Sei sulla pagina 1di 15

INTERNATIONAL SCHOOL OF ASIA AND THE PACIFIC

Alimannao Hills, Peñablanca, Cagayan 3502


Telefax No. (078) 304-1010 Reviewed by : NORWAY T. SALUDARES, LPT, MIT
Website: www.isap.edu.ph Email Add: adminoffice@isap.edu.ph Program Coordinator
Date Signed : ______________________

COLLEGE I
OF NFORMATION TECHNOLOGY AND ENGINEERING : DAN PAOLO E. RAMOS, MSHM
Course Code : Quality Assurance for Academics and Administration
Date Signed : ______________________
Descriptive Title : SOCIAL AND PROFESSIONAL ISSUES 1
Noted by : RONIE E. SUGAROL, LCB, MPBM
Credits : 3 Units (3 units lecture) Dean, Business Education/ School Overseer
90 hrs. lecture Date Signed : ______________________

Prerequisite : Approved by : PRESENITA C. AGUON Ph.D.


Vice President for Academic Affairs
Prepared by : MS. JENYLL T. MABBORANG Date Approved : ______________________
School Year 2018 - 2019
Date Signed : ______________________

SCHOOL VISION: INSTITUTIONAL OBJECTIVES:


The International School of Asia and the Pacific is a distinctive institution with multi-disciplinary To achieve the vision and mission, ISAP commits itself to the following avowed objectives:
and integrated academic approaches producing exceptionally-skilled and values-oriented 1. Provides every individual equal access to quality and affordable education and extend
professionals thereby uplifting the quality of life and empowering self-sustaining communities of scholarship programs and other holistic developmental activities.
Asia-Pacific Region. 2. Offers enriched and relevant curricular and co-curricular programs and imbue them with
passion and selfless service to the community.
SCHOOL MISSION: 3. Produces exceptionally-skilled professionals and board topnotchers with high board
The International School of Asia and the Pacific works for the holistic development of the person performance rating.
– a socially responsible, virtuous and versatile individual challenged by the demands of the
4. Continuously produces research enthusiasts and innovative research outputs.
society, responding to the individualized needs of the global community for its productivity and
5. Institutes linkages both locally and abroad to ensure opportunities for relevant
sustainability.
experiences and employment and to boost community extension programs.

Page 1 of 15
CORE VALUES: INSTITUTIONAL OUTCOMES:
Dr. Ronald P. Guzman is a visionary founder and Christian Leader who pursuits for the The International School of Asia and the Pacific Institutional Outcomes are the qualities that
transformation of the nation. The following core values exhibited by the founder should be ISAPians must possess.
imbibed to all members of the ISAP: 1. Demonstrates through institutional mechanisms, quality standards and code of good
practice which are reflective of equal participatory decision making and accountability.
I- INTEGRITY 2. Practices spiritual values and ethical behaviours which promote and inspire greater
S- SPIRITUAL UPRIGHTNESS harmony to project a credible image in the society.
A- ALTRUISM 3. Exhibits life-long learning and global competency proficient in entrepreneurial skills,
P- PATIENCE selfless innovative mindset and socio-civic services.
I- INNOVATIVENESS 4. Manifests self-discipline, self-direction and adaptability in dealing with life’s situations
A- ADAPTIVENESS and challenges.
N- NATIONALISM
5. Mobilizes community resources to foster and sustain institutional programs for
PURPOSE: community development.

“Transforming Lives through Selfless Service” GRADUATE ATTRIBUTES:


1. Role Model – imbued with self-discipline rooted from constitutional provisions, social
PHILOSOPHY: norms and other regulations contributory to social development and progress.
God created man in His image with distinct talents and skills integral to human progression. 2. Research Enthusiast – equipped with knowledge of the past and present social
These talents, once given adequate appreciation and encouragement, can foster holistic milieu, who is skilled and motivated to discover new ideas, to introduce novel
development for his benefit and betterment of his fellowmen for the glory of God. approaches and strategies and to utilize discoveries for social change and
development.
3. Exceptional Professional – provided with sufficient learning experiences and
exposures both locally and globally, who is equipped with the attributes required of
his professional field and chosen area of expertise.
4. Altruistic – imbued with outpouring love for the poor and under privileged, the welfare
of communities, the development of the country and the promotion of dignity and
humanity, who is ready to utilize his blessings and gifts without counting the cost.
5. Life-long Learner – a professional of both formal and informal learning opportunities
throughout people’s lives and to foster continuously the knowledge and skills needed
for employment and personal fulfilment.
6. Mighty Eagle – like an eagle, who is fearless to dream and pursue his goals, directed
to the realizations of his plans, strong and confident to deal with challenges, resilient

Page 2 of 15
to the signs and demands of the times and nurturing of the succeeding generation’s
future.
7. Spiritually Upright – one who keeps the Laws of God primary in all his undertakings
and transcends human aspirations into God’s wilful promises.
PROGRAM EDUCATIONAL OBJECTIVES (PEO)

The Information Technology program has adopted the following educational objectives:

a. Few years after graduation, the Information Technology alumni shall have successful careers in Information Technology fields or will be able to successfully pursue advanced degrees;
b. Provide solutions to challenging problems in their profession by applying Information Technology theory and principles;
c. Communicate effectively, work collaboratively and exhibit high levels of professionalism and ethical responsibility to contribute significantly for the welfare of others;
d. Engage in life-long learning and professional development to adapt to rapidly changing work environment; and
e. Become indispensable partners for national progress applying their profession.

STUDENT OUTCOMES (SO):

The Bachelor of Science in Information Technology program prepares students to be:

a. Apply knowledge of computing, science and mathematics appropriate to the discipline


b. Understand best practices and standards and their applications.
c. Analyze complex problems and identify and define the computing requirements appropriate to its solution.
d. Identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computer-based systems.
e. Design, implement and evaluate computer-based systems, processes, components or programs to meet desired needs and requirements under various constraints
f. Integrate IT-based solutions into the user environment effectively.
g. Apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT Profession.
h. Function effectively as a member or leader of a development team recognizing the different roles within a team to accomplish a common goal.
i. Assist in the creation of an effective IT project plan
j. Communicate effectively with the computing community and with society at large about complex computing activities through logical writing, presentations and clear instructions.
k. Analyze the local and global impact of computing information technology of individuals, organizations and society.
l. Understand professional, ethical, legal, security and social issues and responsibilities in the utilization of information technology.
m. Recognize the need for and engage in planning self-learning and improving performance as foundation for continuing professional development.

Page 3 of 15
COURSE OUTCOMES (CO): SPECIFIC TO THE SUBJECT

Review and analyze the effects of computer technology on the society, and to anticipate the impact of that technology on individuals, companies and the wider community.
Select from the many algorithms for the implementation of computer applications those that will not only satisfy the needs of the economy but also those that will have higher factors of
safety, greater sensitivity to user needs, and increased reliability.
 Understand their potential impact on the community that they serve based on the level of ethics practiced in the use of computer technologies and make rational decisions regarding their
responsibilities to the community.
 Interpret the social and legal context in which a particular system is being used and deduce its likely impact.
 Develop strategies and policies to address a range of ethical, social, and legal issues arising from developments in computing.
 Distinguish between the various forms of intellectual property (patent, copyright, trademark, and trade secret).
 Evaluate the privacy issues as it relates to information systems and the Internet
COURSE DESCRIPTION:

This course examines the ethical, legal, and social responsibilities of the practicing professional IT specialist and will introduce the concepts needed to ensure that students are aware of
the accepted practices internationally. Issues addressed include computers and privacy, computer crime, public safety, intellectual property and professional codes of ethics. Key issues will
normally be considered through case studies.
VALUE AIMS:

This course is meant to prepare students for work in industry in the information processing fields as well as prepare students for business and computer-related courses and it will also
help them to continue the lifetime learning necessary for staying at the forefront of computing systems development and to be an object-oriented person with due manner to uplift their spiritual
uprightness with the notion of promoting their nationalism.

COURSE REQUIREMENTS: Grading:

 assignments The student’s grade at the end of the semester represents the combined marks for
 project (programming) Knowledge (AQ, TT, Rotation Exam, Case Presentation); Skills (Actual Performance in the
 three to four quizzes each periodic coverage Laboratory); and Attitude (Attendance, Recitation, Assignment and Behavior/ Conduct).
 laboratory exercises There are four (4) grading periods namely, Preliminary, Midterm, Semi – Final and Final
 periodic examination (prelims, midterms, semi-finals and finals) Examinations. The school has adopted the cumulative grading system, which is computed
as follows:

1. Prelim Grade
PG= ((AQ+CS+TT)/3+ S )
PG= Average (60%) + S(40%)

2. Midterm Grade
Page 4 of 15
MG = ((AQ+CS+TT)/3+ S )
MG= Average (60%) + S (40%)
MCA= PG + 2(MG)

3. Semi – Final Grade


CLASSROOM MANAGEMENT SFG= ((AQ+CS+TT)/3+ S )
SFG= Average (60%) + S (40%)
Teachers: SFCA= MG + 2(SFG)
1. All teachers are expected to conduct themselves in a professional manner
especially when dealing with their students. 4. Final Grade
2. Classroom shall be neat and orderly before the class starts. FG= ((AQ+CS+(TT(70%)+CE(30%)))/3+ S )
3. A permanent seat plan of the students shall be prepared by the subject teacher FG= Average (60%) + S (40%)
every beginning of the semester and must be followed during the entire FCA= FG + 2(SFG)
duration of the semester.
4. The class should start with a prayer and end with a prayer.
5. Teachers must be in their classes 5 minutes before the schedule.
6. Teachers should erase the boards before leaving the class and put off all LEGEND:
electrical appliances including lights and electric fans. AQ = Average Quiz
7. The teacher should be the last to leave the room in case there are no more CS = Class Standing
subjects after his / her class. TT = Term Test
8. He / she should ask students to pick up pieces of papers or plastics before S = Skills
leaving the classroom. PG = Prelim Grade
9. Any damage to the classroom used by teachers should immediately be MG = Midterm Grade
reported to the General Services Office or through the Quality Assurance MCA = Midterm Cumulative Average
Moderator for Administration. SFG = Semi-Final Grade
SFCA =Semi – Final cumulative Average
Students: FG = Final Grade
1. All students must come on time and must be in their complete uniform during FCA = Final Cumulative Average
class hours. CE = Comprehensive Exam
2. Strictly NO littering inside the class and no eating while class is going on.
3. All students must conduct themselves with discipline throughout the entire
class.
4. Shouting or howling is strictly prohibited as it would disturb other classes in
adjacent classrooms or buildings.

LABORATORY MANAGEMENT:
Page 5 of 15
1. Only those authorized to work inside the laboratory are allowed to enter the area.
Students should log before and after working in the laboratory
2. Good housekeeping and safety precautions should be observed at all times.
3. Eating and bringing of food and soft drinks are strictly prohibited inside the
laboratory.
4. Log-in/out notebook should be filled out every time a particular equipment is to
be used. Any malfunctioning of an equipment should be immediately reported to
the instructor.
5. Damages must be reported immediately to the instructor or lab technician and
an immediate replacement should be arranged.
6. The computer connected to the equipment should not be used for other purposes
not related to the operation of the equipment where it is attached.
7. The last person who leaves the room should see to it that every utility
(equipment, lights, aircon, etc.) is turned off
8. All students are required to attend the Laboratory Safety Seminar sponsored by
the college prior to their laboratory schedules.
9. The following are not allowed inside the laboratory
• Vandalism. Do not write anything on the tables and walls
• Smoking, Sleeping and Playing Cards.
• Computer Games, especially obscene and pornographic ones

ACADEMIC COUNSELLING TIME:

Time: Monday – Friday 8 am – 5 pm


Venue: ISAP Faculty
Subject Teacher: Jenyll T. Mabborang

TEXTBOOK:
1. Silberschatz, Galvin, Gagne. John Wiley & sons , inc: Operating System Concepts

ADDITIONAL REFERENCES:
1.
WEBSITE REFERENCES:
1.

Page 6 of 15
Time
Frame Teaching and Learning Activities Assessment Tasks
Intended Learning Outcomes (ILO) Course Contents Resource Materials
(TLA) (TA)
Week:
PRELIMINARY PERIOD
 Discuss the main ideas in the 1. Professional Ethics and Discussion and recitation about Overhead projector, Pre-test using paper and
Week 1 different theories of ethics Responsibility professional ethics and responsibility, books and laptop pencil technique
to Week  Describe how laws relating to 1.1. Ethical Theories learning the different code of ethics used
5 computing implement ethical 1.2. Code of Ethics by computing professionals.
principles 1.3. Ethical Guidelines for Computer
 Explain how computer and Professionals
professional ethics differ from
ethics in general

2 HRS  Define the terms: ‘personal 2. Privacy and Freedom of Speech in The students will be divided into 5 groups Manuals, books and Quiz using paper and
LEC information’ and ‘invisible Cyberspace and each group will contain 3-4 laptop pencil test and graded
information gathering’ 2.1. The value of privacy members. After grouping, the teacher will recitation
 Discuss how the release of 2.2. Privacy Risks hand them their reports for the different Group presentation using
3 HRS someone’s personal information 2.2.1. Government Information Banks topics about privacy and freedom of rubrics followed by a quiz
LAB can threaten their safety 2.2.2. Consumer Information speech in cyberspace which they will
 Describe tools that can be used to 2.2.3. Medical Records discuss and present to their classmates
protect a person’s privacy on the 2.3. Privacy of Consumer Information each meeting
Web 2.3.1. Database and Personal
 Describe methods parents can use Records Discussion and recitation about the Manuals, books and
to restrict access by their children 2.3.2. E-mail Privacy ethical, legal and social issues involved in laptop Quiz using paper and
1 hour to inappropriate material on the 2.3.3. Web Privacy freedom of speech and privacy in pencil test and graded
examin Web 2.4. Protecting Privacy Cyberspace recitation
ation 2.5. Anonymity
 Explain the reasons for censorship
2.6. SPAM
and how it impacts on freedom of
speech
 List reasons people object to Spam
 Identify methods used to control
access to information
PRELIM EXAMINATION
MIDTERM PERIOD
Page 7 of 15
Week 6 1. Risk and Responsibility
to Week  Discuss the hardware and software 1.1. Computer Liability Research about the different risk and Manuals, books and Research works
9 risks involved in the use of 1.1.1. Malfunction of Computers – responsibility in the computer world. laptop submission
computers in society Hardware and Software
 Explain how information stored on reliability
computers can be kept safe 1.1.2. Safety Discussion and recitation about computer Manuals, books and Graded presentation
 Describe how effective design can 1.1.3. Misinterpretation of liability, what are the possible problem to laptop using rubrics followed by
impact information technology Information occur for misinterpretation of information, a quiz
 Evaluate accountability issues in 1.1.4. Liability of defective malfunction of computers and more.
our computerized society information
 Discuss the ethical, legal and social 1.2. Evaluation of Safety-Critical
issues regarding the risk and Systems
2 HRS responsibility for public information 1.3. Values in Design Research activity about Values in design, Manuals, books and Research works
LEC 1.3.1. Software and Design what are the different software and laptop submission
Problems design problems and how to eliminate
1.3.2. Elimination of Hardware hardware switch.
3 HRS Switch
LAB 1.4. Taking responsibility –
Accountability in Computerized
Society
1.5. Role and Responsibility of
Computer Scientists
1.6. Professional Responsibility of the
Computer User
 Distinguish between the different
types of computer crime 2. Computer Crime, Security and The teacher will demonstrate on how to Manuals, books, Hands-on activity and
1 hour  Explain how computer crime can Protection prevent security risk to ensure smooth internet, USB and knowledge survey
examin be prevented or minimized 2.1. Hacking, cracking and crime work flow followed by the students computer unit
ation 2.2. Viruses, Worms, Trojan Horses
 Explain what the computer user
2.3. Digital Forgery Each student’s will be given a certain Graded performance
can do to protect him/herself
2.4. Software Piracy situation about the topic computer crim using rubrics
 Discuss the ethical, legal and social
2.5. Online Scams wherein they will create a narration about
issues involved in computer crime
2.6. Misuse of resources it and perform it in class
2.7. Protective systems
2.8. Reliability and factors of safety

Page 8 of 15
MIDTERM EXAM
SEMI FINAL PERIOD
Week 1. Intellectual Property
10 to  Discuss the different technologies 1.1. Intellectual property and changing The students will make a research work Manuals, books, Submission of research
Week that has made copyright technology about intellectual property, it’s computer unit/laptop work
14 infringement easier 1.2. Copyright Law components and the roots of its origin to and internet
 Explain the factors that can be used 1.3. Computer Software be submitted next meeting and after
in deciding whether a use of 1.3.1. Intellectual Property which is a recitation followed by a quiz to
2 HRS copyrighted Protections for Computer determine whether they read their
LEC  material is fair Software research work.
3 HRS  Describe technical means of 1.3.2. Why Software Should be Free
LAB protecting copyright of intellectual Should I Copy My Neighbor’s Discussion and recitation about copyright Manuals, book, laptop Quiz using paper and
property on the Web Software law, intellectual property rights and the and projector pencil test and graded
 List benefits of free software 1.3.3. Moral Foundations of difference between copyright and patent recitation
 Differentiate between copyright Intellectual Property Rights
and patent 1.4. Issues for Software Developers o
1 hour  Discuss the ethical, legal and social 1.4.1. Copyright or patent?
examin issues involved in intellectual 1.4.2. Similar software products
ation property rights
SEMI-FINAL PERIOD
FINAL PERIOD
Week 1. The Internet
15 to  Discuss the inequalities in Internet 1.1. The National Information Research work about the internet, its Books, Computer unit Submission of Research
Week access Infrastructure properties, how does it evolved and how and internet work
18  Explain how the Internet can help to 1.2. Bridging the Racial Divide on does it manage to connect each device connection
alleviate social problems the Internet around the world
2 HRS  Discuss the ethical, legal and social 1.3. Alleviating Poverty Through
LEC issues involved in internet use Technology
3 HRS 1.4. Governance of the internet: By
LAB whom? And How?
1.5. Who governs the internet?
1 hour
examin  Locate some case studies about the 2. Case Studies The students will collect some case Books, Computer unit Submission of Case
ation history and everything about the 2.1. The Internet studies regarding the topic ‘internet’ and internet Studies
internet connection
Page 9 of 15
FINAL EXAM
Total no
of hrs:
90 hrs

ALIGNMENT OF PROGRAM EDUCATIONAL OBJECTIVES AND OUTCOMES


A. PROGRAM EDUCATIONAL OBJECTIVES TO THE INSTITUTION VISION - MISSION STATEMENT:

PROGRAM EDUCATIONAL OBJECTIVES (PEO) Vision –Mission


STATEMENT
Vision -Mission Vision –Mission Vision – Vision – Vision –Mission Vision – Vision – Vision –
1 2 Mission 3 Mission 4 5 Mission 6 Mission 7 Mission 8
Multi-
Producing
disciplinary and Producing Empowering Socially Passion for Global
exceptionally- Uplifting the
integrated values-oriented self-sustaining responsible excellence in staging is
skilled quality of life
academic professionals communities individual service unwavering
professionals
approaches
a. The Information Technology program has
/ / / / / / / /
adopted the following educational objectives:
b. Few years after graduation, the Information
/ / / / / / / /
Technology alumni shall:
c. Have successful careers in Information
Technology fields or will be able to successfully / / / / / / / /
pursue advanced degrees;
d. Provide solutions to challenging problems in
their profession by applying Information / / / / / / / /
Technology theory and principles;
e. Communicate effectively, work collaboratively
and exhibit high levels of professionalism and
/ / / / / / / /
ethical responsibility to contribute significantly
for the welfare of others;
f. Engage in life-long learning and professional
development to adapt to rapidly changing work / / / / / / / /
environment; and
Page 10 of 15
g. Become indispensable partners for national
/ / / / / / / /
progress applying their profession.

B. PROGRAM EDUCATIONAL OBJECTIVES TO STUDENT OUTCOMES

STUDENT OUTCOMES (SO)


PROGRAM EDUCATIONAL OBJECTIVES (PEO) (Per program)
A B C D E F G H I J K L M
a. The Information Technology program has adopted the
/ / / / / / / / / / / / /
following educational objectives:
b. Few years after graduation, the Information Technology
/ / / / / / / / / / /
alumni shall:
c. Have successful careers in Information Technology fields or
/ / / / / / / / /
will be able to successfully pursue advanced degrees;
d. Provide solutions to challenging problems in their profession
/ / / / / / / / / / / /
by applying Information Technology theory and principles;
e. Communicate effectively, work collaboratively and exhibit
high levels of professionalism and ethical responsibility to / / / / / / / / / / / / /
contribute significantly for the welfare of others;
f. Engage in life-long learning and professional development to
/ / / / / / / / / / / / /
adapt to rapidly changing work environment; and
g. Become indispensable partners for national progress
/ / / / / / / / / / / / /
applying their profession.

C. STUDENT OUTCOMES TO COURSE OUTCOMES

COURSE
COURSE OUTCOMES
STUDENT OUTCOMES (SO) LEVEL OUTCOMES
Proficiency assessed by
Satisfied
a. Apply knowledge of computing, science and mathematics appropriate to the discipline Written examination with the use of
P /
OBE rubrics
b. Understand best practices and standards and their applications. Problem/cased based & written
D / examination with the use of OBE
rubrics
Page 11 of 15
c. Analyze complex problems and identify and define the computing requirements appropriate to its solution. Problem/cased based & written
P / examination with the use of OBE
rubrics
d. Identify and analyze user needs and take them into account in the selection, creation, evaluation and Problem/cased based & written
administration of computer-based systems. D / examination with the use of OBE
rubrics
e. Design, implement and evaluate computer-based systems, processes, components or programs to meet Problem/cased based & written
desired needs and requirements under various constraints D / examination with the use of OBE
rubrics
f. Integrate IT-based solutions into the user environment effectively. Problem/cased based & written
P / examination with the use of OBE
rubrics
g. Apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT Problem/cased based & written
Profession. P / examination with the use of OBE
rubrics
h. Function effectively as a member or leader of a development team recognizing the different roles within a Problem/cased based & written
team to accomplish a common goal. P / examination with the use of OBE
rubrics
i. Assist in the creation of an effective IT project plan Problem/cased based & written
D / examination with the use of OBE
rubrics
j. Communicate effectively with the computing community and with society at large about complex computing Problem/cased based & written
activities through logical writing, presentations and clear instructions. P / examination with the use of OBE
rubrics
k. Analyze the local and global impact of computing information technology of individuals, organizations and Problem/cased based & written
society. P / examination with the use of OBE
rubrics
l. Understand professional, ethical, legal, security and social issues and responsibilities in the utilization of Problem/cased based & written
information technology. P / examination with the use of OBE
rubrics
m. Recognize the need for and engage in planning self-learning and improving performance as foundation for Problem/cased based & written
continuing professional development. P / examination with the use of OBE
rubrics

Page 12 of 15
STUDENT OUTCOMES
COURSE CONTENTS
A B C D E F G H I J K L M

a. Review and analyze the effects of computer technology on


the society, and to anticipate the impact of that technology / / / / / / / / / / / / /
on individuals, companies and the wider community.
b. Select from the many algorithms for the implementation of
computer applications those that will not only satisfy the
needs of the economy but also those that will have higher / / / / / / / / / / / / /
factors of safety, greater sensitivity to user needs, and
increased reliability.
c. Understand their potential impact on the community that
they serve based on the level of ethics practiced in the use
/ / / / / / / / / / / / /
of computer technologies and make rational decisions
regarding their responsibilities to the community.
d. Interpret the social and legal context in which a particular
/ / / / / / / / / / / / /
system is being used and deduce its likely impact.
e. Develop strategies and policies to address a range of
ethical, social, and legal issues arising from developments / / / / / / / / / / / / /
in computing.
f. Distinguish between the various forms of intellectual
/ / / / / / / / / / / / /
property (patent, copyright, trademark, and trade secret).
g. Evaluate the privacy issues as it relates to information
/ / / / / / / / / / / / /
systems and the Internet
KEY LEGENDS ON LEVELS:
 I – INTRODUCED : Basic Concepts are merely Introduced
 P – PRACTICED: The concepts and principles are presented with applications
 D – DEMONSTRATE: Introduced and Practiced with skills acquisition

D. STUDENT OUTCOMES TO COURSE CONTENTS

Page 13 of 15
Curriculum Map
KEY LEGENDS ON LEVELS:
 I – INTRODUCED: Basic Concepts are merely Introduced
 P – PRACTICED: The concepts and principles are presented with applications
 D – DEMONSTRATE: Introduced and Practiced with skills acquisition

STUDENT OUTCOMES OF BACHELOR OF SCIENCE IN COMPUTER ENGINEERING


a. Apply knowledge of computing, science and mathematics appropriate to the discipline
b. Understand best practices and standards and their applications.
c. Analyze complex problems and identify and define the computing requirements appropriate to its solution.
d. Identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computer-based systems.
e. Design, implement and evaluate computer-based systems, processes, components or programs to meet desired needs and requirements under various constraints
f. Integrate IT-based solutions into the user environment effectively.
g. Apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT Profession.
h. Function effectively as a member or leader of a development team recognizing the different roles within a team to accomplish a common goal.
i. Assist in the creation of an effective IT project plan
j. Communicate effectively with the computing community and with society at large about complex computing activities through logical writing, presentations and clear instructions.
k. Analyze the local and global impact of computing information technology of individuals, organizations and society.
l. Understand professional, ethical, legal, security and social issues and responsibilities in the utilization of information technology.
m. Recognize the need for and engage in planning self-learning and improving performance as foundation for continuing professional development.
COURSE STUDENT OUTCOMES
UNITS LEARNING OUTCOMES
TITLE A B C D E F G H I J K L M
Review and analyze the effects of computer technology on the society, and
to anticipate the impact of that technology on individuals, companies and the
wider community.
Select from the many algorithms for the implementation of computer
SOCIAL applications those that will not only satisfy the needs of the economy but also
those that will have higher factors of safety, greater sensitivity to user needs,
AND
and increased reliability.
PROFESSIO 3 D D D D D D D D D D D D D
Understand their potential impact on the community that they serve based on
NAL ISSUES the level of ethics practiced in the use of computer technologies and make
1 rational decisions regarding their responsibilities to the community.
Interpret the social and legal context in which a particular system is being
used and deduce its likely impact.
Develop strategies and policies to address a range of ethical, social, and
legal issues arising from developments in computing.

Page 14 of 15
Distinguish between the various forms of intellectual property (patent,
copyright, trademark, and trade secret).
Evaluate the privacy issues as it relates to information systems and the
Internet

Page 15 of 15

Potrebbero piacerti anche