHP output text: e.g. echo

Applies PHP scripting block, PHP outp text: .e.g.

echo, print, HTML tag

159

2.3.2

Variables are properly declared

identifies the variable name and value, applies $ to each variable name, declares $var_name = value;

identifies the variable name and value, applies $ to each variable name, declares $var_name = value; and applies Predefined variables

identifies the variable name and valu applies $ to each variable name,

declares $var_name = value; applies scope, and applies variables from outside PHP

predefined variables, applies Variable

2.3.3

Arrays are correctly declared

identifies different types of arrays; Numeric array , Associative array, Multidimensional array

identifies different types of arrays; Numeric array , Associative array, Multidimensional array initializes array,

identifies different types of arrays; Numeric array , associative array, and also applies array declaration

multidimensional array, initializes arr

2.3.4

Functions are correctly declared

identifies built-in functions and user defined functions, applies the PHP syntax for functions:

identifies built-in functions and user defined functions, applies the PHP syntax for functions: function functionName()

identifies built-in functions and user defined functions, applies the PHP syntax for functions:

function functionName() { code to be executed; },


160

function functionName() { code to be executed; }

{ code to be executed; }, applies function calling, User-defined functions

applies function calling, User-defined Applies Returning values, Applies Variable functions.

functions, Applies Function argumen

2.3.5

Classes and objects are correctly declared

Auto loads Objects, Applies the following Constructors and Destructors, Applies Visibility, Scope Resolution Operator (::), Static Keyword, Comparing objects and Reflection

Autoload Objects, Applies: Constructors and Destructors, Visibility, Scope Resolution Operator (::), Static Keyword, Object Constants, Applies Object Abstraction, Object Interfaces, Overloading, Object Iteration, and applies Patterns.

Autoload Objects, Applies Constructo and Destructors, Visibility, Scope Resolution Operator (::), Static Keyword, Object Constants, Object Abstraction, Object Interfaces,

Overloading, Object Iteration, Patter cloning, Comparing objects and Reflection.

Magic Methods, Final Keyword, Obje

161

2.3.6

Strings operations in PHP are correctly declared

Applies: string concatenation, strlen() function, strps() function

Applies: string concatenation, strlen() function, strps() function, Identifies different operators :arithmetic, assignment, comparison, and logic operators.

Applies: string concatenation, strlen function, strps() function, Identifies: different operators

:arithmetic, assignment, comparison, different operators :arithmetic, assignment, comparison, and logic operators

and logic operators, and also applies

2.4.1

Web site structure is correctly declared

Prepares homepage( index page), main section ( site index)

Prepares homepage( index page), main section ( site index), and subsection( content)

Prepares homepage( index page), m section ( site index), subsection(

content) and links between sections.

2.4.2

Graphic resources are properly Explains graphics. prepared

Explains graphics and differentiate graphics.

Explains graphics, differentiates graphics, and finds graphics. Explains template, differentiates
162

2.4.3

Templates are properly

Explains template.

Explains template,

designed and template resources are correctly uploaded 2.4.4 All modules are correctly created and added to templates Defines modules.

differentiate templates, and locate template resources.

templates, and locates template resources.

Defines modules and differentiate modules.

Define modules, differentiate module and attach modules

2.4.5

Pages and forms are correctly created

Defines form.

Defines form, and finds contents.

Defines form, finds contents, and explains HTML Tags

3.1.1

The relationship between the business organization ,processes and functions and the associated supporting management information systems are thoroughly discussed

Applies the Business Organization and Supporting Management Information Systems by: Identifying Systems and Systems Thinking, Outline Information

Applies the Business Organization and Supporting Management Information Systems by: Identifying Systems and

Applies the Business Organization an Systems by: Identifying Systems and Systems Thinking, Outlining Information

Supporting Management Information

Systems Thinking, Outlining, systems in modern organizations,

systems in modern organizations, Information systems in

discussing types and characteristics o


163

discusses types and characteristics of systems.

modern organizations. Discusses types and

systems, Describing business process and information systems, Customer SCM, Discussing Collaborative commerce, Enterprise systems. Also Outlining Organizations and information systems.

Describe: Business processes and characteristics of systems. information systems, Customer Relationship Management (CRM) and SCM. Discusses Collaborative commerce. Describes business processes and information systems, Customer relationship Management (CRM) and SCM. Discusses: Collaborative commerce, Enterprise systems. Outline Organizations and information systems, and Organisations, procedures, politics and culture.

Relationship Management (CRM) and

Discussing Organizations, procedures politics and culture, Organizational structures and environments, The

changing role of information systems effects of information systems on organizations.

organizations, Economic and behavio

3.1.2

Appropriate management information systems for the

Mentions Types of Management Information Systems by

Mentions Types of Management Information

Discuss Types of Management Information Systems by analyze the


164

range of business functions and organizational levels are appropriately explained

analyzing the type of management information systems by level and function:operational and knowledge levels

Systems by analyzing the types of management information systems by level and function: operational level, knowledge level, management level, strategic level.

types of management information systems by level and function: operational level, knowledge level, management level, strategic level.

3.2.1

The impact of new technology on business processes and associated management information systems is correctly assessed

Discusses E-commerce, ebusiness and information the digital firm, New business models, Categories of ecommerce.

Discusses E-commerce, ebusiness and information technology and the digital firm, New business models, Categories of e-commerce, Analyse Customer-centred retailing, Business-toBusiness (B2B).

Discusses E-commerce, e-business a information systems, Internet business models, Categories of e-

systems, Internet technology and systems, Internet

technology and the digital firm, New

commerce, analyse Customer-centre E-business and the digital firm, Challenges and opportunities of ecommerce.

retailing, Business-to-Business (B2B)

165

3.2.2

The emerging business technologies environments and practices of management information systems are clearly explained

Discusses business-to-business (B2B) business.

Discusses business-tobusiness (B2B) business, electronic business (ebusiness).

Discusses business-to-business (B2B business, electronic business (ebusiness) and the digital firm, and challenges and opportunities of ecommerce.

3.3.1

Managerial decision making processes in business are thoroughly discussed.

Discusses how to Manage the organization, Models and roles of management, Management decision making, Process, stages and models of decision making.

Discusses how to Manage the organization, Models and roles of management, Management decision models of decision making. Discuss Information systems and business strategy, Strategic information systems, and the value chain model.

Discusses how to Manage the organization, Models and roles of management, Management decision making, Process, stages and models

making, Process, stages and decision making. Discuss Information systems and

business strategy, Strategic informat and industry level strategy and information systems.

systems, the value chain model, Firm

166

3.3.2

The relationship between decision making and management information systems is clearly explained at different levels of an organization

Explains briefly the Decision Making and Management Information Systems at Different Levels in the Organization.

Discusses generally the Decision Making and Management Information Systems at Different Levels in the Organization :Decision Support Systems (DSS),Types of DSS, Components of a DSS,DSS applications.

Discuss the Decision Making and Different Levels in the Organization: of DSS, Components of a DSS, DSS control, Executive support systems (ESS),Role, benefits and success factors of ESS.

Management Information Systems at

Decision Support Systems (DSS), Typ

applications, Modeling, planning and

3.3.3

The importance of collaborative decision making environments and review group management information Systems is correctly evaluated

Discusses briefly the Collaborative Decision Making Group Decision Support Systems (GDSS).

Discusses the Collaborative Decision Making Processes: Group Decision Support success in enhanced collaborative decision making.

Discusses at lengthy the Collaborativ Decision Making Processes:

Processes: Collaborative working, Collaborative working,

Collaborative working, Group Decisio

Support Systems (GDSS), Factors for decision making.

Systems (GDSS), Factors for success in enhanced collaborative

3.3.4

The concepts and knowledge and knowledge management

Mentions knowledge and knowledge management

Discusses Knowledge and knowledge management,

Discusses Knowledge and knowledge management, Systems and


167

are properly applied in the management information systems context

elements, Systems and infrastructure for knowledge management.

Systems and infrastructure for knowledge management, Information and knowledge work systems, Enterprise knowledge environments.

infrastructure for knowledge management, Information and knowledge environments, Business intelligence and enterprise reporting and analysis.

knowledge work systems, Enterprise

3.4.1

The key requirements of competitive advantage are clearly explained

Mentions the Competitive Advantage as a Driver for Management Information Systems.

Mentions and explains the Competitive Advantage as a Driver for Management Information Systems: Information systems for and ERP, Organizational design.

Discusses the Competitive Advantage as a Driver for Management Information Systems: Information systems for competitive advantage,

SCM and ERP, Organizational design

competitive advantage, SCM Business value of information

,Managing change and implementatio

3.5.1

The risk, security and control issues associated with Management information systems are thoroughly discussed.

Mentions the following: Systems integrity and risk assessment, Information systems security and control, Systems vulnerability and abuse, Systems quality problems, Control environments,

Mentions the following: Systems integrity and risk assessment, Information systems security and control, Systems vulnerability and abuse,

Discusses the following: Systems integrity and risk assessment, Information systems security and control, Systems vulnerability and abuse, Systems quality problems,

Control environments, Internet secur


168

Internet security challenges, Ensuring systems quality, and Disaster recovery and business continuity planning. 3.5.2 The control measures for the risks associated with managing information systems are thoroughly discussed 3.6.1 The range of professional issues, which are associated with business activities and management information systems are correctly reviewed 3.6.2 The business activities that needs information systems support for better performance are correctively evaluated Discusses business activities, information systems. Discusses privacy and how this is managed. Discusses risk control measures.

Systems quality problems, Control environments.

challenges, Ensuring systems quality and Disaster recovery and business continuity planning.

Discusses risk control measures, and information systems vulnerability control. Discusses privacy and how this is managed, and intellectual property issues.

Discusses risk control measures, information systems vulnerability control, and information system security control. Discusses privacy and how this is

managed, Intellectual property issue practice.

and Codes of conduct and profession

Discusses business activities, information systems, and relate business activities to the information systems

Discusses business activities, information systems, and relate systems supporting them, and organizational performance.

business activities to the information

169

supporting them. 4.1.1 Network Adapter, Modem are correctly configured Identifies Compatible modem, ethernet card, sound card or other PCI card. Identifies Compatible modem, ethernet card, sound card or other PCI card, Cross-point (Philips) Screwdriver suitable for your PC case. Identifies Compatible modem, ethernet card, sound card or other PCI card, Cross-point (Philips)

Screwdriver suitable for your PC case

and Uses Fixing screw (usually come

with the case), Anti-Static Wrist-strap

(if available)and Locates the PCI slo 4.1.2 Repeaters and bridges are correctly set up Enters global configuration mode and interface configuration mode for the radio interface. Enters global configuration mode and interface configuration mode for the radio interface. Creates the SSID that the repeater uses point and Sets the access point's role in the wireless LAN to repeater.

Enters global configuration mode and interface configuration mode for the the repeater uses to associate to a

radio interface. Creates the SSID tha

root access point, designates the SSI configuration mode and return to radio interface configuration mode, Sets the access point's role in the to privileged EXEC mode.

to associate to a root access as an infrastructure SSID, exits SSID

wireless LAN to repeater and Returns

170

4.1.3

Hub and switches are correctly Finds the WAN or uplink port of set up the Ethernet hub and Connects an Ethernet cable from the WAN port of the hub to either the Ethernet port of the internet modem or, if expanding a network, to an empty LAN port on the existing networks router, switch or hub.

Finds the WAN or uplink port of the Ethernet hub and Connects an Ethernet cable from the WAN port of the hub to either the modem or, if expanding a network, to an empty LAN port on the existing networks router, switch or hub.Plugs an Ethernet cable the Ethernet hub and connect the other end of cable to the computer

Find the WAN or uplink port of the cable from the WAN port of the hub

Ethernet hub and Connect an Ethern

either the Ethernet port of the intern

modem or, if expanding a network, t

Ethernet port of the internet an empty LAN port on the existing

networks router, switch or hub .Plug ports on the Ethernet hub and

an Ethernet cable into one of the LAN

connect the other end of cable to the

computer and Powers up the Etherne

into one of the LAN ports on hub and the computers or other network settings on each connected computer and verifies that all computers can access the network and the Internet if connected.

devices attached to it. Configures th

171

4.1.4

Wireless Access Point is correctly configured.

Finds the IP addresses of your existing gateway/router and clients and connects to your router administration interface to find the DHCP range

Finds the IP addresses of your existing gateway/router and clients and connects to your router administration interface to find the DHCP range,computer to the wireless router/AP and configures the wireless router / AP.

Finds the IP addresses of your existin gateway/router and clients and interface to find the DHCP range, computer to the wireless router/AP. Configures the wireless router / AP, tests admin page is reachable and secure the AP, tests the AP wireless connection

connect to your router administration

4.1.5

Router is correctly configured

Identifies different modes; user EXEC ,privileged EXEC, global config ,interface config, setup and Enters the model ;user ,privileged EXEC

Identifies different modes; user EXEC ,privileged EXEC, global config ,interface config, setup and Enters the model ;user ,privileged EXEC, the configuration mode and also Configures the IP address,

Identifies modes; user EXEC ,privileged EXEC, global config ,interface config, setup, Enters the model ;user ,privileged EXEC, ,privileged EXEC, global config ,interface config, setup, Enters the model ;user ,privileged
172

Identifies different modes; user EXEC

the routing protocol.

EXEC, the configuration mode and

Configures the IP address, the routin protocol also Opens shortest path first (OSPF), Creates the IGRP Routing Process, 4.2.1 The Address Resolution Protocol(ARP) is correctly configured Defines a Static ARP Cache Entry, Enables Proxy ARP, Defines a Static ARP Cache Entry, Enables Proxy ARP, Configures DAGR, Defines a Static ARP Cache Entry, Enables Proxy ARP, Configures DAGR, ARP purge-delay, ARP timeout

Enables and configure BGP Routing.

4.2.2

ICMP is correctly configured

Allows ping ICMP Echo-Request outbound and Echo-Reply messages inbound, traceroute TTL-Exceeded and Port-Unreachable messages inbound.

Allows ping ICMP EchoRequest outbound and Echo-Reply messages inbound, traceroute TTLExceeded and PortUnreachable messages inbound, MTU ICMP Fragmentation-DF-Set

Allows ping ICMP Echo-Request outbound and Echo-Reply messages inbound, traceroute TTL-Exceeded and Port-Unreachable messages inbound, MTU ICMP FragmentationDF-Set messages inbound. Blocks other types of ICMP traffic

173

messages inbound.

4.2.3

The BOOTP is correctly configured

Choses and Decide the values that you want in the BOOTP packet reply fields, and Decide the list of options and their values that you want returned to the BOOTP client

Choses and Decide the values that you want in the BOOTP packet reply fields, and Decide the list of options and their values that you want returned to the BOOTP client. Sets values in the policy you want associated with the BOOTP request:

Choses and Decide the values that you want in the BOOTP packet reply fields, and decide the list of options and their values that you want returned to the BOOTP client.

Sets values in the policy you want associated with the BOOTP request:

Enables the associated scope or dynamic BOOTP processing if you want to have this scope provides an address for any BOOTP client that requests one. 4.2.4 The Dynamic Host Control Protocol (DHCP) is correctly Configures a database agent and Configures a database agent and disable conflict
174

scopes for BOOTP processing, enable

Configures a database agent and

configured

disable conflict logins

logins Excludes IP addresses

disable conflict logins, Excludes IP addresses, Configures a DHCP address pool

4.2.5

Domain Name System(DNS) is correctly configured

Chooses a Domain name, Enables The Boot File

Chooses a Domain name, Enables The Boot File, Starts the named Daemon.

Chooses a Domain name, Enables The Boot File, Starts the named Daemon and Tests the DNS Configuration

4.2.6

LDAP is correctly configured

Locates the LDAP configuration your server configuration, Restarts the server

Locates the LDAP appropriate files to your server configuration, Restarts the server, Edits the containers. ldif file in order to include the correct LDAP suffix for your directory

Locates the LDAP configuration files, adds the appropriate files to your server configuration, Restarts the

files, adds the appropriate files to configuration files, adds the

server, and Edits the containers. Use LDAP suffix for your directory Uses the ldapadd command to add the containers. Use a bind DN that has the appropriate permissions.

ldif file in order to include the correc

175

4.3.1

Different computer systems problems are properly troubleshot

Verifies connections, Ensures compatibilities of added devices in a network, and Verifies functionalities of network devices

Locates the LDAP configuration files, adds the appropriate files to your server configuration, Restarts the server, Verifies connections, Ensures compatibilities of added devices in a network.

Locates the LDAP configuration files, adds the appropriate files to the server configuration, restarts the server, verifies connections, ensures compatibilities of added devices in a network, verifies functionalities of are installed in a computer, Ensures the firewall ports are open Uses troubleshooting tools: ping, traceroute

network devices and correct protoco

ifconfig ,arp, snoop, ndd,netstat

4.3.2

Equipment problems are resolved properly and users are able to do their work correctly

Sets up the IP scheme is the same, (e.g. 192.168.0.x), the same Subnet Mask, Gateway, and DNS IP addresses also can ping the other computers by IP ADDRESS and name.

Sets up the same IP scheme Sets up the same IP scheme (e.g. (e.g. 192.168.0.x), Subnet Mask, Gateway, and DNS IP addresses Also pings the other computers by IP ADDRESS and name, the same 192.168.0.x). Makes sure that there is the same Subnet Mask, Gateway, and DNS IP addresses, can ping the other computers by IP ADDRESS and name, have the same workgroup
176

workgroup name (watch for trailing spaces).

name (watch for trailing spaces) With Windows2000, XP and Vista, makes sure that have the same

username and password as the perso default setting for all but the Home network access

logging onto the other computers. Th

Versions is to require a password for

Removes any unnecessary firewalls, complicate the troubleshooting process. You can add them back in later after you get things working.

protocols or other configurations the

4.3.3

New upgraded hardware and designed and acquired

Identifies different versions of the network

Identifies different versions of software to be used in upgrading the network

Identifies different versions of network

software are properly planned, software to be used in upgrading

software to be used in upgrading the

Identifies different hardware Identifies different hardware to be to be used in the upgrading used in the upgrading Plans and designs the network
177

4.3.4

LAN/WAN is correctly installed and computer properly maintained

Chooses LAN/WAN design considerations. Identifies hub, switch, repeater, router to be used

Chooses LAN/WAN design considerations. Identifies hub, switch, repeater, router to be used and cables: UTP/STP ,Coax, macro wave

Chooses LAN/WAN design considerations.

Identifies hub, switch, repeater, rout to be used, cables: UTP/STP ,Coax, macro wave, IP address, subnet server and dsigns a switched LAN.

mask, default gateway, DHCP, proxy

4.3.5

ISO management model is properly applied

Describes application layer, presentation layer and the session layer

Describes application layer, presentation layer, session layer, and network layer

Describes application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer.

5.1.1

The role of CPU is clearly explained

Describes the functions of CPU

Describes the functions of CPU, different types of processors

Describes the functions of CPU,

different types of processors and giv

examples of different manufacturers.


178

5.1.2

The CPU components are clearly described

Identifies control unit, ALU

Identifies control unit, ALU, and RAM

Identifies control unit, ALU, RAM and registers

5.1.3

The purpose of instruction pointer is clearly described

Defines instruction cycle

Identifies different types of instruction cycle

Identifies how the computer is in instruction sequence Identifies and describe instruction fetch, Identifies and describe instruction decode, Identifies and describe instruction execution, Identifies and describe instruction/data storage.

5.1.4

Steps of processing an instructions are correctly described

Identifies and describes instruction fetch, and instruction decode.

Identifies and describes instruction fetch, instruction decodes, Identifies and describe instruction execution.

5.2.1

The purpose of memory cell is clearly described

Identifies cache memory

Identifies cache memory, and flash BIOS memory

Identifies cache memory, flash BIOS memory and Describes memory address

5.2.2

RAM and ROM are properly

Describes the functions and uses

Describes the functions and uses of RAM, the functions

Describes the functions and uses of RAM, the functions and use of ROM
179

applied.

of RAM

and use of ROM

and States the difference between the two.

5.2.3

Different types of ROM are correctly identified.

Describes Mask-Programmed ROM (MROM), Programmable ROM (PROM)

Describes MaskProgrammed ROM (MROM), Programmable ROM (PROM), ErasableProgrammable ROM (EPROM), MaskProgrammed ROM (MROM), and Programmable ROM (PROM).

Describes Mask-Programmed ROM Erasable-Programmable ROM (EEPROM), Mask-Programmed ROM (MROM), and programmable ROM (PROM)

(MROM), Programmable ROM (PROM

(EPROM), Electrically Erasable PROM

5.2.4

Storage capacities are clearly described.

Analyses the storage capacity of bit, the storage capacity of byte, and the storage capacity of word

Analyses the storage capacity of bit, the storage capacity of byte, the storage capacity of word, the storage capacity of kilobyte(KB)

Analyses the storage capacity of bit, the storage capacity of byte, the capacity of kilobyte(KB), the storage capacity of megabyte (MB), the storage capacity of terabyte (TB).

storage capacity of word, the storage

storage capacity of gigabyte (GB), th

180

5.2.5

internal and external buses are clearly differentiated

Describes internal/external parallel bus, internal/external serial bus

Describes internal/external parallel bus, internal/external serial bus and self-repaired internal bus

Describes internal/external parallel repaired internal bus, PCI,PCIEXPRESS,AGP,USB,FIREWIRE, PS/2

bus, internal/external serial bus, self

5.3.1

Different character recognition devices are correctly identified.

Describes the OCR

Describes the OCR the MCR

Describes the OCR, the MCR and the MICR

5.3.2

The role of bar code reader is clearly explained

discusses different barcode symbols

discusses different barcode symbols, different scanning devices

discusses different barcode symbols, different scanning devices, and the functions of barcode readers

5.3.3

Different types of are clearly identified.

Describes open pool tape

Describes open pool tape, cassette tapes

Describes open pool tape, cassette tapes, and tape cartridges

5.3.4

Different types of magnetic disks are correctly identified.

Describes hard disk

Describes hard disk, floppy disks

Describes hard disk, floppy disks, differentiates with other media e.g.
181

tape drives 5.3.5 Hard disk performance is correctly assessed. Explains latency Explains latency, seek time Explains latency, seek time, and transfer rates

6.1.1

Information systems are properly audited according to required procedures.

Explains different categories of Audit assignment

Explains different categories of Audit assignment, Obtains and recording an understanding of the audit area/subject

Explains different categories of Audit assignment, Obtains and recording an understanding of the audit area/subject, Explains sources of information for tests.

6.1.2

Risk assessment for information systems is properly conducted and sequence of functions properly arranged.

Performs Compliance test, Substantive test

Performs Compliance test, Substantive test and Develops Audit plan according to risk level

Performs Compliance test, Substantiv test, and

Develops Audit plan according to risk level, Gathers and assess Evidence,

182

Produces report, Presents report to Communicate results. 6.1.3 Audit assignments are correctly performed Produces detailed audit plan Produces detailed audit plan, and prepares Preliminary review of the audit area/subject Produces detailed audit plan, and prepares preliminary review of the audit area/subject, Evaluates the audit area/subject, Reports (communicating results). 6.2.1 Information Technology Governance is correctly assessed Explains existing standards for effective Information Technology Governance, Evaluates sufficiency of Information systems policy and Procedures Explains existing standards for effective Information Technology Governance, Evaluates sufficiency of Information systems policy and Procedures, Evaluates adherence of the procedures to the to regulatory standards Explains existing standards for effective Information Technology Governance, Evaluates sufficiency of Information systems policy and Procedures, Evaluates adherence of the procedures to the to regulatory standards, Assesse effectiveness of available resources to satisfy required
183

obligations. 6.2.2 Adherence of Information Systems development life cycle management is correctly assessed. Evaluates procedures for Information Systems Life Cycle Management, Explains procedures for Evaluates procedures for Information Systems Life Cycle Management, Explains procedures for system development, Explains procedures for systems testing

Evaluates procedures for Information Systems Life Cycle Management, Explains procedures for system testing, Evaluates sufficiency of real life test the standard test procedure

development, procedures for system

6.2.3

Business continuity management tests are properly conducted.

Explains components of business continuity plan, Develops a business continuity plan

Explains components of business continuity plan, Develops a business continuity plan, Explains decision criteria of levels of risk for business continuity.

Explains components of business continuity plan, Develops a business continuity plan, Explains decision criteria of levels of risk for business continuity, Tests business continuity plan

184

6.2.4

Disaster recovery planning is correctly performed

Explains components of Disaster recovery plan

Explains components of Disaster recovery plan, Evaluates roles of key players of disaster recovery plan

Explains components of Disaster recovery plan, Evaluates roles of key players of disaster recovery plan, Explains recovery strategy, and

Tests practical disaster recovery plan 6.3.1 Security of information assets is correctly assessed Explains concepts of Confidentiality, Integrity, and Availability Explains concepts of Confidentiality, Integrity, and Availability Assesses different categories of physical and logical access controls. Explains concepts of Confidentiality, Integrity, and Availability Assesses different categories of physical and logical access controls. Explains Public Key Infrastructures protection 6.3.2 Security procedures and components are correctly tested. Develops procedures for classifying information assets Develops procedures for classifying information assets, Tests controls to evaluate sufficiency of security of Develops procedures for classifying information assets

and applicability to information asset

Tests controls to evaluate sufficiency

185

of security of 6.4.1 Objectives of entrepreneurship are properly described Explains background to entrepreneurship Defines entrepreneurship 6.4.2 Entrepreneurship in business organization is properly analyzed Lists categories of businesses Explain background to entrepreneurship, and define entrepreneurship Lists categories of businesses, and mentions characteristics of entrepreneurship with examples 6.4.3 The importance of information system in entrepreneurship is properly discussed Define information system Define information system, and assess relationship between information systems and the activities of the business 6.4.4 The role of entrepreneurship concepts in developing Describes entrepreneurship Describes entrepreneurship concepts, and Define information system by information systems, and assess relationship between information systems and the activities of the business Describes entrepreneurship concepts, discusses different types of businesses, and
186

Explain background to entrepreneurship, and define relevant examples

entrepreneurship by providing

Lists categories of businesses,

and mentions characteristics o examples according to the context

entrepreneurship with correct

providing examples of differen

business is properly discussed

concepts.

discusses different types of businesses.

identifies sources of business finance

187

NTA LEVEL 6
12.0 MODULES DESCRIPTION ODIT 611: COMPUTER ARCHITECTURE NAME: COMPUTER ARCHITECTURE NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 5.1.1 Identify the role of CPU 5.1.2 Describe the component parts of CPU 5.1.3 Describe purpose of instruction pointer 5.1.4 Describe steps in processing an instruction 5.2.1 Describe the purpose of memory cell 5.2.2 Identify the use of RAM and ROM 5.2.3 Identify different types of ROM 5.2.4 Describe storage capacities(bit, byte, word, KB,MB,GB,TB) 5.2.5 Identify internal and external buses 5.3.1 Identify different Character recognition devices
188

5.3.2 Identify the role of barcodes 5.3.3 Identify different types Tapes 5.3.4 Identify different magnetic disks 5.3.5 Describe hard disk performance TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Abd-El-Barr M., El-Rewin M, (2008), Fundamentals of Computer Organization and Architecture, Addison Wesley, McGraw-Hill Co, USA 2. Carter N. P., (2008), Schaums Outline of Computer architecture, 5th Edition, Prentice Hall, India 3. Harris D. M., Harris S. L, (2007), Digital Design and Computer Architecture, 5th edition, Addison Wesley, McGrawHill Co, USA. 4. Hennesy J. L, et al, (2007), Computer Architecture- A Quantitative Approach, 4th Edition, McGraw-Hill, USA 5. Gragon H. C, (2007), Computer Architecture and Implementation, 4th edition, Prentice-Hall USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%


189

ODIT 612: PROGRAMMING IN C++ NAME: PROGRAMMING IN C++ NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 1.1.2 Describe Structure of a program 1.1.2 Declare Variables and Data types.

1.1.3 Use Constants 1.1.4 Assign Operators 1.1.5 declare Basic Input/ Output 1.2.1 Use Control Structures in a program 1.2.2 1.4.1 1.4.2 1.4.3 1.4.4 Declare Functions Declare Classes Declare Friendship and inheritance apply Polymorphism apply message passing

TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions

190

REFERENCES 1. 2. 3. 4. 5. Dale N. B., Weems C., (2004), Programming in C++, 4th Edition, Addison-Wesley Publishing Co. USA Deitel P., Deitel H. M, (2009), C++ How to Program, 7th Edition, Pearson Publishing Co. UK Duffy D. J., (2006), Introduction to C++ for Financial Engineers, 4th Edition, Pearson Publishing Co. UK Joyce F., (2008), Object Oriented Programming Using C++, 6th Edition, Addison Wesley Longman, USA. Mike M., (2006), C++ Programming in Easy steps, 5th edition, Addison Wesley Longman, USA.

INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%

191

ODIT 613: BUSINESS INFORMATION SYSTEMS NAME: BUSINESS INFORMATION SYSTEMS NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 3.1.1 Discuss the relationship between the business organization, processes and functions and the associated supporting management information systems. 3.1.2 Explain appropriate management information systems for the range of business functions and organizational levels. 3.2.1 Explain how new technology is impacting on business processes and associated management information systems. 3.3.1 Discuss the managerial decision making process in business. 3.3.2 Explain the relationship between decision making and management information systems at different levels of the organization. 3.3.3 Evaluate the importance of collaborative decision making environments and review group management information systems. 3.3.4 Explain the concepts of knowledge and knowledge management in the management information systems context. TEACHING AIDS:
192

Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Abramowic W., Fensel D., (2008), Business Information Systems, 5th Edition, Prentice Hall, Warsaw, Poland 2. Abramowic W., Mayr H. C, (2007), Technologies for Business Information Systems, 5th Edition, , Prentice- Hall, Warsaw, Poland 3. Abramowic W., Flejter D., (2009), Business Information Systems Workshops, 5th edition, Prentice-Hall, Poznan Poland 4. Curtis G., Cobham D., (2008), Business Information Systems: Analysis, Design and Practice, 5th Edition, Addison Wesley, McGraw-Hill Co. USA 5. Elliot G., (2007), Global Business Information Technology, 5th Edition, Addison Wesley, McGraw-Hill Co, USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%

193

ODIT 614: ENTREPRENEURSHIP NAME: ENTREPRENEURSHIP NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 6.4.1 Describe objectives of entrepreneurship 6.4.2 Analyze entrepreneurship in business organization 6.4.3 Discuss the importance of information system in entrepreneurship 6.4.4 Discuss the role of entrepreneurship concepts in developing business TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc. METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Carson M, Buckley P. J. (2010), Entrepreneurship: Theory, Networks, History, 2nd Edition, Prentice-Hall, Poznan Poland. 2. Davidson P., (2005), Researching Entrepreneurship, 5th Edition, Addison Wesley, McGraw-Hill Co, USA 3. Drucker P. F., (2009), Innovation and Entrepreneurship, 3rd Edition, Addison Wesley McGraw-Hill Co, USA 4. Kuratko D. F., Hodgetts R. M., (2008), Entrepreneurship: Theory, Process, and Practice, 4th Edition, Prentice- Hall, Delhi. 5. Wickham P. A., (2007), Strategic Entrepreneurship, Prentice-Hall, UK.
194

INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%

195

ODIT 621: INFORMATION SYSTEM ASSURANCE NAME: INFORMATION SYSTEMS ASSURANCE NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 6.1.1Perform Information Systems audit according to required procedures 6.1.2 Perform information systems Risk Assessment Arrange sequence of functions 6.1.3 perform audit assignment 6.2.1Assess Information Technology Governance 6.2.2 Assess adherence of Information Systems development life cycle management 6.2.3 Perform Tests to check Business continuity Management 6.2.4 Perform test to check effectiveness of Disaster recovery planning 6.3.1 Assess Security of Information assets 6.3.2 Test Security procedures and components

TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc
196

METHOD OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Andrew B., Kovacich G. L, (2006), Information Assurance: Security in the Information Environment, 6th Edition, Prentice Hall, Warsaw. 2. Dube D. P., Gulati V. P., (2005), Information Systems audit and Assurance, 5th Edition, Prentice Hall, New Delhi India. 3. Gelinas U. J., Dull R. B., (2009), Accounting Information Systems, 5th Edition, Addison Wesley Co., USA. 4. Qian Y., Tipper D., Krishnamurthy P., (2008), Information Assurance: Dependability and security in Networked Systems, 6th Edition, Prentice Hall, India. 5. Warketin M., Vaughn R., (2006), Enterprise Information Systems Assurance and System Security, 7th Edition, Addison Wesley, USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semister Examination 60%

197

ODIT 622: DATABASE DRIVEN WEBSITE DESIGN NAME: DATABASE DRIVEN WEBSITE DESIGN NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 2.1.1 download Apache, PHP, Mysql or Wamp/ Xamp 2.1.2 install download Apache,PHP, Mysql or Wamp / Xamp 2.1.3 use the server 2.2.1 reading and writing files 2.2.2 API file manipulation 2.2.3 Uploading and exit file 2.3.1 use PHP syntax 2.3.2 declare variables 2.3.3 declare arrays 2.3.4 declare functions 2.3.5 declare classes and objects 2.3.6 declare string operations
198

2.4.1 declare sites structure 2.4.2 prepare graphic resources 2.4.3 design templates, upload templates and resources 2.4.5 create all modules and add to templates 2.4.6 create pages and forms TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. 2. 3. 4. 5. Dunlap I. H, (2006), Open Source Database Driven Web Development, 5th edition, Kauffmann, USA Norman M., (2007), Database Design Using MySQL for Windows, 6th edition, Prentice-Hall, California, USA Oxer J., (2007), How to Build a Website and Stay Sane, 4th Edition, Prentice-Hall, USA Reynolds J., (2007), The Complete E-Commerce Book: Design, Build & Maintain, 6th Edition, Prentice-Hall, USA Yank K., (2008), Build Your Own Database Driven Website Using PHP & MySQL, 5th Edition, Addison Wesley, USA

INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%


199

ODIT 623: FUNDAMENTALS OF NETWORK ADMINSTRATION NAME: FUNDAMENTALS OF NETWORK ADMINISTRATION NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 4.1.1 configure Network Adapter, Modem 4.1.3 set Repeater and Bridge 4.1.4 set Hub and Switch 4.1.5 connect Wireless Access Point 4.1.6 configure Router 4.2.1 configure ARP 4.2.2 configure ICMP 4.2.3 configure BOOTP 4.2.4 configure DHCP 4.2.5 configure DNS 4.2.6 configure LDAP 4.3.1 Troubleshoot problems with computer systems
200

4.3.2 assist users to resolve problems with equipment and data 4.3.3 plan, design, acquire new or upgraded hardware and software 4.3.4 Install LAN/WAN (Cabling, Modifying, Testing), Maintaining Computer 4.3.5 Apply ISO management model TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions REFERENCES 1. Limoncelli T. A., et al, (2007), 8th Edition, McGraw-Hill, USA 2. Maiwald E, (2006), Fundamentals of Network Security, 4th Edition, Addison Wesley Co., USA 3. Skandier T., (2009), Network Administrator Street Smart: A Real World Guide to CompTIA, 6th Edition, PrenticeHall, USA. 4. Stein L. D., (2001), Network Programming with Perl, 5th edition, Pearson Publishing Co. Ltd, UK 5. Suehring S., et al, (2007), Wiley Pathways Windows Network Administration, 5th edition, Pearson Publishing Co. Ltd, UK INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%

201

ODIT 624: PROJECT DEVELOPMENT NAME: PROJECT DEVELOPMENT NO. OF CREDITS: 15 SUB-ENABLING OUTCOMES: 3.4.1 Explain the key requirement of competitive advantage that drives the need for management information systems and its manifestation through processes such as Supply Chain Management (SCM), Enterprise Resource Planning (ERP), organizational redesign and change. 3.5.1 Discuss the risk, security and control issues associated with managing Information systems projects. 3.6.1 Review the range of professional issues, which are associated with managing business project activities and management information systems.

TEACHING AIDS: Chalk boards, white board marker, power point, flip charts stand, pictures etc. METHODS OF INSTRUCTION: This module will be conducted through lecturers, demonstrations, role-plays and discussions

202

REFERENCES 1. Cleland D. I., Ireland L. R., (2006), Project Management: Strategic Design and implementation, 5th Edition, Pearson Publishing Co., UK. 2. Haynes M. E., (2006), Project Management: Practical Tools for Success, 5th edition, McGraw-Hill, USA 3. Heerkens G. R., (2007), Project Management: 24 Steps Help You Master any Project, 4th Edition, Pearson Publishing Co., UK. 4. Kerzner H., (2009), Project Management: A Systems Approach to Planning, Scheduling, 10th edition, McGraw-Hill, New Jersey, USA 5. Lewis J. P., (2007), Fundamentals of Project Management, 3rd Edition, Prentice-Hall, California, USA INTEGRATED METHOD OF ASSESMENT: Continuous Assessments - 40%

End of Semester Examination 60%

203

1.0

BACKGROUND INFORMATION The philosophy behind the development of competence modular curricula is to comply with the Nations Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative, and flexible work force that will be responsive to the social needs. Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills. The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g. create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 7 for the INFORAMTION AND COMMUNCITION TECHNOLOGY specialization. The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated for this qualification and this accounts for 34 weeks for a year or 68 weeks for the whole qualification of 2 years (4 semesters)

This level has a minimum number of 240 credits as prescribed by NACTE.

204

2.0

MODULE CODING

The coding of modules follows logical sequence as in the following example for HDIT 711.

HDIT

Stands for Higher Diploma in Technology

The first digit stands for the NTA level, in this case Higher Diploma which is level Seven.

The second digit stands for semester, i.e. for semester one

the last digit stands for the order of the module in the semester. Modules are arranged serially the highest number, depending upon the number for modules in the semester.

205

3.0 GRADING OF ASSESSMENT RESULTS The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 7 Grade A B+ B C F I Definition Excellence Very Good Good Average Failure Incomplete Score 75-100 65-74 55-64 40-54 0-39

206

4.0

AWARDS The award shall be made to students who satisfy the following conditions. (a) (b) (c) Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guideline

5.0

AWARDS CLASSFICATION

Awards Classification for NTA Level 7 Class of Award First Class Upper Second Lower Second Class Pass Cumulative GPA 4.4 to 5.0 3.5 to 4.3 2.7 to 3.4 2.0 to 2.6

207

6.0 SUMMARY FRAMEWORK QUALIFICATION HIGHER DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY PURPOSE OF QUALIFICATION This qualification is intended for persons who will configure and manage operating systems, prepare graphical user interfaces and animations, apply knowledge, skills and principles of

accounting and JAVA to prepare and manage office automation packages, including accounting packages, apply principles of computer network and other computing techniques to manage organization systems and recommend appropriate measures for management decisions. NTA LEVEL 7

COMPETENCE The holder of this qualification will apply knowledge, skills and principles in a broad range of LEVEL DESCRIPTOR complex technical ICT activities of developing and managing operating systems, graphical interfaces, animations and office automation packages with higher degree of personal responsibility and some responsibility for the work of others. CREDITS AT THIS LEVEL CUMULATIVE CREDITS AT THIS LEVEL MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL DATE

240

360

30 NEW
208

QUALIFICATION STANDARD LAST RVIEWED ENTRANCE REQUIREMENTS ODIT Level 6 or Form Six with 2 Principal level Passes, with total points of not less than 4.5; one of them should be either Physics or Advanced Mathematics.

7.0 PRINCIPAL LERNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA S/NO PRINCIPAL LEARNING OUTCOME CREDIT VALUE ASSESSMENT CRITERIA 1 2 Configure and manage Operating System Manage business environment performance and social well being by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication. 15 60 1.1 Operating Systems are properly configured and managed. 2.1 Computer graphics techniques to manage business performance are properly applied 2.2 Entrepreneurship skills to manage business performance are properly applied. 2.3 Knowledge and skills of development studies are properly applied in business environment. 2.4 Business Communication skills are properly applied for effective and efficient communication. 3.1 Artificial Intelligence skills in managing businesses are properly applied.

Apply Artificial Intelligence, Discrete Mathematics, Research methods and

60

209

Quantitative techniques in managing businesses.

3.2 Discrete Mathematics and statistics knowledge is properly applied to manage businesses. 3.3 Research methods skills and techniques are properly applied. 3.4 Quantitative techniques to solve business problems are properly applied.

Apply Java skills and knowledge of accounting in developing and managing different application programs

45

4.1 Java skills and knowledge to develop and manage application programs are properly applied. 4.2 Principles of accounting skills to manage application program are properly applied. 4.3 Knowledge and skills of computer applications are applied to manage accounting packages

Manage the organization information systems by applying skills and knowledge of computer network and multimedia.

30

5.1 Knowledge and skills of computer network are properly applied to manage organization information systems. 5.2 Knowledge and skills of multimedia are properly applied to manage organization information systems.

210

Apply technologies of mobile computing and explain the potential, importance and ways of utilizing them in ICT projects and working environment.

30

6.1 Knowledge and skills of mobile computing are clearly explained and properly applied to improve business performance. 6.2 Knowledge and skills of ICT Project management are properly applied to improve business performance.

TOTAL CREDITS FOR NTA LEVEL 7

240

211

8.0

PROGRAM STRUCTURE

SEMESTER I S/NO 1 2 3 4 CODE HDIT 711 HDIT 712 HDIT 713 HDIT 714 NAME OF MODULE Discrete Mathematics and Statistics Business Communication Computer Graphics Designing Operating Systems Configuration TOTAL CREDITS FOR SEMESTER I CREDIT 15 15 15 15 60

SEMESTER II S/NO 1 2 3 4 5 CODE HDIT 721 HDIT 722 HDIT 723 HDIT 724 HDIT 725 NAME OF MODULE Development Studies Principles of Accounting Artificial Intelligence Applications Quantitative Techniques Field Attachment TOTAL CREDITS FOR SEMESTER I 60 CREDIT 15 15 15 15

212

SEMESTER III S/NO 1 2 3 4 CODE HDIT 731 HDIT 732 HDIT 733 HDIT 734 NAME OF MODULE Multimedia Systems Design Programming with Java Research Methodology Computerized accounting TOTAL CREDITS FOR SEMESTER III CREDIT 15 15 15 15 60

SEMESTER IV S/NO 1 2 3 4 CODE HDIT 741 HDIT 742 HDIT 743 HDIT 744 NAME OF MODULE Networking Management Entrepreneurship Development Mobile Computing Project Management TOTAL CREDITS FOR SEMESTER IV GRAND TOTAL CREDITS FOR NTA LEVEL 7 CREDIT 15 15 15 15 60 240

213

9.0

NACTE STANDARDS AND RELATED ENABLING OUTCOMES ENABLING OUTCOMES (As Identified and Formulated by Curriculum Developers) 1.1 Configure Operating Systems SUB-ENABLING OUTCOMES

PRINCIPAL OUTCOMES (NACTE Standards) 1. Configure and manage Operating Systems.

1.1.1Install Operating Systems 1.1.2 Create users of operating systems with their rights.

1.2 Manage Operating System

1.2.1 Administer users of operating system 1.2.2 Secure Operating Systems components 1.2.3 Assess systems performance and diagnose faults

2. Manage business environment performance and social wellbeing by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication.

2.1 Design graphical user interfaces and animations

2.1.1 Design graphics in media such as print digital or motion pictures. 2.1.2 Decorate products 2.1.3 Assemble images, motions and graphics.

2.2 Communicate effectively in business environment and apply skills of development studies.

2.2.1 Apply writing and presentation skills for effective communication 2.2.2 Make effective presentations in international business environment
214

2.2.3 Interrelate different development studies concepts to manage business 2.2.4 Apply techniques to manage different social development challenges 2.3 Develop entrepreneurship venture and manage them for business growth 2.3.1 Prepare business plans 2.3.2 Apply marketing skills to market products for opportunities identified. 2.3.3 Apply skills for overcoming business challenges. 3. Apply Artificial Intelligence, Discrete Mathematics, Research methods and Quantitative techniques in managing businesses. 3.1 Apply intelligent algorithms, artificial intelligence and software tools to solve business problems 3.1.1 Interrelate Intelligent Algorithms tools to business problems. 3.1.2 Apply methods for encoding knowledge in computer systems 3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems. 3.2.2 Design quantitative models of estimation and forecasting for decision making. 3.3 Apply discrete Mathematical and Statistical techniques in computing operations. 3.3.1 Apply information technology in mathematical contexts 3.3.2 Explain the logical and systematic approach to solving problems in
215

3.2 Apply quantitative techniques calculations of real business transactions.

particular simple combinatorial problems. 3.4 Apply Research Methodology for writing the field attachment report. 3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations. 3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.

4. Apply Java skills and knowledge of accounting in developing and managing different application programs.

4.1 Prepare application programs using Object oriented tools

4.1.1 Analyze user requirements for program development. 4.1.2 Apply skills and knowledge of designing and building application programs.

4.1.3 Test and Implement application programs 4.2 Apply Principles of accounting to manage business finance 4.2.1 Prepare financial statements for business 4.2.2 Identify and describe legal aspects of company formation, shares and bonus. 4.3.1Monitor and evaluate designed application programs.
216

4.3 Manage accounting application programs

4.3.2 Maintain application Programs.

5. Manage the organization information systems by applying skills and knowledge of computer network and multimedia.

5.1 Configure the organization system

5.2 Manage the organization information system

5.1.1 Design the network system for the organization. 5.1.2 Install, test and implement the computer network system 5.2.1 Deploy security mechanism 5.2.2 Troubleshoot the network systems 5.2.3 Evaluate and Maintain network systems. 5.3.1 Design appropriate multimedia systems to solve specific business problems. 5.3.2 Evaluate business problems to be solved by multimedia tools. 6.1.1 Design wireless systems for solving business problems. 6.1.2 Apply Wireless transmission in solving business problems.

5.3 Apply multimedia tools and techniques to develop, present and solve business problems.

6. Apply technologies of 6.1 Formulate requirements for a mobile mobile computing and computing application in a chosen explain the potential, Specialized business case. importance and ways of utilizing them in ICT and projects and working environment. 6.2 Apply Information Communication Technology concepts to business projects in order to improve business performance

6.1.3 Evaluate wireless transmission systems 6.2.1 Assess business performance requiring ICT enhancement 6.2.2 Implement ICT concepts in solving business problems.
217

6.3 Apply Information Communication Technology concepts to support business at place of work.

6.3.1 Apply ICT skills to support organization applications and infrastructure.

6.3.2 Maintain and optimum performance

evaluate

system

218

10.0 ASSESSMENT CRITERIA AND ASSESSMENT INSTRUMENT SUB-ENABLING RELATED TASK ASSESSMENT OUTCOMES CRITERIA 1.1.1 Install Operating Systems Set boot sequence Partition hard disk Format hard disk Operating systems are properly installed. Users of operating systems with their rights are properly created. Users of operating systems are appropriately administered. Components of operating system are properly secured.

ASSESSMENT METHODS Observe procedure

ASSESSMENT INSTRUMENTS Practical test, Systems logs Systems log

1.1.2

1.2.1

Create users of Create a user to a specific group operating systems with their Set initial password to be changed rights Configure user right Test user credentials Administer users Set permissions for files and application of operating Set login schedule systems. Set network access Secure Operating Systems components Explain procedures for turning on firewall Install anti-virus Authenticate users. Enforce sharing. Setup communication security Diagnose software and hardware errors. Troubleshoot errors Report fault rectification systematically

Login to the created account

Test user privileges

Practical test

1.2.2

Login to the firewall. Observe installed antivirus Problem solved

System Logs report

1.2.3

Assess system performance and diagnose faults

System performance is properly assessed and correctly diagnosed.

Practical test

219

2.1.1

Design graphics in media such as print, digital or motion pictures.

Perform needs analysis Prepare design plan. Develop the design.

Graphics in media such as print digital or motion pictures are properly designed. Products are clearly decorated.

Group Presentation, assignment, test class test

2.1.2

Decorate products

2.1.3

Assemble images, motions and graphics.

Design colors, sounds and photo Set appropriate styles Test the objects (color, sound and photo) Assemble images Assemble sound and motion pictures Integrate assembled objects

Group Presentation, assignment, test class test

Images, motion and graphics are properly assembled. Writing and presentation skills are properly applied for effective communication. Effective presentations in international business environment are properly made. Techniques are

Group assignment

Practical test

2.2.1

Apply writing and Explain techniques for effective communication presentation skills Write a report. for effective Make presentation in communication. group work.

Group presentation

Report and tools used in Presentation

2.2.2

Make effective presentations in international business environment.

Apply tools for effective communication in International business environment Make presentation for a real business case Apply tools to enhance

Group presentation

Report and tools used in Presentation

2.2.3

Apply techniques

Group

Report and
220

to manage different social development challenges

2.3.1

Prepare business plans

2.3.2

Apply marketing skills to market products for opportunities identified.

2.3.3

Skills are applied for overcoming business challenges

3.1.1

Interrelate Intelligent Algorithms tools

good governance Relate gender issues with social development Explain development challenges and opportunities in regional integration and trade Initiate Entrepreneurial venture Prepare feasible business plan Monitor and Evaluate venture initiated Identify market opportunities Explain key factors for business venture development Give examples of creativity and innovation for product development Explain sources of financing entrepreneurial venture Explain contemporary entrepreneurship issues Apply business networking skills to overcome business challenges Apply intelligent algorithms in problem solving. Discuss strengths and limitations of various

properly applied to manage different social development challenges.

presentation and discussion

Questions from audience

Business plans are Individual/ group Report properly prepared. assignment submission

Marketing skills are properly applied to market products for opportunities identified. Skills for overcoming business challenges are properly applied

Practical case identification

Report submission and case presentation

Case Study

Report submission and case presentation

Intelligent algorithms tools are properly

Real business practical case

Report submission

221

to business problems.

artificial intelligence and machine learning techniques Implement Artificial Intelligent and machine learning algorithms to solve real problems Distinguish between a conventional system and intelligent system Explain Artificial Intelligence concept and its applications Apply Artificial Intelligent techniques in solving problems of a particular domain. Apply transportation model to solve business problems Apply network analysis and project scheduling for resource allocation Apply basic inventory techniques for decision making Formulate Linear programming model Apply linear programming models to solve complex business cases.

interrelated to business problems.

3.1.2

Apply methods for encoding knowledge in computer systems

Methods are System coding properly applied case study for encoding knowledge in computer systems.

Working system design

3.2.1

Apply different Decision models and Quantitative methods in analysing and solving business problems.

Different decision models and quantitative methods are properly applied in analysing and solving business problems. Quantitative models of estimation and forecasting are properly designed

Case study, individual and group assignments

Report submission

3.2.2

Design quantitative models of estimation and forecasting for

Business case study

Report submission

222

decision making.

Analyze quantitative models of estimation for decision making.

for decision making.

3.3.1

Apply information Practise basic concepts of mathematical proof. technology in Solve complex ideas and mathematical relate them Apply methods to solve a context given task Explain the logical Implement selected Artificial Intelligence and and systematic machine learning approach to algorithms to solve real world problems solving problems Apply different decision in particular models and quantitative methods in analyzing and simple solving business combinatorial problems. Apply sensitivity analysis problems. techniques to solve business challenges

Information Exercises, technology is assignments properly applied in mathematical context. The logical and systematic approach is clearly explained in solving problems in particular simple combinatorial problems. . Exercises, assignments, examinations

Questions and model answers

3.3.2

Questions and model answers

3.4.1

Apply different research methodologies, tools and techniques in

Explain a research process Design research with tested hypothesis using real business case Develop research

Different research methodologies, tools and techniques are properly applied in

Individual and group assignment

Report submission

223

exercising critical judgment and discrimination in the resolution of complex problematic situations. 3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.

instruments for data exercising critical collection. judgment in the Test research instruments resolution of complex problematic situations. Develop research problem and research design Write research proposal Explain research analysis techniques Produce research report

Research methods Individual and and techniques group are properly assignment applied in reporting and presenting the required results in agreed format. Users requirements are clearly analyzed for program development. Skills and knowledge of designing and building application programs are properly applied Case study, assignment

Report submission

4.1.1

Analyze user requirements for program development

Examine user objectives Identify user resources Identify user contents

Report and presentation

4.1.2

Apply skills and knowledge of designing and building application program

Prepare a programming environment Plan for application program Design an application program Write a program(coding)

Case study, assignment

Report and presentation

224

4.1.3

Test and implement application programs

Install designed program Login data to test its effectives Execute (compile) program

Application programs are properly tested and implemented.

System coding

Working system presentation

4.2.1

Monitor and evaluate designed application program

Check for routine errors Document the errors Examine program performance

Designed application programs are properly monitored and evaluated.

Individual case study

Case study presentation

4.2.2

Maintain application Programs.

5.1.1

Design computer network system for an organization.

Check required update Perform necessary updates Report changes performed accordingly Explain technical issues associated with virtual, switching tools for LAN and WAN internetworking. Explain cost, merits and demerits of wide area and local area network. Explain the role of different Layers of OSI Network model Apply design technologies concepts to develop computer network system

Application programs are properly maintained. Computer network system for an organization is properly designed.

Guided simulation

Practical presentation

Practical case

Working system report submission and presentation

225

5.1.2

5.2.1

Install, test and Apply hardware network connectivity system to implement implementation computer network Explain and apply system software tools to implement network system Apply tools to test implemented network system Establish security Explain issues related to threats and vulnerabilities mechanism to computer networks Explain the mechanism of setting and using Intrusion Detection System,firewall,data encryption algorithms, Kerberos key exchange to ensure maximum network security Apply security mechanism and techniques to control and manage the network system security Troubleshoot the network systems Identify the problem by checking the settings and options. Describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details

Computer network system is properly installed, tested and implemented

Practical case

Working system presentation

Security mechanism is properly established.

Practical case

Case presentation

5.2.2

The network systems are correctly troubleshot

Practical case

Presentation Report

226

5.2.3

Evaluate and Maintain network systems.

view on internet connection and sharing. Select and use diagnostic tools and equipment to identify and analyze network malfunctions Apply software and hardware tools to recover the problem Analyze current system and organization requirements to identify system upgrade requirements

Network systems are properly evaluated and maintained

Simulation case

Report submission

Perform upgrade

installation, test effectiveness and functionality of upgrade, and document results Evaluate system performance and produce performance report 5.3.1 Design appropriate multimedia systems to solve specific business Describe basic concepts and domains in Multimedia Explain the techniques used to create and combine different media types. Implement design theories Appropriate multimedia systems are properly designed to solve specific business Simulation case Report submission

227

problem.

by building interactive web based multimedia product.

problems.

5.3.2

Evaluate business problems to be solved by multimedia tools.

Assess practicability of

6.1.1

Design wireless systems for solving business problems.

multimedia applications using contemporary hardware and software. Assess impact of multimedia applications to enhance business process performance. Assess implementation issues surrounding key facets of multimedia design, including interface design. Identify user requirements for the system development Examine the resources for the design Implement program for business resolution Explain business processes as related to mobile computing Explain the concept of wireless communication to support connectivity to mobile networks and wireless internet.

Business problems Case study/ are appropriately simulation evaluated by multimedia tools.

Report submission

Wireless systems are properly designed to solve business problems.

Practical case

Report submission

6.1.2

Apply wireless transmission technologies in solving business problems.

Wireless transmission is properly applied in solving business problems.

Practical case

Report submission

228

Apply the principles of transaction and ecommerce over wireless devices to support ebusiness 6.1.3 Evaluate wireless transmission systems Assess systems integrity Monitor system log files Evaluate systems availability Integrate all required resources Improve resource accessibility time Report system performance Wireless Simulation/ case Report transmission study systems are correctly evaluated Performance of Simulation/ case Report Mobile systems study developed is properly assessed.

6.2.1

Assess performance of mobile systems developed

6.2.2

Assess business Check business growth performance after Check cost improvement after implementation mobile computing Check level of business competitiveness in the implementation global market

Business Simulation performance after mobile computing implementation is properly assessed.

Report submission

229

11.0 BENCHMARKING OF ASSESSMENT CRITERIA ASSESSMENT CRITERIA SATISFACTORY 1.1.1 Operating systems properly installed. Sets boot sequence

GOOD Sets boot sequence and partition hard disk

EXCELLENT Sets boot sequence, partitions hard disk and formats appropriately and install operating system Creates a user to a specific group, sets password features, configure user right and tests user credentials.

1.1.2

Users with their rights are properly created.

Creates a user to a specific group

Creates a user to a specific group and sets password features

1.2.1

Uses of operating system are appropriately administered.

Sets permissions for files and application

Sets permissions for files Sets permissions for files and and application login application, schedules the schedule logging and sets network access.

1.2.2

Components of operating system are properly secured.

Explains procedures for turning on firewall and install anti-virus

Explain procedures for turning on firewall, install anti-virus, and authenticate of users.

Explains procedures for turning on firewall, installs anti-virus, authenticate of users, enforce sharing and setup communication security. Diagnoses software and hardware errors, troubleshoots errors, and reports fault rectification systematically
230

1.2.3

System performance is properly assessed and correctly

Diagnoses software and hardware errors.

Diagnoses software, hardware errors and troubleshoot errors

diagnosed. 2.1.1 Graphics in media such as print digital or motion pictures are properly designed. Does needs analysis Performs needs analysis and prepares design plan. Performs needs analysis, prepares design plan and develops the design.

2.1.2

Products are clearly Designs colors, sounds decorated. and photo

Designs colors, sounds and photo and sets appropriate styles

Designs colors, sounds and photo, sets appropriate styles and objects (color, sound & photo)

2.1.3

Images, motion, and graphics are properly assembled.

Assembles images

Assembles images, sound and motion pictures

Assembles images, sound and motion pictures and integrates assembled objects

2.2.1

Writing and Explains techniques for presentation skills effective communication are properly applied for effective communication.

Writes a report and explains techniques for effective communication

Explains techniques for effective communication, writes a report and makes presentation in group work.

231

2.2.2

Effective presentations in international business environment are properly made.

Explains quality features of international business

Explains quality features of international business and develops tools for effective communication in International business environment

Explains quality features of international business, develops tools for effective communication in International business environment and makes presentation for a real business case Develops tools to enhance good governance, relates gender issues with social development and explains development challenges and opportunities in regional integration and trade Initiates Entrepreneurial venture, prepares feasible business plan, monitor and evaluates venture initiated Identifies market opportunities, explains key factors for business venture development and gives examples of creativity and innovation for product development

2.2.3

Techniques are properly applied to manage different social development challenges.

Develop tools to enhance good governance

Develops tools to enhance good governance and relates gender issues with social development

2.3.1

Business plans are properly prepared.

Initiates Entrepreneurial venture

Initiates Entrepreneurial venture and prepares feasible business plan

2.3.2

Marketing skills are properly applied to market products for opportunities identified.

Identifies market opportunities

Identifies market opportunities, and explains key factors for business venture development

2.3.3

Skills for

Explains sources of

Explains contemporary

Explains sources of financing


232

overcoming business challenges are properly applied

financing entrepreneurial venture

entrepreneurship issues and explains sources of financing entrepreneurial venture

entrepreneurial venture, explains contemporary entrepreneurship issues and applies business networking skills to overcome business challenges

3.1.1

Intelligent algorithms tools are properly interrelated to business problems.

Explains strengths and limitations of various artificial intelligence and machine learning techniques

Discusses strengths and limitations of various artificial intelligence and machine learning techniques and applies intelligent algorithms in problem solving.

Discusses strengths and limitations of various artificial intelligence and machine learning techniques, applies intelligent algorithms in problem solving and implements Artificial Intelligent and machine learning algorithms to solve real problems

3.1.2

Methods are properly applied for encoding knowledge in computer systems.

Distinguish between a conventional system and intelligent system

Distinguishes between a conventional system and intelligent system, and explains Artificial Intelligence concept and its applications

Distinguishes between a conventional system and intelligent system, explains Artificial Intelligence concept and its applications, and applies Artificial Intelligent techniques in solving problems of a particular domain

233

3.2.1

Different decision models and quantitative methods are properly applied in analysing and solving business problems.

Applies transportation model to solve business problems

Applies transportation model to solve business problems, and applies network analysis and project scheduling for resource allocation

Applies transportation model to solve business problems, network analysis and project scheduling for resource allocation, and basic inventory techniques for decision making

3.2.2

Quantitative models Formulates Linear of estimation and programming model forecasting are properly designed for decision making.

Formulates Linear programming model, and applies linear programming models to solve complex business cases.

Formulates Linear programming model, applies linear programming models to solve complex business cases, and analyzes quantitative models of estimation for decision making.

3.3.1

Information technology is properly applied in mathematical context.

Practices basic concepts of mathematical proof.

Practices basic concepts of mathematical proof, and solve complex ideas and relate them

Practices basic concepts of mathematical proof, solves complex ideas and relate them, and applies methods to solve a given task

3.3.2

The logical and systematic approach is clearly

Implements selected Artificial Intelligence and machine learning

Implements selected Artificial Intelligence and machine learning

Implements selected Artificial Intelligence and machine learning algorithms to solve


234

explained in solving algorithms to solve real problems in world problems particular simple combinatorial problems.

algorithms to solve real world problems, and applies different decision models and quantitative methods in analyzing and solving business problems.

real world problems, applies different decision models and quantitative methods in analyzing and solving business problems, and applies sensitivity analysis techniques to solve business challenges

3.4.1

Different research methodologies, tools and techniques are properly applied in exercising critical judgment in the resolution of complex problematic situations. Research methods and techniques are properly applied in reporting and presenting the required results in agreed format. Users

Explains research process

Explains research process, and design research with tested hypothesis using real business case, develops research instruments for data collection.

Explains research process, design research with tested hypothesis using real business case, develops research instruments for data collection, and tests research instrument

3.4.2

Develops research problem and research design

Develops research problem and research design, and writes research proposal

Develops research problem and research design, write research proposal, explains research analysis techniques, and produces report

4.1.1

Examines user objectives

Examines user

Examines user objectives,


235

requirements are clearly analyzed for program development. 4.1.2 Skills and knowledge of designing and building application programs are properly applied An application program is properly tested and implemented. Prepares a programming environment

objectives, and identify user resources

identifies user resources, and identify user contents

Prepares a programming Prepares a programming environment, and plans environment, plans for for application program application program, designs an application program and write a program(coding).

4.1.3

Installs designed program

Installs designed program, login data to test its effectives

Installs designed program, login data to test its effectives and execute (compile) program

4.2.1

Designed Checks for routine errors application program is properly monitored and evaluated.

Checks for routine errors, and documents the errors

Checks for routine errors, documents the errors, and examines the program performance

4.2.2

Application programs are properly maintained.

Checks required update

Checks required update and performs necessary updates

Checks required update, performs necessary updates, and reports changes performed accordingly
236

5.1.1

Computer network system for an organization is properly designed.

Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN internetworking.

Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN internetworking, and explains cost, implementation, benefits and disadvantages of wide area and local area network.

Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN internetworking, explains cost, implementation, benefits and disadvantages of wide area and local area network, explain the role of different Layers of OSI Network model, and applies design technologies concepts to develop computer network system

5.1.2

Computer network system is properly installed, tested and implemented.

Applies hardware network connectivity technologies to implement network system

Applies hardware network connectivity technologies to implement network system, explains and applies software tools to implement network system

Applies hardware network connectivity technologies to implement network system, explains and apply software tools to implement network system, and applies tools to test implemented network system

5.2.1

Security mechanism is properly

Explains issues related to threats and vulnerabilities

Explains issues related to threats and vulnerabilities to

Explains issues related to threats and vulnerabilities to computer networks, explains


237

established

to computer networks.

computer networks, and explains the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms, Kerberos key exchange to ensure maximum network security.

the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms, Kerberos key exchange to ensure maximum network security applies security mechanism and techniques to control and manage the security mechanism. Identifies the problem by checking the settings and options, describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing, detects and use diagnostic tools and equipment to identify and analyze network malfunctions, and applies software and hardware tools to recover the problem Analyzes current system and organization requirements to identify system upgrade requirements, perform upgrade installation, tests effectiveness
238

5.2.2

The network systems are correctly troubleshot

Identifies the problem by checking the settings and options.

Identifies the problem by checking the settings and options, and describes the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing.

5.2.3

Network systems are properly Evaluated and Maintained

Analyzes current system and organization requirements to identify system upgrade

Analyzes current system and organization requirements to identify system upgrade requirements, performs

requirements

upgrade installation, tests effectiveness and functionality of upgrade, and documents results

and functionality of upgrade, and document results, and evaluates system performance and produce performance report. Describes basic concepts and domains in Multimedia, explain the techniques used to create and combines different media types, and implements design theories by building interactive webbased multimedia product. Assesses practicability of multimedia applications using contemporary hardware and software, asses impact of multimedia applications to enhance business process performance, and assess implementation issues surrounding key facets of multimedia design, including interface design. Identifies user requirements for the system development, examines the resources for the design and implements
239

5.3.1

Appropriate Describes basic concepts Multimedia systems and domains in Multimedia are properly designed to solve specific business problems

Describes basic concepts and domains in Multimedia and explain the techniques used to create and combines different media types.

5.3.2

Business problems are appropriately evaluated to be solved by multimedia tools

Assess practicability of multimedia applications using contemporary hardware and software. .

Assesses practicability of multimedia applications using contemporary hardware and software, and assess impact of multimedia applications to enhance business process performance.

6.1.1

Wireless systems are properly designed to solve

Identifies user requirements for the system development

Identifies user requirements for the system development and Examine the resources

business problems.

for the design.

program for business resolution

6.1.2

Wireless transmission is properly applied in solving business problems.

Explain business processes as related to mobile computing

Explains business processes as related to mobile computing and explains the concept of wireless communication to support connectivity to mobile networks and wireless internet.

Explains business processes as related to mobile computing, explains the concept of wireless communication to support connectivity to mobile networks and wireless internet and applies the principles of transaction and e-commerce over wireless devices to support e-business Assesses systems integrity, monitor system log files and evaluates systems availability

6.1.3

Wireless transmission systems are correctly evaluated Performance of Mobile systems developed is assessed. Business performance after mobile computing implementation assessed.

Assesses systems integrity

Assesses systems integrity and monitors system log files.

6.2.1

Integrates all required resources

Integrates all required resources and improves resource accessibility time. Checks business growth and checks cost improvement after implementation

Integrates all required resources, improves resource accessibility time and reports system performance Checks business growth, checks cost improvement after implementation and checks level of business competitiveness in the global market
240

6.2.2

Checks business growth

12.0 MODULES DESCRIPTION CODE NAME NO OF CREDITS : : : HDIT 711 DISCRETE MATHEMATICS AND STATISTICS 15

SUB-ENABLING OUTCOMES 3.3.1 Apply information technology in mathematical contexts 3.3.2 Explain the logical and systematic approach to solving problems in particular simple combinatorial problems. TEACHING AIDS: Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures and demonstration REFERENCES: 1. Gossett,E(2009), Discrete Mathematics with Proof, Second Edition, John Wiley & Sons, United Kingdom 2. Gupta, S.C and Kapoor, V.K (2007), Fundamentals of mathematical Statistics, 11th Edition, Sultan Chand and Sons. India. 3. Johnsonbaugh,R (2008) ,Discrete Mathematics, 8th edition, Macmillan- London 4. Kenneth,H (2007) ,Discrete Mathematics and its Applications, Sixth Edition, McGraw-Hill,Asia. 5. Susanna, S(2011), Discrete Mathematics with Applications, Fourth Edition, Brooks/Cole,Boston.

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
241

CODE NAME NO OF CREDITS

: : :

HDIT 712 BUSINESS COMMUNICATON 15

SUB-ENABLING OUTCOMES 2.2.1 Apply writing and presentation skills for effective communication 2.2.2 Make effective presentations in international business TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, demonstration and role model REFERENCES 1. 2. 3. 4. Gilbald.(2006);MLA Handbook for writers of Research Paper Edition, Mod Lang Association of America. Guffey, Mary Ellen.(2006);Business Communication Process and Product 5th Edition, South-Western Los Angels. Madhukerr RK.(2005);Business Communication and Customer,1st ed., Vikas Publishing house, New Dethi. Munter,M.(2006);Guide to Managerial Communication Effective Business Writing and Speaking ,Prentice Hall New Jersey-USA. 5. Urmila,Rai S.M(2006);Business Communication: Himalaya Publishing, New,Dethi.

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
242

CODE NAME NO OF CREDITS

: : :

HDIT 713 COMPUTER GRAPHICS DESIGNING 15

SUB-ENABLING OUTCOMES 2.1.1 Design graphics in media such as print digital or motion pictures. 2.1.2 Decorate products 2.1.3 Assemble images, motion graphics TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, demonstration and role model REFERENCES 1. Asthana, R & Sinha,N (2007) Computer Graphics For Scientists And Engineers, Second Edition New Age International Publisher-USA. 2. Cunningham, S (2007); Computer Graphics: Programming in OpenGL for Visual Communication, Prentice Hall New Jersey -USA. 3. Edward, A (2008) Interactive Computer Graphics: A Top-down Approach with OpenGL, 5th Edition, Addison-Wesley,NY 4. Hill,F &Kelley, S (2006); Computer Graphics Using OpenGL, 3rd Edition, Prentice New Jersey -USA. 5. Lengye, E (2006); Mathematics for 3D Game Programming and Computer Graphics, 3rd Edition, California. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
243

CODE NAME NO OF CREDITS

: : :

HDIT 714 OPERATING SYSTEMS CONFIGURATION 15

SUB-ENABLING OUTCOMES 1.1.1Install Operating Systems 1.1.2 Create users with their rights 1.2.1 Administer users 1.2.2 Secure Operating Systems components 1.2.3 Assess systems performance and diagnose faults TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Galvin,S( 2011) Operating System Concepts 8th Edition, John Wiley and Sons Cleveland, OH -USA. 2. Stallings,W ( 2009),Operating Systems: Internals and Design Principles 5th Edition, Prentice Hall, New Jersey. 3. Stallings.W (2011); Operating Systems: Internals and Design Principles 6th Edition Prentice Hall, New Jersey. 4. Tanenbaum,A &.Woodhull, A (2008) Operating Systems Design and Implementation Third Edition Prentice Hall, New Jersey,USA. 5. Tanenbaum,A (2008) Modern Operating Systems, 3rd Edition, Prentice Hall Press, Atlanta -USA. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%

244

CODE NAME NO OF CREDITS

: : :

HDIT 721 DEVELOPMENT STUDIES 15

SUB-ENABLING OUTCOMES 2.2.3 Interrelate different development studies concepts to manage business 2.2.4 Apply techniques to manage different social development challenges TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Chambers, R. (2005); Ideas for Development, Earthscan, London. 2. Crocker, D. A. (2008); Ethics of Global Development: Agency, Capability and Deliberative Democracy, Cambridge University Press, Cambridge. 3. Peet, R. with Hartwick, E. (2009) Theories of Development, Contentions, Arguments , Alternatives. Second Edition, Guilford Press, New York and London. 4. Smith, J. (2008) Social Movements for Global Democracy, John Hopkins University Press, Baltimore-USA. 5. Willis, K. (2005) Theories and Practices of Development, Routledge, London and New York-USA.

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
245

CODE NAME NO OF CREDITS

: : :

HDIT 722 PRINCIPLES OF ACCOUNTING 15

SUB-ENABLING OUTCOMES 4.2.1 Prepare financial statements for business 4.2.2 Identify and describe legal aspects of company formation, shares and bonus. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB 2. Jat, R.B. and Jugu, Y.A. (2008); Modern Financial Accounting: Theory and Practice. Jos: Ehindero (Nig.) Limited 3. Jugu, Y. G. (2008); Financial Accounting Synopsis 2nd Edition, Jos Ehindero Ltd (Nig.) 4. Raimes Jane,(2006);Financial Accounting Prentice Hall New Jersey-USA. 5. Wood Frank, Alan Sangster,(2005);Business Accounting 10th Edition Prentice Hall, New Jersey-USA. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
246

CODE NAME NO OF CREDITS

: : :

HDIT 723 ARTIFICIAL INTELLIGENCE APPLICATIONS 15

SUB-ENABLING OUTCOMES 3.1.1 Interrelate Intelligent Algorithms tool to business problem. 3.1.2 Apply methods for encoding knowledge in computer systems TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Elaine,R &Kevin,K((2009),Artificial Intelligence (2nd ed.),McGraw Hill, NY 2. Macmillan, R(2009) Artificial Intelligence,(3rd ed.),Prentice Hall, London 3. Wesley,G(2008), Artificial Intelligence (6th ed.), Addison Wesley, NY 4. Wesley,P(2007), Artificial Intelligence(7th ed.),Addison Wesley, NY. 5. Stuart, R &Peter,N(2010), Artificial intelligence: a modern approach, (2nd Edition), Prentice Hall, USA INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%

247

CODE NAME NO OF CREDITS

: : :

HDIT 724 QUANTITATIVE TECHNIQUES 15

SUB-ENABLING OUTCOME 3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems. 3.2.2 Design quantitative models of estimation and forecasting for decision making. TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. 2. 3. 4. 5. Denzin NK, Lincoln YS (2009). Handbook of Qualitative Research. Sage Publications London. Nkwi P, et al (2008) Field Research into Social Issues: Methodological Guidelines. Osborne,J (2007),Best Practices in Quantitative Methods, Pope C,& Mays N (2009) Qualitative Research in Health Care. London: BM Richard. I. Levin & David. S. Rubin(2006) Statistics for Management,7th Edition ,Pearsons,New Delhi. Washington, DC.

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
248

CODE NAME NO OF CREDITS

: : :

HDIT 725 FIELD ATTACHMENT 320

SUB-ENABLING OUTCOMES

6.3.1 Apply ICT skills to support organization applications and infrastructure. 6.3.2 Maintain and evaluate system optimum performance

INTEGRATED METHOD OF ASSESSMENT: Employers work certificate Report Internal supervisor assessment 40% 30% 30%

249

CODE NAME NO OF CREDITS

: : :

HDIT 731 MULTIMEDIA SYSTEMS DESIGN 15

SUB-ENABLING OUTCOMES 5.3.1.Design appropriate multimedia systems to solve specific business problems. 5.3.2. Evaluate business problems to be solved by using multimedia tools TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Agnew,P& Keller,P man.(2006);Distributed Multimedia: Technologies, Applications, and Opportunities in the Digital Information Industry,2nd ed, Addison Wesley,NY. Banerji,A & Ghosh,A (2010) Multimedia Technologies 3rd Edition McGraw Hill, New Jersey-USA. Gibbs,J& Dionysion C. (2005); Multimedia Programming 2nd Edition Addison Wesley, New Jersey-USA

2. 3. 4. 5. .

Halsall,F (2007);Multimedia Communications: Applications, Networks, Protocols and Standards,3rd Edition ,Addison Wesley,NYJeffcott,J (2007); Multimedia In Practice :Technology and. Applications, First Edition Prentice Hall New Jersey.

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
250

CODE NAME NO OF CREDITS

: : :

HDIT 732 PROGRAMMING WITH JAVA 15

SUB-ENABLING OUTCOMES 4.1.1 Analyze user requirements for program development. 4.1.2 Apply skills and knowledge of designing and building application programs. 4.1.3 Test and Implement application programs TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration. REFERENCES 1. Bruce Eckel(2010);Thinking in Java 4th Edition O'Reilly Cambridge-USA. 2. David Flanagan(2007) ;Java in a Nutshell ,4th Edition, : O'Reilly Cambridge-USA.

3. David Poplawski,(2009); Objects Have Class, An Introduction to Programming with Java, Fourth Edition McGraw-Hill,Columbus-USA 4. John Lewis and William Loftus(2008);Java Software Solutions, Foundations of Program Design, 2nd Edition. , Addison-Wesley,NY5. Vlada Matena, Sanjeev Krishnan.(2007);Applying Enterprise JavaBeans, Second Edition Addison Wesley NY-USA. NTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
251

CODE NAME NO OF CREDITS

: HDIT 733 : RESEARCH METHODOLOGY : 15

SUB-ENABLING OUTCOMES 3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations. 3.4.2 Apply research methods techniques in reporting and presenting the required results in agreed format. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration

REFERENCES 1. 2. 3. 4.

Burke J, Larry C (2010);Educational Research: Quantitative, Qualitative, and Mixed Approaches Burton, D & Steve Bartlett(2009);Key Issues for Education Researchers,4th Edition, SAGE Publications Ltd Darville-USA. Denscombe, M (2007);The good research guide: for small-scale social research projects McGraw-Hill International ,Columbus USA Gary, T (2009); How to do your research project: A guide for students in education and applied social sciences 2nd Edition, SAGE Publications Ltd, London. 5. Ian,B (2008); Questionnaire Design: How to Plan, Structure and Write Survey Material for Effective Market Research,Kogan Page Publishers, London. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
252

CODE NAME NO OF CREDITS

: : :

HDIT 734 COMPUTERIZED ACCOUNTING 15

SUB-ENABLING OUTCOMES 4.2.1 Prepare financial statements for business 4.2.2 Identify and describe legal aspects of company formation, shares and bonus. TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES: 1. Carol,Y & Susan,C (2007),Computer Accounting Essentials with Microsoft Office Accounting, (1st ed.),McGraw Hill,NY 2. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB. 3. Raimes J,(2006);Financial Accounting Prentice Hall New Jersey-USA. 4. Robert,H (2009),Accounting Information Systems,(3rd ed.)McGraw Hill,NY 5. Wood, F. and Alan S. (2005); Business Accounting 1 (10th ed.),Prentice Hall,London. INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
253

CODE NAME NO OF CREDITS

: : :

HDIT 741 NETWORKING MANAGEMENT 15

SUB-ENABLING OUTCOMES 5.11 Design the network system for the organization.

5.1.2 Install, test and implement the system 5.2.1 Establish security mechanism 5.2.2 Troubleshoot the network systems 6.1.4 Evaluate and Maintain network systems. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Alexander, C (2006); Network Management Fundamentals,1st Edition,Cisco Press, Indiana-USA. 2. Gerard, B (2008);Network Management 100 Success Secrets - the Complete Guide to Network Management Software, Tools, Systems, Services and Performance Management,1st Edition, Emereo Pty Limited Brisbane Australia. 3. Joseph, D (2006); Network Troubleshooting Tools: 3rd Edition, O'Reilly Media Inc, Cambridge. 4. Neal, A (2009 );Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems 2nd Edition NJ-USA. 5. Udupa, D(2006); Network Management Systems Essentials,2nd Edition, McGraw-Hill, New York, NY: INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%

254

CODE NAME NO OF CREDITS

: : :

HDIT 742 ENTREPRENEURSHIP DEVELOPMENT 15

SUB-ENABLING OUTCOMES 2.3.1 Prepare business plans 2.3.2 Apply marketing skills to market products. 2.3.3 Apply skills for overcoming business challenges. TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES 1. Andr van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, Ne York-USA. 2. Lawrence, A& Webber (2005),Business and Society 11th Edition, McGraW, Hill NJ. 3. Norman W (2009), Entrepreneurship and Local Economic Development, 11th Edition, Rowman & Littlefield Maryland-USA.. 4. Randall G (2007) Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA. 5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press, Atlanta-USA INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%

255

CODE NAME NO OF CREDITS

: : :

HDIT 743 MOBILE COMPUTING 15

SUB-ENABLING OUTCOMES 6.1.1 Evaluate performance of mobile systems developed 6.1.2 Assess business performance after mobile computing implementation TEACHING AIDS Chalk board ,flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES

1. Andr van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, Ne York-USA. 2. Lawrence,A& Weber,J (2005),Business and Society 11th Edition, Mc GraW, Hill NJ. 3. Norman W (2009), Entrepreneurship and Local Economic Development , 11th Edition, Rowman & Littlefield Maryland-USA.. 4. Randall G (2007)Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA. 5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press,Atlanta-USA INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination 60%
256

CODE NAME NO OF CREDITS

: : :

HDIT 744 PROJECT MANAGEMENT 15

SUB-ENABLING OUTCOMES 6.2.1 Assess business performance requiring ICT enhancement 6.2.2 Implement ICT concepts in solving business problems. TEACHING AIDS Chalk board, flip chart, overhead projector and computer. METHODS OF INSTRUCTION: This module will be conducted through lectures, discussion and demonstration REFERENCES: 1. Anuj S.(2008);Enterprise Contract Management: A Practical Guide to Successfully Implementing an ECM Solution, 1st Edition, New York-USA. 2. Gerry, K and Steve R (2009); Advanced Project Portfolio Management and the PMO,2 nd Edition NJ-USA. 3. Howard G. (2008);Project Management for Designers and Facilities Managers, third edition, Reilly Media-USA. 4. Schragenheim, E, et al (2009). Supply chain management at warp speed: integrating the system from end to end,2nd Edition Cleverand-USA. 5. Sturdy, A et al (2009);Management Consultancy,1st Edition Oxford University Press-UK INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination 60%

257

BACHELOR DEGREE (NTA LEVEL 8) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

1.0 BACKGROUND INFORMATION


The philosophy behind the development of competent modular curricular is to comply with the Nations Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs. Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with disciplinetranscending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills. The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria. The present review covers NACTE Technical Award (NTA) level 8 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization.

The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.

This qualification has 120 credits which is the minimum prescribed by NACTE.

258

2.0 MODULE CODING


The coding of modules follows logical sequence as in the following example for BDIT 811.

BDIT 8 1 1

= = =

Stands for Bachelor Degree in Information and Communication Technology The first digit stands for the NTA level, in this case Bachelor Degree which is level eight. The second digit stands for semester, i.e. for semester one.

= The last digit stands for the order of the module in the semester. Modules are arranged serially from 1 to the highest number, upon the number of modules in the semester.

3.0 GRADING OF ASSESSMENT RESULTS


The grading of assessment results is in conformity with the NACTE grading system as follows. NTA Level 8 Grade A B+ C D F I Definition Excellent Very Good Good Average Failure Incomplete Score 75 100 65 74 55 64 40 54 00 39

259

4.0 AWARDS
The award shall be made to students who satisfy the following conditions. Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.

5.0 AWARDS CLASSIFICATION:


Awards Classification for NTA level 8 Class of Awards First Class Upper Second Class Lower Second Class Pass Cumulative GPA 4.4 to 5.0 3.5 to 4.3 2.7 to 3.4 2.0 to 2.6

260

6.0 SUMMARY FRAMEWORK


QUALIFICATION PURPOSE OF QUALIFICATION BACHELOR DEGREE IN INFORMATION & COMMUNICATION TECHNOLOGY This qualification is intended for persons who will analyze, interpret and make decisions, design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve complex problems, apply design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets without supervision.

NTA LEVEL COMPETENCE LEVEL DESCRIPTOR

8 The holder of this qualification will apply knowledge and skills in a wide and unpredictable variety of contexts to design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve routine problems, use design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets and assume personal responsibility, responsibility for the work of others, and the responsibility in the allocation of resources, policy formulation, planning, execution and evaluation. 120

CREDITS AT THIS LEVEL

CUMULATIVE CREDITS AT THIS LEVEL

261

MAXIMUM NUMBER OF CREDITS THAT 0 COULD BE CONSIDERED FROM LOWEST LEVEL

DATE THE QUALIFICATION STANDARD LAST REVIEWED

New

ENTRANCE REQUIREMENTS NTA LEVEL 7 in Information and Communication Technology.

262

7.0 PRINCIPAL LEARNING OUTCOMES AND CREDITS VALUES AND ASSESSMENT CRITERIA
S/NO PRINCIPAL LEARNING OUTCOMES CREDITS VALUES 15 ASSESSMENT CRITERIA

Design and manage a distributed system that fulfills requirements with regard to key system properties

Distributed systems that fulfill requirements with regard to key system properties is clearly designed and managed.

Design and manage web applications by applying current web technologies and programming techniques.

15

Web applications that apply current web technologies and programming techniques are clearly designed and managed

Apply software engineering techniques, design tools and software development processes to develop software

30

3.1 Software development tools, models and processes are properly applied to develop software 3.2 Object oriented techniques are properly applied to develop software 3.3 Object oriented analysis and design using UML are properly applied to develop software 3.4 Object oriented programming with JAVA is properly applied to develop software

Apply management information system concepts to manage information systems including E-business, and

45

4.1 E-business concepts are properly applied to manage business systems 263

develop IT projects in a contemporary business setting

4.2 Principles of MIS are properly applied in decision making and business needs clearly identified 4.3 IT projects are properly designed and implemented to overcome business challenges

Apply various technologies to implement appropriate security measures within an organization

15

5.1 Various technologies and security measures are properly applied to implement appropriate security measures within an organization.

TOTAL CREDITS

120

264

8.0 PROGRAM STRUCTURE


SEMESTER I S/NO 1 2 3 4 CODE BDIT 811 BDIT 812 BDIT 813 BDIT 814 NAME OF MODULE Distributed Systems management Web programming Software Engineering Object Oriented Database Management Systems TOTAL CREDITS SEMESTER I CREDITS 15 15 15 15 60

SEMESTER II 1 2 3 4 BDIT 821 BDIT 822 BDIT 823 BDIT 824 E-Business Management Management of Information Systems IT Security Management Project Development TOTAL CREDITS SEMESTER II GRAND TOTAL CREDITS FOR NTA LEVEL 8 15 15 15 15 60 120 265

9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES:


PRINCIPAL OUTCOMES 1.1. Design and manage a distributed system that fulfills requirements with regard to key system properties 1.1. ENABLING OUTCOMES Explain understand the basics of distributed systems 1.1.3 1.1.4 1.1.5 SUB-ENABLING OUTCOMES Apply the concept of distributed systems Identify examples of distributed systems Discuss the pros and cons of distributed systems

1.3

Explain system architecture and communication

1.3.

1.4

Explain replication, consistency and distributed shared memory systems. Design distributed file systems Explain fault tolerant systems

1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.1 1.3.2 1.3.3 1.4.1 1.4.2 1.4.3 1.5.1 1.5.2 1.5.3 1.5.4 2.1.4 2.1.5

Explain the concept of system autonomy in distributed systems Describe distributed computing and programming concepts Explain design issues with distributed systems Describe models of distributed systems Explain inter-process communication in distributed systems Explain replications and their reasons Apply consistency models Analyze distributed system implementation models Explain the concept of distributed file system Describe file services types in distributed systems Discuss and classify issues in distributed file systems Describe faults, errors, and failures Explain failure models in distributed systems Apply hardware reliability models Apply recovery mechanisms. Apply web technology concepts in web design Apply web development tools in web design

1.5

2.1 Design and manage web applications by applying current web technologies and programming techniques

2.1 Design web applications

2.2. Manage websites

2.2.1 Apply the concept of website management 2.2.2 Apply access control mechanisms 2.2.3 Manage users of websites 2.2.4 Analyze management of website contents 266

3.1 Apply software engineering techniques, and design tools, and software development process to develop software

3.2.

Apply different software development methodologies

2.2.5 5.1.5 5.1.6 5.1.7 5.1.8 5.2.1 5.2.2 5.2.3 5.3.1 5.3.2

Manage website updates. Apply software development tools Apply various software development models Apply the steps in the requirements analysis process Design software information systems Apply object oriented techniques in software development Apply agile software development techniques to develop software Apply object oriented concepts using UML do describe software development processes Apply object oriented analysis and design with UML Discuss object oriented programming with JAVA

5.2

Apply software engineering techniques

5.3

5.4

Apply the Unified Modeling Language concept Apply the concept of object orientation

3.4.1 Describe objects and classes of software systems 3.4.2 3.4.3 3.5.1 3.5.2 Explain inheritance, polymorphism, and message passing Describe UML diagrams in software development Apply the concept Object Oriented Database Management Systems Design Object Oriented Database Management Systems

3.5

Explain object oriented database management systems Assess business information needs

Apply management information system concepts to manage information systems including E-Business and IT projects in a contemporary business setting

4.1

4.2

Ability to deploy MIS solutions

4.3 5 Apply various technologies to implement 5.1

Apply MIS principles in decision making Detect security threats

4.1.1 4.1.2 4.1.3 4.1.4 4.2.1 4.2.2 4.2.3 4.2.4 4.3.1 4.3.2 5.1.1 5.1.2 5.1.3

Analyze current e-business situations Identify Business e-application needs Apply various e-business application in contemporary business settings Discuss the advantages and disadvantages of e-business Analyze current business situations Identify Business information needs Explain different information systems Apply various information systems in business Explain the principles of MIS Apply the MIS principles in making decisions Discuss common security threats Explain different types of security threats Assess the effects of security threats 267

appropriate security measures within an organization

5.2

5.3

Apply various technologies to implement security measures within an organization Inspect and protect information assets

5.2.1 5.2.2

Apply various security technologies Identify security resources for safeguarding of information systems

5.3.1 5.3.2 5.3.3 5.3.4

Explain the role of data in an organization Describe different information assets Inspect information systems for security threats Implement mechanisms to protect information systems from threats

security

268

10.0 ASSESSMENT CRITEIA AND ASSESSMENT INSTRUMENTS


SUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT CRITERIA The concept of distributed system is clearly applied ASSESSMENT METHOD Oral questioning, group discussions, buzz sessions ASSESSMENT INSTRUMENTS Model answers

1.1.1 Apply the concept of distributed systems

Explain a distributed system Identify types of distributed systems Discuss the features of distributed system.

1.1.2 Identify the types of distributed systems

1.1.3 Discuss the pros and cons of distributed systems

1.2.1 Explain the concept of system autonomy in distributed systems

Mention examples of distributed systems Discuss types of distributed systems Compare distributed systems with other systems Identify advantages of distributed systems Identify disadvantages of distributed systems Apply the limitations of distributed system in design process Define system autonomy Explain the concept of system autonomy in distributed systems Explain the functions of system autonomy Explain the concept of distributed computing Explain the concept of programming Describe different programming technology

Types of distributed systems properly given

Oral questioning, group discussions, buzz sessions

Assignments, Test and Examinations

The pros and cons of the distributed systems are thoroughly discussed The concept of system autonomy in distributed systems is clearly explained Distributed computing and programming concepts are clearly explained

Questions Group discussion

Check list Model answers

Group discussion Assignments

Assignments, Test and Examinations

1.2.2 Explain distributed computing and programming concepts

Assignments, and exercises

Model answers

269

1.2.3 Explain design issues with distributed systems

1.2.4 Describe models of distributed systems

1.2.5 Explain inter-process communication in distributed systems

Discuss the known design issues in distributed systems Describe the issues in distributed system Explain the role of design issues in distributed system. Apply the models of distributed systems Describe the distributed systems resources Apply the architectural, interactive and fault models Define communication Explain communication in distributed systems Describe process communications Apply the concept of replication Discuss the reasons for replication Explain the importance of replication concept Define models Mention common consistency models Describe the models Describe consistency protocols Explain distributed system Describe distributed model system Explain the function of distributed model. Explain a file system Explain distribution of resources in

Design issues with distributed systems clearly explained

Demonstration Assignments.

Model answers, checklist

Models of distributed systems clearly described

Demonstration Assignments.

Demonstration, model answers

Inter-process communication in distributed systems clearly explained Replication and their reasons are clearly explained

Assignments, discussion, brainstorming

Model answers

1.3.1 Explain replication and their reasons

Assignments, presentations

Model answers Assignments. tests

1.3.2 Apply consistency models

Consistency models clearly applied

Demonstrations, assignments, discussions

model answers

1.3.3 Analyze distributed system implementation model

Distributed system implementation is clearly analyzed The concept of distributed file

Demonstration assignment

Model answers Examination

1.4.1 Explain the concept of

Demonstrations,

Assignments, 270

distributed file system 1.4.2 Describe file service types in distributed systems

a system Describe files in a distributed system Explain a file service Mention common file service types Describe file service types in a distributed system Explain reasons for using distributed file systems Discuss design issues with distributed file systems Identify types of file system Explain faults , errors and failure in distributed systems Identify faults Describe the identified faults

system clearly explained File service types in distributed systems clearly described

assignments, Discussions Demonstrations, assignments, discussions Demonstrations, assignments, Discussions Demonstrations, assignments, Discussions

Test and Examinations

Assignments, Discussions Test and Examinations Assignments, Test and Examinations

1.4.3

Discuss and classify issues in distributed file systems

Issues in distributed file systems thoroughly discussed Faults, errors and failures are clearly described and classified Failure models in distributed systems clearly explained Hardware reliability models properly applied Recovery mechanisms correctly applied

1.5.1 Describe and classify faults, errors, and failures and classify faults

Assignments, Test and Examinations

1.5.2

Explain failure models in distributed systems

1.5.3

Apply hardware reliability models in distributed system

Apply system failure concept Explain failure models in distributed systems Describe different models applied in distributed system Define hardware Apply hardware reliability concept Mention known hardware reliability models Define recovery Explain what is a recovery mechanism Discuss common recovery mechanism in a distributed system

Demonstrations, assignments, Discussions Demonstrations, assignments, Discussions Demonstrations, assignments, Discussions

Demonstration, case studies, test, assignments Demonstrations, Assignments, Test and Examinations Case studies, demonstration, study tours Test and Examinations 271

1.5.4

Apply recovery mechanisms in distributed system

2.1.1

Apply web technology concepts in web design

2.1.2

Apply web development tools in web design

2.2.1 Apply the concept of website management

2.2.2

Apply access control mechanisms

Explain the concept of computer networking Explain the concept of resource networking Define world wide web Describe internet facilities Apply HTML tags Apply PHP tool Apply Knowledge of SQL basics Apply Java Scripts Discuss web hosting issues Apply website management tools Analyze content of management issues Discuss administrative rights issues Discuss different privileges Discuss security policy issues

Web technology concepts are properly applied in web design Web development tools are properly applied

Assignments, and exercises

Model answers

Assignments, practical sessions

Model answers, checklist

The concept of Assignments, website management is properly applied Access control mechanisms are properly applied Users of the website are properly managed Management of website contents properly analyzed Website updates are properly managed Assignments, presentations

Model answers

Model answers

2.2.3

Manage user s of website

2.2.4

Analyze management of website contents

Explain Password management Create, delete users Provide passwords and access rights to users Modify user details Explain upload and download issues Explain forms and password issues Explain telnet, ftp Describe website update tools Explain and apply HTML Explain and apply PHP Apply Knowledge of Dreamweaver Explain software development lifecycle (SDLC) Explain structured software

Practical sessions, assignments

Demonstration, model answers

Assignments, Test and Examinations and model answers Assignments, exercises and model answers Assignments, exercises and model

Demonstration, model answers

2.2.5

Manage website updates

Demonstration, model answers

3.2.1. Apply software development tools

Software development tools

Demonstration, model answers 272

3.1.2 Apply various software development models 3.1.4 Design software information systems

development techniques Explain object oriented software development techniques Explain waterfall model Explain V-Model Describe Prototyping Apply requirements elicitation concept Explain users role in the requirements definition Explain the role of documentation in requirements definition Apply design techniques Explain object oriented design Apply structured design techniques

are properly applied

answers

Various software development models are properly applied The steps in the requirements analysis process are properly applied Software information systems are properly designed Object oriented techniques are properly applied Agile software development techniques are properly applied Object oriented techniques using UML are properly applied Object oriented

Assignments, Test and Examinations

Demonstration, model answers

3.1.3 Apply the steps in the requirements analysis process

Assignments, Test and Examinations

Model answers, checklist

Assignments, Test and Examinations

Model answers, checklist

3.2.1 Apply object oriented techniques

Explain objects Explain classes Describe UML diagrams

Assignments, Test and Examinations

Model answers, checklist

3.2.2 Apply agile software development techniques

3.2.3 Apply object oriented concepts using UML to describe software development process

Apply Dynamic System Development Method (DSDM) Apply extreme Programming (XP) method Explain agile techniques in software development Apply cases, Apply actors Apply UML diagrams

Assignments, Test and Examinations

Model answers, checklist

Assignments, Test and Examinations

Model answers, checklist

3.3.1 Apply object

oriented

Explain the objects

Assignments, Test

Model answers, 273

analysis and design with UML

Explain the classes apply the use cases and other UML diagrams Declare comments in JAVA Declare classes and objects in JAVA Explain inheritance Explain JDK Apply object methods Apply object properties Explain message passing function Apply object orientation concepts Explain objects Explain classes

analysis and design is properly applied using UML Object oriented programming with JAVA is clearly discussed Objects and classes are clearly described Inheritance, polymorphism, and message passing are clearly explained UML diagrams are clearly described

and Examinations

checklist

3.3.2 Discuss object oriented programming with JAVA

Assignments, Test and Examinations

Model answers, checklist

3.4.1 Describe objects and classes of software systems 3.4.2 Explain inheritance, polymorphism, message passing in object orientation

Assignments, Test and Examinations Assignments, Test and Examinations

Model answers, checklist Model answers

3.4.3 Describe UML diagrams in software development

3.5.1 Apply the concept of Object Oriented Database Management Systems

Apply object orientation concepts Explain class diagrams Explain collaborative diagrams Understand deployment diagrams Explain use cases Define OODBMS Explain the function of OODBMS Describe features of OODBMS

Assignments, Test and Examinations

Model answers

The concept of OODBMS are clearly applied

Exercise examination

Modal answers

3.5 .2 Design Object Oriented Database Management Systems

Explain OODBMS Explain the relationship between objects and classes Apply inheritance concept.

OODBMS are properly designed

Exercise Test

model answers checklist

274

4.1.1

Analyze current e-business situations

4.1.2

Identify business eapplications needs

4.1.3

Apply various e-business applications in contemporary business settings

4.1.4

Discuss the advantages and disadvantages of ebusiness

4.2.1 Analyze current business situations

4.2.2 Identify business information needs

Analyze the operations of current e-business Identify the gap between expected situation and the current situation Apply knowledge of ICT to gather eapplications needs Discuss different business eapplications needs Apply information systems techniques in capturing data Discuss different models for capturing data explain use of e-applications in business Discuss different e-business systems Explain different information technology that support e-business Discuss the pros and cons of eapplication Discuss the strengths of eapplications Compare e-application with traditional applications Analyze the operations of current system Identify the gap between expected situation and the current situation Apply knowledge of system analysis and design to capture data Discuss different business information systems Apply information systems techniques in capturing data

E-business situations clearly analyzed

Assignments, Test and Examinations

Case studies, demonstration, study tours Test and Examinations Case studies, demonstration, study tours Test and Examinations Case studies, demonstration, study tours Test and Examinations Case studies, demonstration, study tours Test and Examinations checklist Model answers

Business eapplications needs identified

Assignments, Test and Examinations

E-business applications applied contemporary business settings Advantages and disadvantages of ebusiness discussed

Assignments, Test and Examinations

Assignments, Test and Examinations

Current business situations are properly analyzed

Exercises assignment

Business information needs

Group work Examination

Demonstrations, Assignments, Test and

275

4.2.3.Explain different information systems 4.3.1 Explain the principles of MIS

4.2.4 Apply various information systems in business

4.3.2Apply the MIS principles in making decisions

5.1 .1 Discuss common security threats 5.1.2 Explain different types of security threats

Discuss different models for capturing data Define a system Explain information system Differentiate between information and a system explain use of information system in business Discuss different information system that support business Explain different information technology that support business Define MIS Discuss uses of MIS in business organization Identify different types of MIS Explain the function of MIS in an organization. Discuss the role MIS in decision making. Discuss steps in decision making define security threats Identify common threats Classify threats Describe security threats Understand the causes of threats Classify security threats according to their causes

are clearly identified Different information systems are properly explained Various information systems in business are properly applied Exercises assignment assignment exercise

Examinations questions and model answers

Demonstrations, Assignments, Test and Examinations

Principles of MIS are clearly explained.

Exercise assignment Assignment Group discussion

model answers

Principles of MIS in making decisions are properly applied Security threats are thoroughly discussed Different types of security threats are clearly explained

Model answers checklist

Exercise Test assignment exercise

Model answers Checklist

Demonstrations, Assignments, Test and Examinations Model answers Checklist

5.1.3 Asses the effects of security threats

Describe the importance of security Apply appropriate measures to prevent/minimize threats Identify different sources of threats

Effects of security threats are properly assessed

Assignment Group discussion

276

5.2.1 Apply various security technologies

5.2.2 Identify security resources for safeguarding information systems

5.3.1 Explain the role of data in an organization 5.3.3 Inspect information systems for security threats

Define security technology Identify different features of security technology Discuss different security technology Describe IT in relation to security Discuss different Information technologies used to safeguard information systems. Discuss different technology used to safeguard information system Define data Apply the concept of data quality Discuss different uses of data Define information assets Identify different information assets within an organization Discuss the functions of information assets Identify different security threats Discuss the behavior of Information systems before and after security threats. Apply different techniques in inspection Apply different security measures Identify strong and weak security measures Discuss the effects of applying weak security measures in information systems

Various security technologies are properly applied Security resources for safeguarding information systems are clearly identified. The role of data in an organization, is clearly explained Information assets are clearly described.

Exercise assignment

Answers Checklist

exercise assignment Demonstrations, Assignments, Test and Examinations model answers checklist checklist modal answers

Group work exercise Exercise assignment

5.3.2 Describe different information assets

5.3.4 Implement mechanisms to protect information systems from security threats

information systems for security threats are properly inspected Mechanisms to protect information systems are properly implemented

Practical exercise Group work

Demonstrations, Assignments, Test and Examinations

exercise assignment

Demonstrations, Assignments, Test and Examinations

277

11.0 BENCHMARKING OF ASSESSMENT CRITERIA


S/NO 1.1.1 ASSESSMENT CRITERIA The concept of distributed system is clearly applied SATISFACTORY Explains the concept of distributed system GOOD Explains the concept of distributed systems and identifies types of distributed systems Mentions the examples of distributed systems and discusses the types of distributed systems Identifies the advantages and disadvantages of distributed systems Defines system autonomy concept, explains the concept of system autonomy on distributed systems Explains the concept of distributed computing, and the concept of distributed programming Mentions the known design issues in distributed systems, and describes the EXCELLENT Explains the concept of distributed systems, identifies types of distributed systems and discusses the features of distributed systems Mentions the examples of distributed systems, discusses the types of distributed systems and compares distributed systems with other systems Identifies the advantages, disadvantages of distributed systems and the limits of distributed systems Defines system autonomy concept, explains the concept of system autonomy on distributed systems, and explains the importance of system autonomy

1.1.2

The types of distributed systems properly identified.

Mentions the examples of distributed systems

1.1.3

The pros and cons of the distributed systems are thoroughly discussed The concept of system autonomy in distributed systems is clearly explained

Identifies the advantages of distributed systems Defines system autonomy concept

1.2.1

1.2.2

Distributed computing and programming concepts are clearly explained

Explains the concept of distributed computing

Explains the concept of distributed computing, the concept of distributed programming, and describes different programming technologies Mentions the known design issues in distributed systems, describes the issues in distributed systems, and explains the 278

1.2.3

Design issues with distributed systems clearly explained

Mentions the known design issues in

distributed systems

issues in distributed systems Mentions the models of distributed systems, and describes the distributed systems resources Defines communication and explains communication in distributed systems Explains the concept of replication and discusses the reasons for replication Defines models and explains, mentions common consistency models Explains the concept of distributed systems and describes distributed system models Explains a file system and explains distribution of resources in a system Explains a file service, and mentions common file

role of design issues in distributed systems

1.2.4

Models of distributed systems clearly described

Mentions the models of distributed systems

Mentions the models of distributed systems, describes the distributed system resources and describes the architectural, interactive and fault models Defines communication, explains communication in distributed systems and describes process communications

1.2.5

Inter-process communication in distributed systems clearly explained

Defines communication

1.3.1

Replication and their reasons are clearly explained

Explains the concept of replication

Explains the concept of replication, discusses the reasons for replication, and explains the importance of replication Defines models, explains mentions common consistency models and describes the models

1.3.2.

Consistency models clearly applied

Defines models

1.3.3

Distributed system implementation models clearly analyzed

Explains the concept of distributed systems

Explains the concept of distributed systems, describes distributed system models and explains the functions of distributed system models Explains a file system, explains distribution of resources in a system, and describes files in a distributed system Explains a file service, mentions common file service types, and describes file 279

1.4.1

The concept of distributed file system clearly explained

Explains an file system

1.4.2

File service types in distributed systems clearly described

Explains a file service

service types 1.4.3 Issues in distributed file systems properly discussed Explains reasons for using distributed file systems Explains reasons for using distributed file systems and explains design issues with distributed file systems Defines faults, errors and failures, explains these in a distributed system environment Applies system failure concepts and explains failure models in distributed systems Defines the term hardware and applies hardware reliability concepts

service types in a distributed system Explains reasons for using distributed file systems, explains design issues with distributed file systems and identifies types of file systems Defines faults, errors and failures, explains these in a distributed system environment and identifies and describes identified faults Applies system failure concepts, explains failure models in distributed systems and describes different models applied in distributed systems Defines the term hardware, applies hardware reliability concepts and mentions common hardware reliability models Defines recovery concept, explains what is a recovery mechanism and discusses common recovery mechanisms in distributed systems Explains the concept of computer networking and resource networking and defines the world wide web (www) and describes internet facilities

1.5.1

Faults, errors and failures are clearly described and classified

Defines faults, errors and failures

1.5.2

Failure models in distributed systems clearly explained

Applies system failure concepts

1.5.3

Hardware reliability models properly applied

Defines the term hardware

1.5.4

Recovery mechanisms correctly applied

Defines recovery concept

Defines recovery concept and explains what is a recovery mechanism

2.1.1

Web technology concepts are properly applied in web design

Explains the concept of computer networking and resource networking

Explains the concept of computer networking and resource networking and defines the world wide web (www)

280

2.1.2

Web development tools are clearly applied The concept of website management is properly applied

Applies HTML tags

Applies HTML tags, PHP tools and SQL basics Discusses web hosting issues and applies website management tools Discusses administrative rights issues and discusses different privileges Explains password management and creates, modifies and deletes users Explains upload and download issues and understands forms and password issues Describes website update tools and explains and applies PHP and HTML Explains software development life cycles (SDLC) and structured software development tools Explains waterfall model and V-model

Applies HTML tags, PHP tools and SQL basics and java scripts Discusses web hosting issues, applies website management tools and analyses contents of management Discusses administrative rights issues, different privileges and security policy issues Explains password management , creates, modifies and deletes users and provides access rights to users Explains upload and download issues, understands forms and password issues and explains telnet, ftp

2.2.1

Discusses web hosting issues

2.2.2

Access control mechanisms are properly applied

Discusses administrative rights issues Explains password management

2.2.3

Users of the website are properly managed

2.2.4

Management of website contents properly managed

Explains upload and download issues

2.2.5

Website updates are properly managed

Describes website update tools

Describes website update tools and explains and applies PHP and HTML and applies knowledge of Dreamweaver Explains software development life cycles (SDLC) and structured software development tools with examples

3.1.1

Software development tools are properly applied

Explains software development life cycles (SDLC)

3.1.2

Various software development models are properly applied

Explains waterfall model

Explains waterfall model, V-model and describes prototyping

281

3.1.3

The steps in the requirements analysis process are properly applied

Applies requirements Applies requirements elicitation concepts elicitation concepts, and explains users role in the requirements definition Applies design techniques Applies design techniques and explains object design

Applies requirements elicitation concepts, explains users role in the requirements definition and the role of documentation in requirements definition Applies design techniques, explains object design, and applies structured design techniques Explains objects ,classes, and describe UML diagrams Applies dynamic system development method (DSDM) ,eXtreme programming (XP) method and explains agile techniques in software development.

3.1.4

Software information system are properly designed

3.2.1

Object oriented techniques using UML are properly applied Agile software development techniques are properly applied

Explains objects

Explains objects and classes

3.2.2

Applies dynamic system development method(DSDM)

Applies dynamic system development method(DSDM) and extreme programming (XP) method Applies cases, and actors

3.2.3

Object oriented techniques using UML are properly applied Object oriented analysis and design using UML is properly applied Software development process using UML is properly applied

Applies cases

Applies cases ,actors, and UML diagrams

3.3.1

Explains the objects

Explains the objects and classes Applies object oriented concepts and explains the UML diagram Declares, comments , classes, objects in JAVA and explains inheritance

Explains the objects ,classes, applies the use cases and other UML diagrams Applies object oriented concepts, explains the UML diagram and applies class methods and properties Declares, comments , classes, objects in JAVA ,explain inheritance and JDK

3.3.2

Applies object oriented concepts

3.3.3

Object oriented programming with JAVA is clearly discussed

Declares, comments and objects in JAVA

282

3.4.1

Objects and classes are clearly described Inheritance, polymorphism and message passing are clearly explained UML diagrams are clearly described

Applies object methods Applies object orientation concepts

Applies object methods and properties Applies object orientation concepts and explain objects Applies object orientation concepts, explains class diagrams and collaborative diagrams. Explains OODBMS and function. Explains OODBMS and the relationship between objects and classes Analyses the operations of current e-business and identifies the gap between expected situation and the current situation Discusses different business e-applications and applies e-business techniques in capturing data Explains the use of eapplications in business

Applies object methods ,properties and explains message passing function Applies object orientation concepts, explain objects and classes

3.4.2

3.4.3

Applies object orientation concepts and explains class diagrams Explains OODBMS

Applies object orientation concepts, explains class diagrams ,collaborative diagrams ,deployment diagrams and explains use cases Explains OODBMS, describes features f unction and

3.5.1

The concept of OODBMS are clearly applied OODBMS are properly designed

3.5.2

Explains OODBMS

Explains OODBMS and the relationship between objects, classes and applies inheritance concept. Analyses the operations of current ebusiness, identifies the gap between expected situation, and the current situation and applies the knowledge of ICT to gather e-applications needs Discusses different business eapplications, applies e-business techniques in capturing data and discusses different models for capturing data

4.1.1

E-business situations clearly analyzed

Analyses the operations of current e-business

4.1.2

Business e-applications needs identified

Discusses different business eapplications

4.1.3

E-business applications applied contemporary business settings

Explains the use of eapplications in

Explains the use of e-applications in business, discusses different e-business 283

business

and discusses different ebusiness systems

systems and explains different information technology that support ebusiness Discusses the pros and cons of eapplications, discusses the strengths of eapplications and compares e-applications with traditional applications Analyses of the operations of current system and identify the gap between expected situation and the current situation and applies knowledge of system analysis and design to capture data. Discuss different business information systems, apply information systems techniques in capturing data and discuss different models for capturing data.

4.1.4

Advantages and disadvantages of e-business discussed

Discusses the pros and cons of eapplications

Discusses the pros and cons of e-applications and discusses the strengths of e-applications Analyses of the operations of current system and identify the gap between expected situation and the current situation, Discuss different business information systems and apply information systems techniques in capturing data. Defines a system and explain information system

4.2.1

Current business situations are properly analyzed

Analyses of the operations of current system

4.2.2

Business information needs are clearly identified

Discuss different business information systems

4.2.3

Different information systems are properly explained

Defines a system

Defines a system, explain information system and differentiate between information and a system Explains use of information systems in business, discusses different information systems that support business and explains different ITthat support business.

4.2.4

Various information systems in business are properly applied

Explains use of information systems in business

Explains use of information systems in business and discusses different information system that support business Defines MIS and discuss uses of MIS in business

4.3.1

Principles of MIS are clearly

Defines MIS

Defines MIS ,discuss uses of MIS in business organization and identifies 284

explained 4.3.2 Principles of MIS in making decision are properly applied Explains function of MIS in an organization

organization Explains function of MIS in an organization and discusses the role of MIS in decision making Defines security threats and identifies common threats Describes security threats and understands the causes of threats Describes the importance of security and applies appropriate measures to prevent or to minimize threats Describes the importance of security and applies appropriate measures to prevent/minimize threats Describes IT in relation to security and identifies different information technologies used to safeguard information systems

different types of MIS Explains function of MIS in an organization ,discusses the role of MIS in decision making and discusses steps in decision making Defines security threats , identifies common threats, and classifies security threats Describes security threats, understands the causes of threats and, classifies security threats according to their causes. Describes the importance of security, applies appropriate measures to prevent or to minimize threats, and identifies different sources of threats

5.1.1

Security threats are thoroughly discussed

Defines security threats

5.1.2

Different types of security threats are clearly explained

Describes security threats

5.1.3

The effects of security threats are properly assessed

Describes the importance of security

5.2.1

Various security technologies are properly applied

Describes the importance of security

Describe the importance of security ,applies appropriate measures to prevent /minimize threats and identifies different sources of threats Describes IT in relation to security , identifies different information technology used to safeguard information systems and discusses different technologies used to safeguard information system

5.2.2

Security resources for safeguarding information systems are clearly identified

Describes IT in relation to security

285

5.3.1

The role of data in an organization is clearly explained

Define data

Define data and applies the concept of data quality

Define data, applies the concept of data quality and discusses different uses of data. Defines information assets, identifies different information systems within an organization, and discusses the functions of information assets Identify different threats and discuss the behavior of information systems before and after security threats and applies different techniques in inspection.

5.3.2

Information assets are clearly described

Defines information assets

Defines information assets and identifies different information systems within an organization. Identifies different security threats and discusses the behavior of information systems before and after security threats Applies different security measures, and identifies strong and weak security measures

5.3.3

Information systems for security threats are properly inspected

Identifies different threats

5.3.4

Mechanisms to protect information systems are properly implemented

Applies different security measures

Applies different security measures, identifies strong and weak security measures and discusses the effects of applying weak security measures in information system

286

NTA LEVEL 8

12.0 MODULES DESCRIPTION


CODE: BDIT 811

NAME:

DISTRIBUTED SYSTEMS MANAGEMENT

NUMBER OF CREDITS: 15 SUB-ENABLING OUTCOMES: 1.1.1 1.1.2 1.1.3 1.2.1 1.2.2 1.2.3 1.2.4 1.2.5 1.3.1 1.3.2 1.3.3 1.4.1 1.4.2 1.4.3 1.5.1 1.5.2 1.5.3 1.5.4 1.5.5 Apply the concept of distributed systems Identify the examples of distributed systems Discuss the pros and cons of distributed systems Explain the concept of systems autonomy in distributed systems Describe distributed computing and programming concepts Discuss design issues with distributed systems Describe models of distributed systems Explain inter-process communication in distributed systems Explain replication and the reasons for replication Apply consistency models Analyze distributed systems implementation models Explain the concept of distributed file systems Describe file service types in distributed systems Discuss and classify issues in distributed file systems Describe faults, errors and failures Classify faults Explain failure models in distributed systems Apply hardware reliability models Apply recovery mechanisms 287

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points. METHODS OF INSTRUCTION This module will be conducted through class lectures, demonstrations and practical work in the computer laboratory under close supervision of the lecture. REFERENCES; 1. Blair, G.S., F. Costa, G. Coulson, H. Duran, et al, (2005), The Design of a Resource-Aware Reflective Middleware Architecture, Proceedings of the 2nd International Conference on Meta-Level Architectures and Reflection, St.-Malo, Springer-Verlag, France. 2. Coulouris, G. et al , (2000), Distributed Systems : Concepts and Design, Third Edition, 2000, Books News Inc, USA 3. George Coulouris, Jean Dollimore and Tim Kindberg, (2000), Distributed Systems: Concepts and Design, Addison Wesley, USA 4. Mullender, S (2009), Distributed Systems, 2nd Edition, Longman Group United Kingdom, UK 5. Tanenbaum, A & Martin, V (2007); Distributed Systems- Principles and Paradigms; 2nd Edition, Pearson Prentice Hall, New Delhi, India

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%

288

CODE: BDIT 812

NAME:

WEB PROGRAMMING
15

NUMBER OF CREDITS:

SUB-ENABLING OUTCOMES 2.1.1 2.1.2 2.1.3 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 Apply web technology concepts in web design Apply web development tools in web design Discuss the standardization process of websites Apply the concept of website management Apply access control mechanisms Manage users of websites Analyze management of website contents Manage website updates

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION This module will be conducted through class lectures, tutorials, demonstrations and practical work in the computer laboratory under close supervision of the lecture. 289

REFERENCES; 1. Jackson, J (2006), Web Technologies: A Computer Science Perspective. Prentice Hall, New Delhi, India. 2. O'Reilly, T and John, B (2004), Opening Welcome: State of the Internet Industry. In San Francisco, California, USA 3. Paul, G andShriram, K (2001), Programming the Web with High-Level Programming Languages. Proceedings of ESOP 2001. India. 4. Scott, Dand Sharp, R (2002); Abstracting application-level Web security. In Proceedingsof 11th ACM International World Wide Web Conference, Hawaii,USA, 5. Sebesta, R (2007), Programming the World Wide Web (4th Edition). Addison Wesley, McGraw-Hill Co, USA.

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60

290

CODE: BDIT 813

NAME: SOFTWARE ENGINEERING


NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES: 3.1.1 3.1.2 3.1.3 3.1.4 Apply software development tools Apply various software development models Apply the steps in the requirement analysis process Design software information systems

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION This module will be conducted through lectures, tutorials, practical work in the computer laboratory under close supervision of the lecture and fields during vacations.

291

REFERENCES; 1. Carlo, G; Jazayeri, M and Mandrioli, D (2003), Fundamentals of Software Engineering, 2nd International Edition, Pearson Education, PrenticeHall, United Kingdom. 2. Lauesen, R.S ((2005), Software requirements: Styles and Techniques , 4th Edition, Addison-Wesley Pub Co. USA 3. Pressman, R. S (2005). Software Engineering: A Practitioner's Approach , 6th edition, Boston, Mass: McGraw-Hill, USA 4. Roger, P.S (2009), Software Engineering A practitioners Approach, 5th edition, Pearson Publishing Co. LTD, UK. 5. Sommerville, I (2007) , Software Engineering,8th Edition , Pearson Education, Harlow, England

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%

292

CODE: BDIT 814

NAME: OBJECT ORIENTED DATABASE MANAGEMENT SYSTEMS


NUMBER OF CREDITS: 15 SUB-ENABLING OUTCOMES: 3.2.1 3.2.2 3.2.3 3.3.1 3.3.2 5.4.1 5.4.2 5.4.3 5.4.4 3.5.1 3.5.2 Apply object oriented techniques in software development Apply agile software techniques to develop software Apply object oriented concepts using UML to describe software development processes Apply object oriented analysis and design with UML Discuss object oriented programming with JAVA Describe object and classes of software systems Explain inheritance, polymorphism and message passing Describe UML diagrams in software development Apply objects and classes in preparing class diagrams Apply concept of Object Oriented Database Management System Design Object Oriented Database Management Systems

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points. METHODS OF INSTRUCTION This module will be conducted through class lectures, tutorials, and practical work in the computer laboratory under close supervision of the lecture or tutorial assistants.

293

REFERENCES; 1. Ambler, S. W (2004). The Object Primer: Agile Model Driven Development with UML 2. Cambridge University Press, UK 2. Booch, G, et al(2000) OMG Unified Modeling Language Specification, Version 1.3 First Edition Pearson Co. UK 3. Elmasri, R&Navathe, S.B (2000), Fundamentals of Database Systems (3rd Edition), Addison-Wesley, USA 4. Jacobson, I, Grady B &James Rumbaugh (2000). The Unified Software Development Process. Addison-Wesley New Jersey, USA. 5. Penker, M and Hans-Erik E (2000), Business Modeling with UML, John Wiley & Son, USA.

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%

294

CODE:

BDIT 821

NAME:

E-BUSINESS

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES: 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 Analyze current business e-applications Identify business e-applications needs Explain different information systems Apply various e-business applications in contemporary business settings. Discuss the advantages and disadvantages of e-applications.

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points. METHODS OF INSTRUCTION This module will be conducted through class lectures, case studies, tutorials and practical work in the computer laboratory under close supervision of the lecture.

295

REFERENCES; 1. Eastlake, D. E (2010), 3rd and T. Goldstein. ECML v1.1: Field specifications forE-commerce, London School of Business, UK 2. Kalakota, R & Robinson, M (2000), E-Business 2.0: Roadmap for Success, 2nd Edition, Addison-Wesley professional; UK 3. Lynda M. A (2002), Excerpts from the E-business Handbook, The St. Lucie Press, Fair Association, Inc, USA 4. Minoli, D and Minoli, E (2008) Web Commerce Technology Handbook, TataMcGraw-Hill, New Delhi, India. 5. Rosen, A (2000), The E-commerce Question and Answer Book, American Management Association, USA.

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%

296

CODE: BDIT 822

NAME:MANAGEMENT INFORMATION SYSTEMS


NUMBER OF CREDITS: 30

SUB-ENABLING OUTCOMES:

4.2.1 4.2.2 4.2.3 4.3.1 4.3.2

Analyze current business situations Identify business information needs Explain different information systems Explain the principles of MIS in making decisions Apply various information systems in business

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION: This module will be conducted through class lectures, field tours and practical work in the computer laboratory under close supervision of the lecture.

297

REFERENCES: 1. Davis,G.B (2006), The Blackwell Encyclopedia of Management, Management Information Systems (Blackwell Encyclopedia of Management) Volume 7, Wiley-Blackwell, United Kingdom 2. Effy, O (2008), management Information Systems, Sixth Edition, Course Technology, McGraw-Hill ,USA. 3. Jessup, Leonard M.; Joseph S. Valacich (2008), Information Systems Today, 3rd Edition, Pearson Publishing Co, United Kingdom. 4. OBrien, J (2009), Management Information Systems Managing Information Technology in the Internetworked Enterprise,( 7th Edition ), Boston: Irwin McGraw-Hill, USA 5. OBrien, J.A., &George M.M (2008). Management Information Systems, 8th Edition. New York: McGraw-Hill, USA.

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%

298

CODE:

BDIT 823

NAME:

INFORMATION TECHNOLOGY SECURITY MANAGEMENT

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES: 5.1.1 5.1.2 5.1.3 5.2.1 5.2.2 5.3.1 5.3.2 5.3.3 5.3.4 Discuss common security threats Explain different types of security threats Assess the effects of security threats Apply various security technologies Identify security resources for safeguarding information systems Explain the role of data in an organization Describe different information assets Inspect information systems for security threats Implement mechanisms to protect information systems from security threats

TEACHING AIDS: Chalk board, Overhead projectors, Flip chart stand and power points.

299

METHODS OF INSTRUCTION This module will be conducted through class lectures, tutorials, observations and practical work in the computer laboratory under close supervision of the lecture.

REFERENCES; 1. Mansour, O &Ghazawneh, A. (2009) Research in Information Systems: Implications of the constant changing nature of IT capabilities in the social computing era, Molde University College, Molde, Norway. 2. Schechter, S.E (2004). Computer security strength and risk: a quantitative approach, Ph.D. thesis, Harvard University 3. Stallings (2001), Network Security Essentials, Pearson Education Asia, New Delhi 4. Varian. H System reliability and free riding. In Economics of Information Security. J. Camp, S. Lewis, eds. (Kluwer Academic Publishers, 2004), vol. 12 of Advancesin Information Security, UK. 5. Varian, H (2000), Managing online security risks; In the New York Times, New York, USA.

INTEGRATED METHOD OF ASSESSMENT Continuous assessment 40% End of Semester exams 60%

300

Potrebbero piacerti anche