You are on page 1of 102

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Programme Code: BIT

Duration 3 Years
(Full-time)

Programme Structure

Version 2.0

September 2014

1. Programme Aims and objectives


Information Technology (IT) has become an integral part of modern life, and inextricable from
modern business. As firms continue to invest in new technologies and ever more sophisticated
technologies come to light, the demand for qualified computer network, systems, information
security and database administrators will continue to increase.
The Bachelor of Science in Information Technology is designed to graduate a computer science
professional whose diverse practical and theoretical knowledge will guide the future of
programming, infrastructure, networking, security and cloud based technologies in business
and industry. Objectives of the program are to ensure competencies at levels of programming,
network / systems administration, database management, information protection, business
intelligence, virtualization and cloud. The candidate will have deep insight on major aspects /
technologies of modern IT that can be applied in real world scenarios after completion of this
course.

There is a growing demand for professionals who have a good business knowledge and
technical knowhow to understand an organizations business systems and information needs
and who also have the technical awareness to ensure that the right information technology
infrastructure is available. The programme aims to provide students with an understanding of
Information Technology applications in business. It also aims to prepare students for leadership
roles.

After successful completion of the program, the students are expected to have developed

A solid understanding of information technology applications in business areas

Strong analytical skills for requirements elicitation

Expert knowledge in software applications development

Strong skills in Information risk

b.
c.
d.

Mode : Full-time
Duration : 3 years
Justification for program offering

One of the Mauritian government visions is that they want information technology to be one of
the major pillars of the Mauritian economy. Without highly trained personnels the government
visions would be just a mere dream. Moreover, burst in the BPO, call center and other
multinationals coming to Mauritius, again the need for highly trained staffs are a must. This
programme aims at developing competent IT engineers to fulfill the growing requirement of the
Mauritius Market

2.

Students Recruitment, Selection and Admission

a.

Admission Criteria

Students who have passed 12th class Science stream with Maths, Physics and Chemistry
(CBSE, India), or equivalent A level examination or Senior Secondary School Certificate with
Maths and Science or a technical diploma after Secondary School Certificate with English and
Maths in of the Secondary Education system in Mauritius and Africa.

b.

Provision for mature students

Applicants above 30 years of age, having Secondary School Certificate and a minimum of 5
years of experience in reputed organisations at a supervisory level are eligible to apply.

c.

Recognition of prior learning

The prior learning of the applicants who have undergone training and certificate programmes in
accounting and finance at recognised institutes, depending upon the content, duration of the
training and proficiency level achieved shall be recognised subject to review and
recommendation of Exemption committee. The recognition of prior learning may enable the
applicant to get exemption from a few relevant courses.

d.

Exemptions

The Exemptions Committee constituted by the Academic Council, will consider students
application for exemption of courses (on case-to-case basis) based on prior learning,
successful completion of equivalent recognized qualifications at similar level with good
academic standing.

e.

Student Counselling

Students are provided counselling throughout their association with AIHE in matters related to
academic progress and performance, student discipline, coping up with stress and personal
issues etc. Each student will be assigned with a faculty member who would act his/her mentor,
coach and guide.

f.

Yearly Intake : 200 students

3.

Programme design, approval and review

a.

Programme design

A well defined process exists for designing and developing new academic programs at AIHE.
The academic council provides insights and directions for identifying new programmes based
on the demand for developing human resource requirements of the growing economy, trade
and industry in Mauritius. The curriculum development committee comprising of faculty of AIHE

and Amitys global faculty and industry experts will develop the detailed curriculum and required
resources for programme delivery which will be presented to the Academic Council for its
approval.

b.

Programme content (Please refer Annexure -1)

c.
Programme review
All the academic programmes would be reviewed once in three years by a committee of experts
nominated by the Academic Council. This analysis involves number of lectures, practical
sessions, assessment, number of students, credits given, workload etc. The objective is to
ensure that the Institute is following-through on important quality- or strategy-related issues
such as contact hours, diversity in assessment methods, average class sizes, the provision of
practical training sessions etc. The process for the course analysis involves obtaining a data file
on all courses at the Institute in a given academic year, and entering additional information from
course syllabi, such as assessment methods, number of class hours, pedagogy, expansion of
knowledge in the relevant area etc. The Committee would submit its findings to the academic
council for its review and consideration before the recommendations are implemented.
d.
Fees (the figures are indicative only)
The current tuition fee for the whole 3-year programme is US$5000, equivalent to MUR
150,000. The fee is payable semester wise at the beginning of each semester (US$850 per
semester).

4.

Teaching and Learning environment

a.

Teaching accommodation

Well furnished classrooms with Wifi and LCD facilities.

b.

Learning environment

The faculties are highly qualified with a blend of corporate experience, highly motivated for
transferring knowledge, encourage students to learn beyond their curriculum to imbibe the
culture of research, innovation and creativity with the help of academic resources available on
Internet. Students with certain deficiencies like English language communication and
mathematics will be provided with tutorial classes. Further, students are encouraged to take
part in various competitive exams.
c.

Specialist facilities for programme

Computer Lab and Software


5.

Staff resources and ancillary

a.

Academic staff

Faculty resources for delivering the programme are available at AIHE. The faculty resources
can also be augmented from the pool of Amitys global faculty pool.

b.

Administrative staff

Administrative staff is available at the institute for General Administration, accounting,


marketing and student support services.

c.

Staff development

Staff are encouraged and sponsored for training both in-house and external training
programmes, upgrade their academic qualifications.

6.

Learning Resources

a.

Physical resources for programme delivery

Study Facilities

AIHE is located at Ebene, the corporate and knowledge hub of and is equipped with modern,
first-rate facilities.

Student Counseling

Service Student counseling specialises in helping students improve their study methods and
efficiency. Its aim is also to help students build increased awareness of their abilities, opinions,
and interests so they can be used effectively in academia and the workplace.

Computer Facilities

Student computer facilities are exemplary. In addition to a number of computer labs and
computer access at the library, wireless Internet connections are available in all buildings.

b.

Library, audio-visual, internet access, appropriate software and hardware

AIHE has developed advanced electronic library with excellent access to databases and
ejournals in all of AIHEs fields of study besides having audio-visual, internet access,
appropriate software and hardware

c.

Others

Facilities for Students with Special Needs

AIHE facilities are designed with special needs in mind. The classrooms are easily accessible
and every floor has an elevator.

7.

Programme Organisation and Delivery

a.

Programme delivery-time table

Mid August to Mid December (15 weeks of teaching)


End December: Declaration of Results

Mid January to Mid May (15 weeks of teaching)


End July: Declaration of Results

b.

Syllabus

The detailed syllabus is attached (Please refer Annexure 1)

c.

Assessment Schedule

In the module outline section percentage of course work and exams are clear given (Please
refer Annexure 1)

The week following end of semester (16 weeks)


8. Teaching and Learning

a.

Learning outcomes and how they are met.

Learning outcomes are explicitly stated for each of the courses. In order to meet the learning
outcomes, concepts, tools and techniques are an integral part of teaching strategy; casestudies, assignments, guest lectures by industry professionals and industrial visits are an
integral part of learning strategy and the students are expected to demonstrate achievement of
learning objectives through formative and summative assessments.

b.

Teaching methods

Lectures, Case-studies, Practicals, Projects

c.

Module map

Each module shall be mapped with the skill sets the students are expected to develop by the
end of the three year programme.

9.

Student support

a.

Academic and assistance in the programmatic, vocational and personal domains

Each student enrolled in the programme is assigned a faculty member who would be his/her
mentor to render possible assistance for programme, vocational personal related counselling.

b.

Information to potential learners during the application and enrolment phases

A dedicated team of counsellors provide programme related information in terms of minimum


eligibility, nature of the programme, career prospects, fee details etc during application and
enrolment phases.

c.

Student Information Booklet (under compilation)

d.

Job prospects

The job profiles could include as IT support Engineer, software Engineer, System Administrator,
system analyst, security engineer, Implementation consultant, IT Technician,

10.

Monitoring and Assessment

a.

Assessment methods

A system of Formative and Summative Assessment is being followed at the Institute. Formative
Assessment (Course work/Internal Assessment) facilitates continuous evaluation f students
learning and progress through Quizzes, Case-studies, assignments, presentations and mini

projects. The Summative Assessment facilitates assessment of integrated learning of the


course through a final written examination at the end of semester of duration not less than 2
hours duration but not exceeding 3 hours.

b.

Monitoring of students progress

Students learning in a course is monitored through the various components of the formative
assessment. Students who fail to secure a minimum grade for satisfactory performance in the
formative assessment shall have to do some additional course work in consultation with his/her
faculty to improve the formative assessment grade and this may require submission of a few
assignments, presentations, case study analysis etc.

c.

Management of examination

The Controller of Examinations (CoE) is responsible for smooth conduct of final examinations of
all academic programmes at the end of each semester.

d.

Credit System

1 module

= 3 or 4 credits

Final Year Project

e.

= 9 credits

Markings/Grading Policy

The maximum marks attainable for each level are:

Level 1:

1000

Level 2:

1000

Level 3:

1100

The level of students academic performance as the aggregate of continuous evaluation and
end term examination shall be reflected by letter grades on a ten point scale according to the
connotation as per Table A
and grades in Table- B.
TABLE -A
Grade

Qualitative Meaning

Grade Point Attached

A+

Outstanding

10

Excellent

A-

Very Good

B+

Good

Above Average

B-

Average

C+

Satisfactory

U/F

Fail

TABLE B

Grade

Qualitative Value of Grade

Percentage of marks for


letter Grade for UG
Programmes.

A+

Outstanding

80-100

Excellent

70-79

A-

Very Good

65-69

B+

Good

55-64

Above Average

50-54

B-

Average

45-49

C+

Satisfactory

40-44

U/F

Fail

Below 40

The Semester performance of a student will be indicated as Semester Grade Point


Average (SGPA). The SGPA will be weighted average of Grade Points of all letter
grades received by a student for all the Course units in the semester. The formula for
Computing SGPA is given below:

U1 G1+ U2 G2 + U3 G3 + ----------------SGPA=
U1 + U2 + U3+ -----------------------

Where U1, U2, U3 denote credits associated with courses taken by the Student
and G1,G2,G3 are the Grade Point of the letter grades awarded in the
respective Course.

10

The successful candidates shall be placed in Divisions as below:

CGPA

f.

EQUIVALENT DIVISION

8.5 and above

First class with Distinction

6.5 but less than 8.5

First Division

5.5 but less than 6.5 for UG programmes

Second Division

PROMOTION TO NEXT SEMESTER


As per the Rules and Regulations of AIHE.

11.
a.

Output, Outcomes and Quality control


Student feedback questionnaire

A Questionnaire has been designed to collect student feedback and shall be administered twice
a Semester (a semester is of 15; first time close to mid-semester, that is in the 6th week and
second time in the last week of semester).

The responses to Questionnaire will be analysed by the Dean or Director and the same is
shared with concerned faculty for improvements. The student feedback is kept confidential and
will become one of the critical inputs for facultys annual appraisal.

b.

Quality assurance system

Quality of the Graduates will depend to a large extent on:

Quality of enrolled learners;


Quality of lecturers/trainers; and
Quality of facilities and learning equipment.

The quality assurance system is being implemented to maintain and further develop the
quality of study programmes so that it:

11

is apparent to the students,


satisfies recognised academic goals, and
makes the study programmes socially relevant in a wider sense

AIHE quality assurance system comprises a unified set of elements intended to ensure
and improve the quality of education at the Institute. The purposes of quality assurance
system at AIHE are:
To contribute to the achievement of the goals defined for the educational activities
and the learning environment.
To reveal flaws and recognize the strong points of instruction and training.
To serve as a tool for systematic efforts for quality assurance and quality improvement.

The Institute is implementing the following systems:


I.
Selective entrance to secure best students
II.
Staff recruitment procedures, proper staff development and staff
III.
retention strategies;
IV.
External examining system to ensure high standards of
examinations;
V.
Performance related to funding of programmes and departments;
VI.
Recording of academic productivity in terms of publications and
VII.
Award, patents, royalties, and others.

12.

a.

External Examiners

Appointment of external examiners

The Academic Council has constituted a Subcommittee (Examinations Committee) and is


headed by a senior faculty (Controller of Examinations) responsible for smooth conduct of
examinations.

The Examinations Committee in consultation with Controller of Examinations appoints external


examiners drawn from universities and higher educational institutions in Mauritius, and Amitys
academic partners globally. The external examiners would assist AIHE in the preparation of
question papers, evaluation of answer scripts of the semester-end/Term-end examinations.

13.

Collaborative Provisions

a.

Memorandum of understanding

Amity India works with a host of academic collaborations across the world, including premier
universities of UK, USA and Asia. AIHE, being a part of the Indias leading and largest global
education group has access to Amity Indias academic partners.

12

14.

a.

Industrial Links/ Work-based Experience

Link with industry for placement

AIHE has initiated steps to network and work closely with industrial, commercial and
government organisations and in a short span of time we have been largely successful in our
efforts. Our institute is located in the hub of corporate offices which is helping us to interact with
senior level professional managers.
There are guest lectures, industrial visits, mini projects as part of our academic curriculum. The
curriculum has provisioned for internships during summer breaks to impart practical
training/work related experience to the students. These activities would provide a forum for our
faculty and students to interact with senior professionals and corporate leaders and explore
opportunities of summer placement, industrial training, consulting projects, market surveys and
research etc.
A specially constituted team led by a senior faculty is constantly working on developing
corporate relations to promote academia industry interface for making the curriculum industry
oriented and our graduates job ready.
15.

Others

Refund policy
(a) The registration fee is non-refundable under any circumstance.
(b) If a student withdraws after Admission but before 10 days from the date of
commencement of classes, 10% of the semester fees is deductible from the amount of
tuition fee paid by the student as charges towards processing of the admission and the
balance amount would be refunded.
(c) If a student completes his/her registration and withdraws within 30 days of the
commencement of classes, 30% of the semester fees is deductible from the amount of
tuition fee paid by the student and the balance amount would be refunded.
(d) If a student completes his/her registration and withdraws after 30 days but within 60
days of the commencement of classes, 50% of the semester fees is deductible from the
amount of tuition fee paid by the student and the balance amount would be refunded.
(e) No tuition fee is refundable for withdrawals after 60 days of the commencement of
classes,
(f) If a student has knowingly or willfully concealed or suppressed any information/fact or
found using any fraudulent means for getting admission to AIHE, which renders him /her
ineligible for the admission, the admission of such a student shall be cancelled at any
stage or will be liable to disciplinary action(s) as decided by the Institute (AIHE) and
such a student will not be entitled for refund of any fees.

Programme Management

Programme Leader: Mr. Ashley Paupiah

13

ANNEXURE 1

PROGRAMME STRUCTURE & CURRICULUM

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BIT)

The following provides details of the Programme Structure, the Detailed Curriculum and the
Scheme of Examination. The Programme Structure includes the courses (Core and Elective),
arranged semester wise. The importance of each course is defined in terms of credits attached
to it. The credit units attached to each course has been further defined in terms of contact hours
i.e. Lecture Hours (L), Tutorial Hours (T), Practical Hours (P). Towards earning credits in terms
of contact hours, 1 Lecture and 1 Tutorial per week are rated as 1 credit each and 2 Practical
hours per week are rated as 1 credit. Thus, for example, an L-T-P structure of 3-0-0 will have 3
credits,
3-1-0 will have 4 credits, and 3-1-2 will have 5 credits.

The Curriculum and Scheme of Examination of each course includes the course objectives,
course contents, scheme of examination and the list of text and references. The scheme of
examination defines the various components of evaluation and the weightage attached to each
component. The different codes used for the components of evaluation are:

Component

Codes

Case Discussion/
Presentation/ Analysis

Home Assignment

Project

Seminar

Viva

Quiz

Class test

CT

Attendance

End Semester Examination

EE

It is hoped that it will help the students study in a planned and a structured manner and
promote effective learning.

14

PROGRAMME STRUCTURE & CURRICULUM


BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
PROGRAMME STRUCTURE
YEAR 1 (LEVEL 1)
Semester 1
Code

Semester 2
Modules

Hrs/Wk
L P

Credits

Code

Modules

BIT001 Computer
Technology 1

2 + 1

BIT006

Computer
Technology 2

Hrs/
Wk
L P
2+2

Credits

BIT002

Programming and
Algorithms 1

2 + 2

BIT007

Database Systems

2+2

BIT003

Information
Systems in
Organizations

2 +1

BIT008

Programming and
algorithm 2

2+2

BIT004

Computing
Fundamentals 1

2+1

BIT009

Computer
Fundamentals 2

2+1

BIT005

Interface Design
and Web
Development

2+2

BIT010

Computer
Communications
and networking

2+2

YEAR 2 (LEVEL 2)
Semester 3
Code

Modules

Semester 4
Hrs/Wk
L+ T/P
2+2

Credits

Code

Modules

Hrs/Wk

Credits

BIT016

Professional
and Legal
issues
IT management

2+1

2 +1

Advanced
database
Systems
Geographic
Information
systems.
Research
Methodology
and Report
Preparation

2+2

2+2

2+1

BIT011

Object Oriented
Programming.

BIT012

Information
System Project
management

2+1

BIT017

BIT013

Advanced
Computer
Networking
Internet
application

2+2

BIT018

2+2

BIT019

Software
Engineering

2+2

BBA 403

BIT014

BIT015

15

YEAR 3 (LEVEL 3)
Semester 5
Code
BIT021

Semester 6

Modules
Information
Systems
Security and
Cryptography

Hrs/Wk
2+1

Credits
3

Code
BIT026

2+1

BIT027

BIT023

Information
Risk
Management

2+1

BIT028

BIT024

Artificial
Intelligence

2+2

BIT029

BIT022

Final Year
System
Development
Project

16

BIT030

Modules
Special
Database
Information
Security
services.
Distributed
Systems
and
Systems
Integration
Cloud
Computing &
Automating
the
Virtualized
Data
Final Year
Systems
Development
Project

Hrs/Wk
2+1

Credits
3

2+2

2+2

2+2

Module Outline
Computer Technology 1
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
-purpose computer
idealized generic computer

understand the number systems of binary, octal and hexadecimal and be able to perform
elementary arithmetic operations in these number systems
Prerequisite modules: None
Equipment / Software Required: None
Detailed Syllabus
d modes of use
1. Hardware, software, input device, storage device and output device
2. Purpose of input devices, storage devices and output devices
3. Different types of software: operating system and generic/common application software
System software
1. Purpose of operating systems
2. Characteristics of different types of operating systems and their uses: batch, real-time,
single-user, multi-user, multi-tasking and network
3. A range of applications requiring batch processing and a range of applications in which a
real- time response is required

1. Function and purpose of the control unit, memory unit and arithmetic logic unit (ALU) as
individual parts of a processor
2. Difference between types of primary memory and their uses (RAM, ROM)
3. Basic features, advantages, disadvantages and use of secondary storage media
4. Use ofbuffersandinterruptsinthetransferofdatabetweenperipheraldevicesandprimary memory
5. List of common peripheral devices in terms of their features, benefits, drawbacks and uses
6. Relate the choice of peripheral device to a given application, justifying the choices made

17

7. Understand the potential problem of speed mismatch between peripheral and processor

Logic gates
1. Function of AND, OR, NOT, NAND and NOR logic gates including the binary output
produced formal possible binary inputs
2. Calculate the outcome from a set of logic gates given the input by producing truth tables for
given logic circuits
3. Produce a simple logic circuit from a given written statement (e.g.if A AND B are on AND if C
is on then the lights will be on) .

Binary, Octal and hexadecimal. Perform arithmetic operations in these number systems,
conversion (BINARY, DECIMAL, OCTAL to BINARY and VICE VERSA)

eek Lecture Topics


1.

Lecturer Initials

Components of a computer System


and modes of use.

2.

3.

4.

Components of a computer system


and modes of use.
Major components of a Computer.

5.

6.

18

7.

Test

8.

Logic Gates

L,P,T

9.

10.

11.

Number System.

12.

13.

Presentation on 9 & 8

14.

Revision

15.

Revision

Primary Texts:
Capron, H. L., Computers (Tools for an Information Age), Prentice Hall (8th Ed), 2003, ISBN:
0131405640 Introductory book sets the module in context. Also covers systems software.
Clements, A., The Principles of Computer Hardware, Oxford University Press (4th Ed), 2006,
ISBN: 0198564538. Covers fundamentals and architecture in detail.
Tanenbaum, Andrew, S., Modern Operating Systems, Prentice Hall (3rd Ed), 2008, ISBN
0138134596 Covers operating systems and some networks.
Other Texts: Comer, D. E., Internet Book, The: Everything You Need to Know About Computer
Networking and How the Internet Works, Prentice Hall (4th Ed), 2007, ISBN: 0132335530
Halsall, F., Computer Networking and the Internet, Addison Wesley (5th Ed), 2005, ISBN:
0321263588 Covers the networks material in considerable depth.
Tanenbaum A. S., Computer Networks, Prentice Hall (4th Ed), 2003, ISBN: 0130384887

19

Other Reading: Students are expected to access a wide range of sources of information on IT
hardware/software including journals, popular computer magazines, and the internet.

Information Systems in Organisations


Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:
clarify the position of Information Systems in the overall structure and sub divisions of modern
organisations.
tion Systems
built and evaluated.
Information Systems
Prerequisite modules: None
Equipment / Software Required: None

Detailed Syllabus

1. The systems development life-cycle and its implications for software design, coding, testing,
implementation and support
2. Prototyping and systems development tools
3. Use of conceptual; modeling techniques, such as Waterfall Model and the Spiral Model
4. Structured systems analysis and design techniques Hard and soft system methodologies
5. Rapid application development and prototyping techniques

1. The flow of information in an organisation


2. Basic idea of management functions and structure of business and other organisations
3. Personnel and social considerations in the consideration of new systems.

20

4. Management of computer systems, staffing, maintenance, project management sand


scheduling .

WEEK

Lecture Topics

1.

The systems development life-cycle


and its implications for software
design, coding, testing, implementation
and support

2.

3.

Prototyping and systems development


tools
Use of conceptual; modeling
techniques, such as Waterfall Model
and the Spiral Model
Structured systems analysis and

4.

design techniques Hard and soft


system methodologies

5.
6.
7.
8.
9.
10.
11.

Rapid application development and


prototyping techniques
Test
The flow of information in an
organization
Basic idea of management functions
and structure of business and other
organizations
Personnel and social considerations in
the consideration of new systems

12.

Management of computer systems,


staffing, maintenance, project
management and scheduling

13.

Seminar

14.

Test

15.

Revision

21

Lecturer
Initials

L,P,T

Primary Texts:

Britton & Doake, Software Systems Development A Gentle Introduction, McGraw-Hill, 2005,
0077111036

Date, C. J., An Introduction to Database Systems, Addison-Wesley (8th Ed), 2003, ISBN:
0321189566 One of the standard works on database systems. Candidates should concentrate
on the basic concepts of database and database design.

Kendall, K & Kendall, J. E., Systems Analysis & Design, Prentice-Hall (6th Ed), 2003,
013127323X

Other Texts:

Graham, I., Object-oriented Methods, Addison-Wesley (3rd Ed), 2000, ISBN: 020161913X

Goodland, M. & Slater, C., SSADM: A Practical Approach, McGraw-Hill, 1995, ISBN:
007709073X

Rolland, F. D., The Essence of Databases, Prentice-Hall, 1998, ISBN: 0137278276

Nickerson, R. C., Business and Information Systems, Addison-Wesley (2nd Ed), 2003, ISBN:
0130901229

Geoffrey Elliot & Susan Starkings, Business Information Technology, Pearson, 2004, ISBN:
0321270126

Other Reading:

The computer trade press and the computing/IT supplements of newspapers will help to give
candidates both an understanding of the scope of the discipline and introduce new
developments in the field.

22

Programming and Algorithms 1


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Design and write computer elementary programs in a structured procedural language.

Use a text editor with command line tools and simple Integrated Development
Environment (IDE) to compile, link and execute program code.

Divide a computer program into modules.

Test computer programs to ensure compliance with requirements.

Implement elementary algorithms and data structures in a procedural language.

Prerequisite modules: None


Equipment / Software Required: Programming using C Sharp
Detailed Syllabus
Content:

23

Program Design
Pseudo code
Developing an Algorithm
Selection Control Structures
Repetition Control Structures
Pseudo code Algorithms Using Sequence, Selection, and Repetition
Array Processing
First Steps in Modularisation
Further Modularisation, Cohesion, and Coupling
General Algorithms for Common Business Problems
Detailed Object-Oriented Design
Simple Object-Oriented Design for Multiple Classes
WEEK

Lecture Topics

1.

Program Design, Pseudo code

2.

Developing an Algorithm

3.

Selection Control Structures

4.

Repetition Control Structures

5.

Test

6.

Pseudo code Algorithms Using


Sequence, Selection, and Repetition

Lecturer
Initials

L,P,T

7.

Array Processing

8.

First Steps in Modularisation

9.

Further Modularisation, Cohesion, and


Coupling

10.

General Algorithms for Common


Business Problems

11.

Detailed Object-Oriented Design

12.

Simple Object-Oriented Design for


Multiple Classes, Pseudo code

13.

Practical test

14.

Developing an Algorithm

15.

Revision

Primary Texts:

Lesley Anne Robertson, Simple Program Design: A Step-By-Step Approach, Course


Technology Inc (5th Ed), 2006, ISBN: 1423901320 Not specific to any programming language
or indeed to any single design method. Quite simple approach. Uses pseudocode, flowcharts
and Nassi-Schneiderman charts (not widely used)

Bell, D. Software Engineering for Students: A Programming Approach, Addison Wesley (4th
Ed), 2005, ISBN: 0321261275 Recommended for reading more about software engineering
and structured design concepts in programming

Indicative Programming Texts: Java Texts: Goodrich, Michael, T, Tamassia, R., Data
Structures & Algorithms in Java, John Wiley and Sons, 2005, ISBN: 0471738840

Horstmann, C.S., Java Concepts 6/E for Java 7 and 8 International Student Version, Wiley,
2010, ISBN: 978-0-470-56159-1

Deitel, H., Deitel, P Java How to Program, Pearson (8th Ed), 2010, ISBN: 0131364839

C/C++ Texts:

24

Savitch, W., Problem solving with C++, Pearson (7th Ed), 2009, ISBN: 0321549406 Uses
object-oriented ideas with the software life cycle.
Gottried, B.S., Schaums Outline of Programming with C, McGraw-Hill, 1996, ISBN:
0070240353

Other Reading: Other textbooks that describe introductory programming will be appropriate.
The computer trade press and the computing/IT supplements of newspapers will help to give
candidates both an understanding of the scope of the discipline and also introduce new
developments in the field.

Interface Design and Web Development


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Demonstrate an understanding of the development process of software systems.

Describe the major application areas of HCI.

Apply basic psychological principles to the overall design of user interfaces.

Describe the underlying architecture of both the World-Wide-Web and related Internet
technologies.

Implement web pages using HTML, XHTML and CSS.

Generate web content dynamically and interact with users of web resources using a
client side scripting language.

Evaluate web sites according to well known criteria for effective web design.

Express an understanding of the strengths and weaknesses of competing technologies


and select the appropriate technology or technologies for a given task.

Prerequisite modules: None


Equipment / Software Required: Programming using Flash, Dreamweaver or equivalent
Software, Java, JSP
Detailed Syllabus
Content:

25

History of the Evolution of the Internet

IP, TCP, HTTP, HTTPs, SMTP, POP, Intranet, Extranet, UDP, DNS,
FTP, URL, NNTP

Web Design Process

Relative v/s Absolute path (URL)

Website Development with Hypertext Mark-Up Language

Creating Thumbnails and Hot Spots

Image Map processing in Web Applications

Implementing Multimedia in Web Design

Web Form Development

Web Elements

Common Gateway Interface

Frames Design

Testing and Publishing of Websites

HCI

Thin Client Presentation and Basic Processing using Cascading Style


Sheets; Types of selectors

Cascading Style Sheets Features: Positioning and Styling

26

Document Object Model & Enhancing websites using JavaScript

Variables

Operators and Control Structures

Functions and Event Handlers

Arrays; DHTML

HTML5 / JQuery

Embedding Java Applets in Web Apps (1)

Embedding Java Applets in Web Apps (2)

27

Presentation

WEEK

Lecture Topics

History of the Evolution of the


Internet

IP, TCP, HTTP, HTTPs, SMTP,


POP, Intranet, Extranet, UDP,

1.

DNS, FTP, URL, NNTP

Web Design Process

Relative v/s Absolute path


(URL)

Website Development with


Hypertext Mark-Up Language

Creating Thumbnails and Hot


Spots

2.

Image Map processing in Web


Applications

Implementing Multimedia in
Web Design

3.

4.

Web Form Development

Web Elements

Common Gateway Interface

Frames Design

Testing and Publishing of


Websites

28

Lecturer
Initials

L,P,T

HCI

Thin Client Presentation and

5.

Basic Processing using


Cascading Style Sheets; Types
of selectors

6.

Cascading Style Sheets Features:


Positioning and Styling
Test

7.

Intensive Tutoring Week

8.

Document Object Model &


Enhancing websites using

9.

JavaScript

Variables

Operators and Control


Structures

10.

11.

Functions and Event Handlers

Arrays; DHTML

HTML5 / JQuery

Embedding Java Applets in

12.

Web Apps (1)

13.

Embedding Java Applets in


Web Apps (2)

14.

15.

Revision

Presentation

Primary Texts: Dix, Finlay, Abowd & Beale, Human Computer Interaction, Hardcover 832
pages (September 30, 2003) Publisher: Prentice Hall, Language: English, ISBN: 0130461091

Other Texts:

29

Preece, Rogers & Sharp, Interaction Design, Paperback 544 pages (January 21, 2002)
Publisher: John Wiley and Sons Ltd, Language: English, ISBN: 0471492787

David Benyon, Phil Turner, Susan Turner, Designing Interactive Systems: People, Activities,
Contexts, Technologies, Hardcover 672 pages (November 5, 2004) Publisher: Addison Wesley,
Language: English, ISBN: 0321116291

Computing Fundamentals 1
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

Demonstrate a knowledge of number systems, Boolean algebra, sets, logic, relations


and functions.

Identify foundational issues when they are encountered in other course modules.

Use the course content (e.g. logic) to solve a variety of computing problems

Use course software the related tools to solve computing problems.

Apply fundamental mathematical theory to other course modules.

Prerequisite modules: None


Equipment / Software Required: None
Detailed Syllabus

FUNDAMENTALS

1. Number representation (e.g. binary, hexadecimal)and the conversion between bases


representation of negative numbers, fractional numbers, and floating point numbers.
2. Gates: AND, OR, NAND, NOR, EOR, inverter
3. Sequential logic elements: flip-flops, RSflip-flops, JKflip-flops Simple logic circuits: Full
adder, multiplexer, shift register, counter Boolean algebra, simplification of logic
equations, truth tables

PROCESSOR ARCHITECTURE

1. The concept of a stored program and the fetch/execute cycle


2. Structure of the CPU at the level of registers, buses, and functional units

30

3. Instruction formats (one-,two-,and three-address formats)


4.

Typicalcomputerinstructions(datamovement,arithmeticalandlogical,flowcontrol) Trends

inprocess or technology
5. Information storage :The memory hierarchy from cache to secondary storage
6.
The operation of both magnetic and optical storage devices, their performance and
characteristics
7.
The characteristics and performance of peripherals; for example, display devices,
printers, keyboards etc
8. Input/output techniques : peripheral polling and interrupt driven I/O

INTRODUCTION TO

OPERATING

SYSTEMS AND SYSTEM SOFTWARE

1. The human interface


2. Multi tasking: interrupts, concurrency ,scheduling ,memory management
3.
System software :Internet browsers, email systems, security products(e.g. antivirus
software)
4. System performance and its evaluation: definition, measurement and benchmark

WEE
K

Lecture Topics
The concept of a stored program and the fetch/execute cycle

1.

2.

Structure of the CPU at the level of registers, buses, and functional


units

Instruction formats (one-,two-,and three-address formats)


3.

31

Lectur
er
Initials

L,P,
T

Typical computer instructions (data movement, arithmetical and


4.

logical ,flow control) Trends in process or technology

5.

Information storage :The memory hierarchy from cache to secondary


storage

6.

TEST/Quiz

7.

The operation of both magnetic and optical storage devices, their


performance and characteristics

Input/output techniques : peripheral polling and interrupt driven I/O


8.

9.

The human interface


Multi tasking: interrupts, concurrency ,scheduling ,memory
management

10.

Systemsoftware:Internetbrowsers,emailsystems,securityproducts(e.g
.antivirus software)

11.

System software: Internet browsers, email systems, security products


(e.g. antivirus software)

12.

Seminar

13.

System software :Internet browsers, email systems, security


products(e.g. antivirus software)

14.

System performance and its evaluation: definition, measurement and


benchmark

15.

Revision

Core Module: Professional Issues in Information Systems Practice

Primary Text:

32

Bott M. F., Professional Issues in Information Technology, The British Computer Society, 2005.
ISBN: 1902505654 and ISBN 13: 9781902505657

Other Material:
Bott. Frank et al, Professional Issues in Software Engineering, Taylor and Francis (3rd Ed),
2001, ISBN-13: 978-0748409518
Ayres, Robert, The Essence of Professional Issues in Computing, Prentice Hall, 1999, ISBN13: 978-0139087400
Myers C. (Ed), Professional Awareness in Software Engineering, McGraw-Hill, 1995, ISBN:
0077078373 (out of print)
Myers C., Hall T. and Pitt D., (Eds), The Responsible Software Engineer: Selected Readings in
IT Professionalism, Springer, 1997, ISBN: 3540760415 (out of print)

Programming and Algorithms 2


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Design and write advanced computer programs in a structured procedural language.

Test computer programs to ensure compliance with requirements.

Implement advanced algorithms and data structures in a procedural language.

Write programs that can interact with persistent data stores such as text files and binary
files using serial, sequential and direct access.

Describe and implement advanced algorithms and data structures for solving specific
data representation, retrieval and storage problems.

Prerequisite modules:

Programming and Algorithms 1

Equipment / Software Required: Programming using C Sharp, C++, Java, ASP.NET


Detailed Syllabus

1.

2.

33

The concepts underlying the design and use of programming languages showing how
languages
major
handle issues such as declarations, types, data abstraction,
information hiding and modularity.

Programming environments including use of compilers, interpreters, developments


tools, debugging and testing tools.

3.

4.

5.

Expose the basic relationships and features that exist between algorithms and program
development. Importance and use of pseudo codes and flowcharts in the field of
programming.

Overview of object-oriented and procedural languages such as C, C++, JAVA. Basic


objects, classes, methods, overloading methods, messages.
concepts such as

Create stand-alone applications having a graphical user interface (GUI) using either
Visual Basic .Net or Java.

WEEK

Lecture Topics

1.

The concepts underlying the design


and use of programming languages
showing how major languages handle
issues such as declarations, types,
data abstraction, information hiding
and modularity.

2.

3.

4.

5.

Programming environments including


use of compilers, interpreters,
developments tools, debugging and
testing tools.

6.

Test/quiz/Assignment

7.

9.

Expose the basic relationships and


features that exist between algorithms
and program development. Importance
and use of pseudo codes and
flowcharts in the field of programming

10.

Assignment

8.

11.

34

Overview of object-oriented and


procedural languages such as C, C++,
objects,
JAVA. Basic concepts such as
classes, methods, overloading
methods, messages.

Lecturer
Initials

L,P,T

12.
13.

Create stand-alone applications having


a graphical user interface (GUI) using
either Visual Basic .Net or Java.

14.

Practical test

15.

Revision

Primary Texts:
Clark R. G., Comparative Programming Languages, Addison-Wesley (3rd Ed.), 2000, ISBN-13:
978-0201710120
Mitchell, John C., Concepts in Programming Languages, Cambridge University Press, 2001,
ISBN-13: 978-0521780988
Sebesta, R. W., Concepts of Programming Languages, Addison-Wesley (7th Ed.), 2005, ISBN13: 978-0321330253
Tucker A. and Noonan R, Programming Languages: Principles and Paradigms, McGraw Hill,
2006, ISBN-13: 978-0072866094
Other Texts:
Barron D. W., The World of Scripting Languages, Wiley, 2000, ISBN-13: 9780471998860
Harris, T. and Bacon J.,Operating Systems: Concurrent and Distributed Software Design,
Addison-Wesley, 2003, ISBN-13: 978-0321117892

Database Systems
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

35

Understand the notion of persistent file storage and be able to describe techniques for
data organisation.

Describe and justify the rationale for relational database management systems.

Demonstrate an understanding of the desirable features of a database management


system and how they are achieved.

Identify and distinguish between data and meta-data, and the concepts of keys.

Design a data model suited to a business application and implement it in a relational


database.

Define tables and views with appropriate constraints to ensure data integrity and
relational integrity.

Manipulate the data in a relational database using DDL and DML aspects of SQL.

Apply knowledge gained to real-world problems.

Prerequisite modules: None


Equipment / Software Required: Using MSAccess, MSSQL, MySQL,XML
Detailed Syllabus

DATABASE MANAGEMENT SYSTEMS


1. Comparison of a data-centered approach with file-based approach.
2. Data integrity and quality control.
3. Transaction processing.
4. Logical and physical data independence how it is achieved.

DATA ANALYSISANDDATAMODELLING

1. Entity relationship diagrams and conceptual modelling.


2. Relationship constraints and translation to relational model.

1.

The Relational model and relational Languages.


Functional Dependency theory and

normalisation
2.

Relational modelling.

3.

Simple relational algebra programs. Features of relational algebra in

SQL.
4.
Standards and basic structure of SQL for data definition, views,updates,insertion and
referential integrity constraints.

DISTRIBUTED AND MULTI-USER DATABASE SYSTEMS

1. Concurrency, recovery and database integrity.


2. Client-server model as distributed database architecture.

36

WEEK

Lecture Topics
Comparison of a data-centered
approach with file-based approach.

1.

Data integrity and quality control.

Transaction processing.
2.

Logical and physical data


independence how it is achieved.

3.

Seminar/quiz
Entity relationship diagrams and
conceptual modelling.

4.

Relationship constraints and


translation to relational model.

5.

Functional Dependency theory and


normalization

6.

Relational modelling
Simple relational
algebra programs.

7.

Features of relational
algebra in SQL.

8.

Quiz/Assignment/Test/

9.

Standards and basic structure of SQL


for data definition, views, updates,
insertion and referential integrity
constraints

10.

Practical Test

11.

Concurrency, recovery and database


integrity

12.

37

Lecturer
Initials

L,P,T

13.

Client-server model as distributed


database architecture

14.

Test/Practical/Seminar

15.

Revision

Primary Texts:
Howe D. R., Data Analysis for Database Design, Butterworth Heinemann (3rd Ed), 2001, ISBN:
0750650869
Other Texts:
Groff & Weinberg, SQL: The Complete Reference, McGraw Hill (Osbourne Media), 2nd Ed.,
2002, ISBN: 0072225599
McFadden J.A., & Hoffer F.R., Modern Database Management, Benjamin Cummins (7th Ed),
2004, ISBN: 0131453203
Korth, Silberschatz, Sudarshan, Database System Concepts, McGraw Hill (5th Ed), 2001,
ISBN: 007124476X
Watson, R.J., Data Management: Database & Organizations, Wiley (4th Ed), 2003, ISBN:
0471452254

Computing Fundamentals 2
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

Demonstrate a knowledge of the application of discrete mathematics to computing


problems.

Identify foundational issues when they are encountered in other course modules.

Apply fundamental theory to other course modules.

Use the course content to solve computing problems

Use the module software on a variety of computing problems

Prerequisite modules:

Computing Fundamentals 1

Equipment / Software Required: None


Detailed Syllabus
1. Graph Theory: Definition, properties, graph representation, types, paths, cycles,
isomorphism of graphs, planar graph, and application of graphs to computing.

38

2. Statistics: range, mode, median, mean, standard deviation, variance, sampling and
sampling distributions, probability, hypothesis testing, applications of statistics (e.g.
analysis of data stored in a relational database)
3. Lattice Theory: lattice notation and definition, relations, closure of relations, ordered
sets, partial orders, linear orders, application of lattices to computing (e.g. pre and post
conditions in software engineering).
4. Algebraic Structures and Techniques: algebras, theories, models, composition, abstract
data types (ADTs), languages for algebraic specification and programming, applications
to lists, strings, queues, stacks, trees, etc.
5. Supporting software: The above topics will be supported by software tools such as
general statistical packages, statistical extensions to SQL, functional and logic based
programming languages.

WEEK

Lecture Topics

1.

Graph Theory: Definition, properties,


graph representation, types, paths,
cycles, isomorphism of graphs, planar
graph, and application of graphs to
computing.

2.

3.

Quiz
4.

6.

Statistics: range, mode, median,


mean, standard deviation, variance,
sampling and sampling distributions,
probability, hypothesis testing,
applications of statistics (e.g. analysis
of data stored in a relational database)

7.

Test

8.

Lattice Theory: lattice notation and


definition, relations, closure of
relations, ordered sets, partial orders,
linear orders, application of lattices to
computing (e.g. pre and post
conditions in software engineering).

5.

9.

39

Lecturer
Initials

L,P,T

10.
11.

12.

Algebraic Structures and Techniques:


algebras, theories, models,
composition, abstract data types
(ADTs), languages for algebraic
specification and programming,
applications to lists, strings, queues,
stacks, trees, etc.

13.

Test/assignment/practical

14.

Revision

15.

Revision

Computer Technology 2
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Write scripts using one or more shell scripting languages.

Enumerate, describe, and differentiate between a number of different computer


operating systems

Describe how a modern general-purpose operating system typically manages memory,


processes and threads

Explain the concepts of concurrency and parallelism

Enumerate, explain, and differentiate between different mechanisms of inter-process


communication and synchronisation

Analyse the architecture of a computer system and understand the significance of


different architectural features and their affect on system administration

Perform basic and common system administration operations

Develop further appreciation of the protocols and policies of system administration

Prerequisite modules:

Computer Technology 1

Equipment / Software Required: Shell Scripting- Using Linux, Microsoft Windows, Linux
Systems in different flavours
Detailed Syllabus
WEEK

40

Lecture Topics

Lecturer
Initials

L,P,T

1.
2.
3.

Write scripts using one or more shell


scripting languages.
Enumerate, describe, and differentiate
between a number of different
computer operating systems

4.

Seminar/quiz

5.

Describe how a modern generalpurpose operating system typically


manages memory, processes and
threads

6.

Explain the concepts of concurrency


and parallelism

7.

Test

8.

Enumerate, explain, and differentiate


between different mechanisms of interprocess communication and
synchronisation

9.
10.

11.

Analyse the architecture of a computer


system and understand the
significance of different architectural
features and their affect on system
administration

12.

Perform basic and common system


administration operations

13.

Develop further appreciation of the


protocols and policies of system
administration
Revision

14.

Test/Practical

15.

Revision/Questions

Computer Communications and Networking


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

41

Describe the different types of transmissions signals used for computer communications

Explain the difference between system and signal bandwidth

Describe the physical properties and performance characteristics of a variety of


communication media

Describe and evaluate digital and analogue data encoding techniques

Describe the basic building blocks associated with communications systems and their
associated tasks

Describe the concepts behind switching networks

Describe and evaluate the predominant LAN and WAN technologies

Describe network extendibility and interconnection technologies

Describe the components associated with internetworking architectures

Describe and evaluate routing concepts and techniques

Describe protocol addressing, error handling and congestion control on an internetwork

Describe the functionality associated with the upper layers (above the Physical and
Data Link layers) of the ISO OSI and TCP/IP Reference Models

Prerequisite modules:

Computer Technology 1

Equipment / Software Required: Opnet Software for simulation, GNS3, Linux, Windows
Detailed Syllabus
DIGITALCOMMUNICATION

1. Physical properties of copper media, fibre optics, radio communication, and data
communication standards. Maximum data rates (theoretical and practical) for different
media including some simple analysis of signals. Data encoding of digital signals. The
distinction between, and analysis of, physical media and wireless media properties. The
difference between narrow band and broad band technologies with particular reference
to ISDN and xDSL.

LOCAL
NETWORKS

AREA

Types of LAN covering standards, topology and performance. Example architectures


such as Ethernet and fast ethernet, ATM, and WiFi. The operation of LAN switches and
the configuration of virtual LANs.

WIDE
NETWORKS

AREA

Circuit versus packet switching and associated routing and flow control. Detailed
examples of existing architectures such as Frame Relay, ISDN, ATM, Multi-protocol
Label Switching (MPLS) and Virtual Private Networks (VPN).

INTER
NETWOKS

42

Principles of internetworking, architectures, addressing and protocols.


reference to ISO-OSI, IPv4, IPv6, TCP and UDP.

Particular

ERROR

The main causes of errors and their effects on transmission. Single bit and burst errors.
Various error detection and correction strategies including parity, block sum, Hamming
Codes, Cyclic Redundancy Checks and Forward versus Backward error control.
Statistical analysis of the effectiveness of error detection and correction code.

WEEK

Lecture Topics

1.

Digital Communication: Fibre optics,


standards, data rates for different
media. Data encoding of digital
signals. Narrow band v/s Broad band
technologies

2.

LAN Standards & Network topologies.


Media types Fast Ethernet and WIFI.
Local Area Networks : Multiple access
communications, local area networks
(LAN) structure, the
medium access control sub layer, the
logical link control layer, random
access, ALOHA, slotted ALOHA,
CSMA, CSMA/CD, scheduling
approaches to medium access control,
reservation systems, polling, token

3.
passing rings, comparison of random
access and scheduling medium
access controls, IEEE 802.3
standards for 10Mbps and 1000 Mbps
LANs, repeaters and hubs, LAN
bridges, transparent bridges,
source routing bridges, mixes media
bridges, LAN switches, spanning tree
algorithm.
4.

43

Circuit versus packet switching


networks, routing and flow control

Lecturer
Initials

L,P,T

5.

Frame Relay, ISDN, ATM, Multiprotocol Label Switching (MPLS) and


Virtual Private Networks (VPN).

6.

Test

7.

Principles of internetworking,
architectures, addressing. Calculating
IP address range based on subnets
required. Subnet mask and broadcast
address calculation.
Application and Layered Architectures
:Layering architecture, the OSI
reference model, unified

8.
view of layers, protocols and services,
overview of TCP/IP architecture,
TCP/IP protocol.
9.

Understanding IPv4 and IPv6


Frame Relay and Asynchronous Mode
(ATM) : Frame relay protocol
architecture, frame relay call
control, user data transfer network
function, congestion control, ATM
architecture, logical

10.

connection, ATM cells, transmission of


ATM cells, ATM adaptation layers,
ATM traffic
management and Qos, FIFO and
priority queues, fair queuing,
congestion control, open loop control,
closed loop control.

44

11.

Part 1: Errors, single bit and burst


errors, error detection and correction
strategies, CRC, Hamming codes,
Forward v/s Backward error control

12.

Statistical analysis of the effectiveness


of error detection and correction code.

13.

Seminar

14.

Test

15.

Revision

Primary Texts:
Halsall, Fred, Computer Networking and the Internet, Addison Wesley (5th Ed), 2005, ISBN:
0321263588
Stallings, William, Data and Computer Communications, Prentice Hall Int. (8th Ed), 2007, ISBN:
0132433109
OtherTexts:
Stallings, William, Wireless Communications and Networks (2nd Edition), 2004, ISBN:
0131967908 Tanenbaum, Andrew, Computer Networks (International Edition) (4th Edition),
2002, ISBN: 0130384887

Object Oriented Programming


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Demonstrate an understanding of the underlying principles and concepts of ObjectOriented Programming

Use UML in the design of OOP programs

Write programs using Object-Oriented programming language

Extensively testing using debugging tools to remove runtime errors from a program

Document an Object-Oriented program

Demonstrate an understanding of the advanced principles and concepts of Object


Oriented Programming

Design and implement object oriented programs using advanced Object Oriented
constructs and design patterns

Persistent objects: Formatted file input and output, direct file input and output

Construct Program Libraries

Prerequisite modules:

Programming and Algorithms 1

Programming and Algorithms 2

Equipment / Software Required: Java, J2ME, JSP, C++


Detailed Syllabus

Thinking Object-Orineted.
Why is OOP Popular?
Language and Thought.
A New Paradigm.
A Way of Viewing the World.
Computation as Simulation.

45

A Brief History.

Layers of Abstraction.
Layers of Abstraction.
Other Forms of Abstraction.
A Short History of Abstraction Mechanisms.

Object-Oriented Design.
Responsibility Implies Noninterference.
Programming in the Small and in the Large.
Why Begin with Behavior.
A Case Study in RDD.
CRC Cards-Recording Responsibility.
Components and Behavior.
Software Components.

Classes and Methods.


Encapsulation.
Class Definitions.
Methods.
Variations on Class Themes.

Messages, Instances, and Initialization.


Message-Passing Syntax.
Accessing the Receiver from Within a Method.
Object Creation.
Pointers.
Memory Recovery.
Constructors.
Constant Values.
Destructors and Finalizers.

46

Metaclasses in Smalltalk.

Inheritance and Substitution.


An Intuitive Description of Inheritance.
Subclass, Subtype, and Substitution.
Interfaces.
Forms of Inheritance.
Inheritance in Various Languages.
Inheritance and Constructors.
The Benefits of Inheritance.
The Costs of Inheritance.

Subclasses and Subtypes.


Substitutability.
Subtypes.
The Substitutability Paradox.
Is This a Problem?
Dynamically Typed Languages.
Pre and Post-conditions.
Scandinavian Semantics.

Static and Dynamic Behavior.


Static versus Dynamic Typing.
Static and Dynamic Classes.
Static versus Dynamic Method Binding.

Implications of Substitution.
Memory Layout.
Assignment.
Copies and Clones.

47

Equality.

Multiple Inheritance.
Inheritance as Categorization.
Problems Arising from Multiple Inheritance.
Multiple Inheritance of Interfaces.
Inheritance from Common Ancestors.
Inner Classes.

Polymorphism and Software Reuse.


Polymorphism in Programming Languages.
Mechanisms for Software Reuse.
Efficiency and Polymorphism.
Will Widespread Software Reuse Become Reality.

Overloading.
Type Signature and Scopes.
Overloading Based on Scopes.
Overloading Based on Type Signatures.
Redefinition.
Polyadicity.
Multi-Methods.

Overriding.
Notating Overriding.
Replacement versus Refinement.
Deferred Methods.
Overriding versus Shadowing.
Covariance and Contravariance.
Variations on Overriding

48

The Polymorphic Variable.


Simple Polymorphic Variables.
The Receiver Variable.
Downcasting.
Pure Polymorphism.

Generics.
Template Functions.
Template Classes.
Inheritance in Template Arguments.

Container Classes.
Containers in Dynamically Typed Languages.
Containers in Statically-Typed Languages.
Restricting Element Types.
Iteration.

Frameworks.
Reuse and Specialization.

An Example Framework: TheAWT and Swing.


The AWT Class Hierarchy.
The Layout Manager.
Listeners.
User Interface Components.
Case Study: A Color Display.
The Swing component Library.

49

Object Interconnections.

Coupling and Cohesion.


Subclass Clients and User Clients.
Control of Access and Visibility.
Intentional Dependency.

Design Patterns.
Controlling Information Flow.
Describing Patterns.
Iterator.
Software Factory.
Strategy.
Singleton.
Composite.
Decorator.

Reflection and Introspection.


Mechanisms for Understanding.
Methods of Objects.
Mechanisms for Modification.
Metaclasses.

Network Programming.
Addresses, Ports, and Sockets.
A Simple Client/Server Program.
Multiple Clients.
Transmitting Objects over a Network.
Providing More Complexity.

Implementation.
Compilers and Interpreters.

50

The Receiver as Argument.


Inherited Methods.
Overridden Methods.
Name Encoding.
Dispatch Tables.
Bytecode Interpreters.
Just-in-Time Compilation.

51

WEEK

Lecture Topics

1.

Thinking Object-Orineted - Why is


OOP Popular? - Language and
Thought - A New Paradigm - A Way of
Viewing the World - Computation as
Simulation.

2.

Layers of Abstraction, Object-Oriented


Design, Software Components.

3.

Classes and Methods: Encapsulation,


Class Definitions and methods

4.

Part 1: Messages, Instances, and


Initialization: Accessing the Receiver
from Within a Method, Object Creation,
Pointers.

5.

Part 2: Constant Values, Destructors


and Finalizers, Metaclasses in
Smalltalk.

6.

Test

7.

Inheritance and Substitution :


Subclass, Subtype, and Substitution,
Interfaces,
Forms of Inheritance, Inheritance and
Constructors.
Subclasses and Subtypes:
Dynamically Typed Languages,

8.

Pre and Post-conditions,


Scandinavian Semantics.
Static and Dynamic Behavior:

52

9.

Static versus Dynamic Typing, Static


and Dynamic Classes, Static versus
Dynamic Method Binding.

10.

Multiple Inheritance

11.

Polymorphism and Software Reuse.

12.

Overloading and Polymorphic Variable

13.

An Example Framework: TheAWT and


Swing.

Lecturer
Initials

L,P,T

14.

Test

15.

Revision

Primary Texts:

Budd T., An Introduction to Object-oriented Programming, Addison-Wesley (3rd Ed), 2001,


ISBN: 032121028X
Fowler M., UML Distilled, Addison-Wesley (3rd Ed), 2003, ISBN: 0321193687
Link, Johannes, Unit Testing in Java: How Tests drive the Code, Morgan Kaufman, 2003, ISBN:
1558608680
Shalloway A. and Trott J., Design Patterns Explained: A New Perspective on Object-oriented
Design, Addison-Wesley (2nd Ed), 2004, ISBN: 032247140
Other Texts:
Barclay K and Savage J, Object-Oriented Design with UML and Java, Elsevier, 2004, ISBN:
0750660988 Eckel B.,
Thinking in C++, Prentice Hall, 2004, ISBN: 0131225529
Flanagan D., Java in a Nutshell, O'Reilly & Associates (5th Ed), 2005, ISBN: 0596007736
Gamma et al, Design Patterns, Addison-Wesley, 1995, ISBN: 0201633612
Grand M., Patterns in Java, John Wiley and Sons (2nd Ed), 2002, ISBN: 0471227293
Priestley M., Practical Object-Oriented Design with UML, McGraw-Hill (2nd Ed), 2003, ISBN:
0077103939

Information Systems Project Management


Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

Clarify the stages in a project and its position in the systems development life-cycle.

Explain and use project planning and estimating techniques.

Discuss the human resources issues appropriate to team building and management;
and professional conduct.

Demonstrate a practical knowledge of project control, progress monitoring, and


reporting.

Explain interdisciplinary issues that impact the project managers domain.

Prerequisite modules: None


Equipment / Software Required: Open Project Management Software or MS Project

53

Detailed Syllabus

STAGES OF A PROJECT

1. Feasibility studies and the establishment of a business case for a project Requirements
elicitation, analysis and verification: purpose and methods Establishing project
objectives, goals and measures of success
2. Stages of a development project:
Requirements selection
Requirements analysis
design of software, hardware and networks;system building(includingsoftwarecoding)
andintegration;verificationandvalidation(includingtesting);installation
Adapting the development life cycle to projects where off-the-shelf packages are to be
installed
3. Criteria for building or buying in software applications
4. Project management using a lightweight or agile approach with particular reference to
the use of time-boxing, prototypes, joint application development and rapid application
development.
5. Installation issues ,including methods of going live
6. Project closure and post implementation activities
7. Selection, acquisition and implementation of off-the-shelf and customized off-the-shelf
applications
8. Project support activities, including configuration management and change control

PROJECT PLANNING AND ESTIMATING

1. Use of product and work break down structures (PBS and WBS).
2. Use of (activity on node) precedence plans and network analysis Critical path analysis
3. Gantt charts
4. Resource allocation, including the identification of resource types and the resolution of

54

resource clashes

HUMAN FACTORS

1. Team building theory and practice, structures and responsibilities, including Belbins
team roles and Tuckman-Jensen stages of team evolution (forming, storming, norming
performing)
2. How to staff a project stage with appropriate skill sets; how and where to obtain skilled
personnel
3. Appropriate management styles for development projects
4. Team management, motivation, retention
5. The role, responsibilities and skills of the project manager

6. Management of relationships with the stakeholders within and outside the project team,
including users.
7. Project organization: roles of project boards (or steering committees), user and
developerrepresentatives,projectmanagers,teamleaders,suppliers,programmeand
project support, project assurance

PROGRESS MONITORING, PROJECT CONTROL AND REPORTING

1. What to monitor and why Where and when to monitor Project control through monitoring
Use of plans in project control
2. Reasons for reports: whom to report to and how to report Types of report: exception,
progress, management. Monitoring and control of project finances and quality
3. Assessment of implications and impact on the project of deviations and changes to
project plan.
WEEK

Lecture Topics

1.

Stages of a project Feasibility


studies, stages of a development
project, criteria for building or buying

2.

55

Lecturer
Initials

L,P,T

3.
4.

5.

applications, project management, go


live, post go live and project support
Project Planning & Estimation - Use of
product and work break down
structures, Use of (activity on node)
precedence plans and network
analysis Critical path analysis, Gantt
charts, Resource allocation, including
the identification of resource types and
the resolution of resource clashes

6.

Test

7.

Human Factors Team building, staff


a project stage with skilled personnel,
team management, attributes of a
project manager, relationship
management, project organization.

8.

9.

Progress Monitoring

10.

Project Control

11.

Reporting

12.

Quiz/seminar

13.

Test

14.

Revision

15.

Revision / Questions & Answers

Primary Texts:
Field, Mike and Keller, Laurie, Project Management Open University, International Thomson
Press, 1998, ISBN: 1861522746
Hughes, Bob and Cotterell, Mike, Software Project Management, McGraw-Hill (4th Ed), 2005,
ISBN: 0077109899 (Tate McGraw-Hill, New Delhi, ISBN: 007043854)
Hughes, Bob (Ed) et al, Project Management for IT Related Projects, The British Computer
Society, 2004, ISBN: 1902505581 and 9781902505589
Cadle J. & D. Yeates Project Management for Information Systems, Pearson Prentice Hall (5th
Ed), 2006, ISBN 978-0-13-206858-1
Other Reading:
Bott M. F., Professional Issues in Information Technology, The British Computer Society, 2005,
ISBN: 1902505654 and 9781902505657

56

Advanced Computer Networking


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Describe a variety of access technologies

Discuss the network performance challenges posed by networked multimedia


applications

Discuss the client-server computing paradigm

Describe the purpose of the transport layer and the services provided by this layer

Describe the functionality associated with common network applications

Produce iterative and concurrent networked applications

Demonstrate and evaluate the operation of the transport layer using networked
applications

Demonstrate the use of standard network monitoring tools

Prerequisite modules:

Computer Communications and Networking

Equipment / Software Required: Opnet Software for simulation, GNS3, Linux, Windows
Detailed Syllabus

57

Layered communication architecture: layers, services, protocols, layer entities, service


access points, protocol functions
Advanced Routing algorithms
Advanced Network Congestion Control algorithms
Quality of service
Real Time Transport Protocol
Internetworking
Performance Issues
VPN networks
Wireless Networks and Mobile Networks: LAN, PAN, Sensor Networks, Ad_hoc
Networks
Mobile IP, Mobile TCP, IP Security

WEEK

Lecture Topics

1.

Layered communication architecture:


layers, services, protocols, layer
entities, service access points,
protocol functions

2.

Advanced Routing algorithms

3.

Advanced Network Congestion Control


algorithms

Lecturer
Initials

L,P,T

4.

Quality of service

5.

Real Time Transport Protocol

6.

Test

7.

Internetworking

8.

Performance Issues

9.

VPN networks

10.

Part 1: Wireless Networks and Mobile


Networks: LAN

11.

Part 2: Wireless Networks and Mobile


Networks: PAN, Sensor Networks,
Ad_hoc Networks

12.

Mobile IP, Mobile TCP, IP Security

13.

Case study

14.

Test

15.

Revision

Primary Texts:

Chaffey D., Groupware, Workflow and Intranets: Reengineering the Enterprise with
Collaborative Software, Digital Press, 1998, ISBN: 1555581846

Collins T. & Bicknell D., Crash: Learning from the Worst Computer Disasters, Simon and
Schuster, 2000, ISBN: 0684868350

Coulouris G., Dollimore, J., and Kindberg T., Distributed Systems, Addison-Wesley (3rd Ed),
2001, ISBN: 0201619180

Garfinkel, A., Spafford, G, Schwartz, A Practical UNIX & Internet Security, OReilly &
Associates, 2003, ISBN: 0596003234

Robson W., Strategic Management & Information Systems, Pitman (2nd Ed),1997, ISBN:
0273615912
Stallings W. & Van Slyke R., Business Data Communications, Prentice Hall (5th Ed), 2004,
ISBN: 0131276336

58

Other Reading Secure Computing, ISSN: 13524097. Available on-line at


www.scmagazine.com
Internet Application Development
Examination weighting: 40%
Continuous assessment weighting: 60%
Learning outcomes:

Demonstrate a clear understanding of the architecture and protocols of the Internet and
World-Wide-Web.

Develop a three tier web application incorporating a variety of technologies.

Select a technology, approach or language depending on the requirements for a specific


project.

Administer a web server beyond the basic requirements.

Create web services and discuss the role of these technologies in the current and future
web.

Demonstrate a sound understanding of the role of security on the modern web.

Describe, analyse and evaluate emerging standards and technologies for the web,
including Semantic Web technologies.

Present an informed view of the current state of the World-Wide-Web and its future
evolution.

Prerequisite modules:

Programming and Algorithms 1

Programming and Algorithms 2

Equipment / Software Required: Windows - IIS, Linux, Appache, Flash, Dreamweaver

59

Detailed Syllabus

Internet and web protocols

Client server architecture

Server side scripting with database connectivity

OWASP

Security and encryption

Performance and reliability

Internationalization and accessibility

Web application infrastructure

Advanced architectural style (Grid computing, Service oriented architecture, Peer-topeer computing)

The mobile web

WEEK

Lecture Topics

1.

Internet and web protocols

2.

Client server architecture +


Labs

3.

Server side scripting with


database connectivity + Lab

4.

OWASP

5.

Security and encryption

6.

Performance and reliability +


Test

7.

Internationalization and
accessibility

8.

Web application infrastructure

9.

Practical Test

10.

Seminar

Advanced architectural style


(Grid computing, Service
oriented architecture, Peer-topeer computing)

12.

The mobile web

13.

Delivery by an industry person

14.

Practical test

15.

Revision

11.

Lecturer
Initials

L,P,T

Primary Texts:
Web-Based Application Development (Paperback) by Ralph F. Grove
Other Texts:
Bates, C., Web Programming: Building Internet Applications, John Wiley and Sons (3rd Ed),
2006, ISBN: 0470017759
Berners-Lee, T. et al, Weaving the Web, HarperBusiness, 2000, ISBN: 006251587X
Hofstetter, F.T., Internet Literacy, McGraw Hill (3rd Ed), 2002, ISBN: 0071124241
McGloughlin, S., Multimedia: Concepts and Practice, Prentice Hall, 2001, ISBN: 0130575062

60

Niederst, J., Web Design in a Nutshell, OReilly (2nd Ed), 2001, ISBN: 0596001967
Other Readings: World Wide Web Consortium (W3C) http://www.w3.org
Professional and Legal Issues
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

Explain the structure and role of Professional Institutions and codes of conduct and
practice appropriate to IS professionals.

Compare and contrast the nature and legal standing of a range of organisations.

Discuss the range of functions that exist in an organisation, the need for organisational
structure and the characteristics of various types of structure.

Explain the role, structure and operation of a Court System.

Discuss the principal legislation that applies to the systems profession and recognise
situations to which it is relevant.

Explain interdisciplinary issues that impact the IS professionals domain.

Prerequisite modules: None


Equipment / Software Required: None
Detailed Syllabus

PROFESSIONAL INSTITUTIONS

The role of professional institutions and their characteristics: self-governing, controlling entry to
the profession and maintaining discipline; reservation of title and reservation of function. Some
familiarity with the best-known professional institutions - e.g. those governing the law, medicine
and accounting.

ORGANISATIONS AND THEIR STRUCTURE

Limited companies and the roles of directors and members; the advantages of limited company
status for commercial organisations. Other legal forms of organisation.
The concept of delegation and specialisation. Management structures: structure by function, by
product, by market sector, and by region.

FINANCE

The financial structure of companies. The requirements for financial disclosure imposed by
statute and by stock exchanges. Capital items and depreciation.

61

MANAGEMENT ACCOUNTING

Costing: direct and in direct costs; fixed and variable costs; overheads, corporate and
divisional. The effect of cost and other factors on the pricing of software.
Cash flow and its importance; cash flow forecasts, the need for working capital.

LEGAL OBLIGATIONS

The Data Protection Acts 1984 and 1998,the Computer Misuse Act 1990,the Public Interest
Disclosure Act 1998, the Freedom of Information Act2000. Relevant provisions of the
Consumer Protection Act1987,the Health and Safety at Work Act 1974, the Disability
Discrimination Act1995,and the Regulation of Investigatory PowersAct2000,the Special
Education Needs and Disability Act 2001, the Consumer Protection Distance Selling
Regulations 2000,and the Police and Criminal Justice Act2006

PROFESSIONAL CODES OF CONDUCT AND THEIR LIMITATIONS

Professional Codes of Conduct, their strengths and weaknesses. The BCS Code of
Conduct and its application in practice.
WEEK

Lecture Topics

1.

PROFESSIONAL INSTITUTIONS

2.
3.

ORGANISATIONS AND THEIR


STRUCTURE

4.
5.

Quiz

6.

Test

7.

FINANCE

8.

MANAGEMENT ACCOUNTING

9.
10.

LEGAL OBLIGATIONS

11.

62

12.

PROFESSIONAL CODES OF
CONDUCT AND THEIR LIMITATIONS

13.

Test

Lecturer
Initials

L,P,T

14.

Revision

15.

Revision

Primary Texts:
Professional Issues in Information Technology [Paperback] by Frank Bott
IT Management
Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

Understand the nature of MIS, and the application of telecommunication, office


automation, decision support and executive information systems

Be able to apply MIS knowledge for the selection and design of systems appropriate to
a management requirement

Be aware of how MIS may make a contribution to the strategic management of an


organisation both now and in the future

Have an understanding of the specification and management of IT services and IT


infrastructure

Understand the Administration, Business and Consumer perspectives of E-Commerce

Understand conceptual strategic business modelling

Understand business continuity management

Prerequisite modules: None


Equipment / Software Required: None
Detailed Syllabus

MANAGEMENT WITHIN ORGANISATIONS

1. Management activities, roles and levels.


2. Strategic Planning within an organisation: activities, techniques and results.
3. The nature of decision-making: decision-making models and classification of decisionmaking situations.

4. The nature of information: classifications and characteristics. The nature of information


and decision making at different management levels, and the MIS subtypes typically
implemented at each level of management to support these information/decision-making
requirements.

63

MIS APPLICATIONS AND RELATIONSHIPS


The definition, role and capabilities of the various MIS applications that may be found within
organisations:
1. Management Reporting Systems (MRS)
2.
3.
4.
5.
6.

Decision Support Systems(DSS)


Group Decision Support Systems (GDSS)
Executive Information Systems (EIS) and Executive Support Systems(ESS)
Office Information Systems (OIS) including videoconferencing and e-mail
KnowledgeBasedSystemsthatsupportmanagementsuchasExpertSystems(ES)
And Neural Network(NN)systems

7. TheapplicationofOn-LineAnalyticalProcessing(OLAP)/BusinessIntelligence(BI)
Tools in supporting management decision making
8. Data warehouses and data mining facilities: the relationship between data warehousing
and other MIS facilities.
9.
The relationships of MIS to other enterprise applications, such as:
Transaction Processing Systems(TPS)
Enterprise Resource Planning(ERP)systems
10. The Internet and MIS provisions :Internet and the linkages to legacy MIS, payment
applications, Internet customer interfaces, security issues.

DEVELOPMENT OF MIS

1. Techniques and methodologies for supporting MIS development:


Data warehouse development methodologies and techniques

fact finding techniques(e.g.SQIRO)

database design techniques

OO methodologies and associated techniques

2. The use of CASE tools to aid MIS development.

64

3.

The suitability of packages vs. bespoke systems

development.
4.

End-user development of MIS and its implications.

5.

Outsourcing vs. in sourcing of MIS development and/or operational

activities. Application Service Providers for MIS solutions.

FUTURE TRENDS

1.
Trends in hardware, software, Internet and communications capabilities and their
implication for MIS.
2.
Trends in management and organisations, for example the possible movement towards
flexible, virtual organisations and the role of MIS may have in this scenario.
3. MIS and mobile computing.

WEEK

Lecture Topics

1.

Management within Organisations

2.
3.

MIS Applications and Relationships

4.
5.
6.
7.

Test
Development of MIS

8.
9.

65

10.

Quiz

11.

Business Continuity Management

12.

Future Trends

13.

Test

14.

Revision

Lecturer
Initials

L,P,T

15.

Revision

Primary Texts:
IT Systems Management (2nd Edition) (Hardcover) by Rich Schiesser

Software Engineering
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Use appropriate techniques to gather the requirements and produce a requirements


specification for an application.

Use appropriate methods and techniques to create a requirements specification and


object oriented and analysis and design models.

Evaluate and use the various tools available to the support the modelling and code
generation process.

Identify appropriate software architectures, patterns, components and frameworks in the


design of a system.

Identify an appropriate test process and design test cases.

Prerequisite modules:

Object Oriented Programming

Equipment / Software Required: Java, J2ME, JSP, C++, ASP.NET, HTML2


Detailed Syllabus
Introduction
1.1 Professional software development
1.2 Software engineering ethics
1.3 Case studies
Software processes
2.1 Software process models
2.2 Process activities
2.3 Coping with change
2.4 The Rational Unified Process
Agile software development
3.1 Agile methods
3.2 Plan-driven and agile development
3.3 Extreme programming
3.4 Agile project management
3.5 Scaling agile methods
Requirements engineering
4.1 Functional and non-functional requirements
4.2 The software requirements document

66

4.3 Requirements specification


4.4 Requirements engineering processes
4.5 Requirements elicitation and analysis
4.6 Requirements validation
4.7 Requirements management
System modeling
5.1 Context models
5.2 Interaction models
5.3 Structural models
5.4 Behavioral models
5.5 Model-driven engineering

Architectural design
6.1 Architectural design decisions
6.2 Architectural views
6.3 Architectural patterns
6.4 Application architectures
Design and Implementation
7.1 Object-oriented design using the UML
7.2 Design patterns
7.3 Implementation issues
7.4 Open source development
Software testing
8.1 Development testing
8.2 Test-driven development
8.3 Release testing
8.4 User testing
Software Evolution
9.1 Evolution processes
9.2 Program evolution dynamics
9.3 Software maintenance
9.4 Legacy system management
Part 2 Dependability and Security
Socio-technical Systems
10.1 Complex systems
10.2 Systems engineering
10.3 System procurement
10.4 System development

67

10.5 System operation


Dependability and Security
11.1 Dependability properties
11.2 Availability and reliability
11.3 Safety
11.4 Security

Dependability and Security Specification


12.1 Risk-driven requirements specification
12.2 Safety specification
12.3 Reliability specification
12.4 Security specification
12.5 Formal specification
Dependability Engineering
13.1 Redundancy and diversity
13.2 Dependable processes
13.3 Dependable systems architectures
13.4 Dependable programming
Security Engineering
14.1 Security risk management
14.2 Design for security
14.3 System survivability
Dependability and Security Assurance
15.1 Static analysis
15.2 Reliability testing
15.3 Security testing
15.4 Process assurance
15.5 Safety and dependability cases
Part 3 Advanced Software Engineering
Software Reuse
16.1 The reuse landscape
16.2 Application frameworks
16.3 Software product lines
16.4 COTS product reuse
Component-based Software Engineering
17.1 Components and component models
17.2 CBSE processes
17.3 Component composition

68

Distributed Software Engineering


18.1 Distributed systems issues
18.2 Clientserver computing
18.3 Architectural patterns for distributed systems
18.4 Software as a service
Service-oriented Architecture
19.1 Services as reusable components
19.2 Service engineering
19.3 Software development with services
Embedded Systems
20.1 Embedded systems design
20.2 Architectural patterns
20.3 Timing analysis
20.4 Real-time operating systems
Aspect-oriented software engineering
21.1 The separation of concerns
21.2 Aspects, join points and point cuts
21.3 Software engineering with aspects
Part 4 Software management
Project management
22.1 Risk management
22.2 Managing people
22.3 Teamwork
Project planning
23.1 Software pricing
23.2 Plan-driven development
23.3 Project scheduling
23.4 Agile planning
23.5 Estimation techniques

Quality management
24.1 Software quality
24.2 Software standards
24.3 Reviews and inspections
24.4 Software measurement and metrics
Configuration management
25.1 Change management

69

25.2 Version management


25.3 System building
25.4 Release management
Process improvement
26.1 The process improvement process
26.2 Process measurement
26.3 Process analysis
26.4 Process change
26.5 The CMMI process improvement framework

[Ian Somerville, Software Engineering, Edition 9, Addison Wesley, 2010. ]

WEEK

Lecture Topics
Introduction

1.

Software processes

Agile software development


2.

Requirements engineering

3.

Software Evolution/Group work


Socio-technical Systems

4.

Dependability and Security

Dependability Engineering
5.

Security Engineering
Dependability and Security Assurance
Software Reuse

70

6.

Component-based Software
Engineering/ seminar

7.

Test

Lecturer
Initials

L,P,T

Distributed Software Engineering


8.
Service-oriented Architecture
Embedded Systems
9.
Aspect-oriented software engineering
Project management
10.
Project planning
11.

Mini Project
Quality management

12.

Configuration management

13.

Process improvement

14.

Revision

15.

Revision

Primary Texts
Ian Sommerville, Software Engineering, Edition 9, Addison Wesley, 2010.
Roger S. Pressman, Software Engineering: A Practitioners Approach, McGraw-Hill, 2009.
Other texts
Fred Brooks, The Mythical Man Month, Addison-Wesley, ISBN 0201835959, 1995.
Endres A and Rombach D, A Handbook of Software and System Engineering, Pearson
(Addison-Wesley), ISBN: 0321154207, 2003.
Norman Fenton and Shari Pfleeger, Software metrics (2nd ed.): a rigorous and practical
approach, ISBN:0-534-95600-9, PWS Publishing, 1997.
Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides, Design Patterns: Elements of
Reusable Object-Oriented Software, ISBN 0-201-63361-2.
Joshua Kerievsky, Refactoring to Patterns, Addison Wesley, 2004.
Rini Van Solingen and Egon Berghout, The Goal/Question/Metric Method, McGraw-Hill, ISBN
007-709553-7, 1999.
Jeffrey S. Poulin, Measuring Software Reuse: Principles, Practices, and Economic Models,
Addison-Wesley, ISBN 0-201-63413-9, Reading, MA, 1997.
Watts Humphrey, Managing the Software Process, Addison-Wesley, 1989.
Watts Humphrey, A discipline for Software Engineering, Addison-Wesley, 1995.
Diomidis Spinellis, Code Quality: the Open Source Perpective, Addison-Wesley, 2006.

71

Kent Beck, Extreme Programming Explained: Embrace Change, Addison-Wesley, 2001.


Alistair Cockburn, Agile Software Development, Addison-Wesley, 2002.
Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, Addison-Wesley,
1998.
Hull M. E. C., Jackson K., Dick A. J. J., Requirements Engineering, 3rd edition, Springer, ISBN
978-1-84996-404-3, 2011.
James Rumbaugh, Ivar Jacobson, Grady Booch, The Unified Modeling Language Reference
Manual, Addison-Wesley, 1999.
Mens, Tom; Demeyer, Serge (Eds.), Software Evolution, Springer-Verlag, ISBN: 978-354076439-7,2008.

Advanced Database Systems


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Demonstrate an understanding of advanced implementation concepts for the relational


database model and analyse the implications of those concepts.

Discuss the limitations of the relational database model.

Discuss and analyse the characteristics of the object-oriented and object-relational


database models.

Compare the various architectures for distributed databases and analyse the issues
involved in distributed database design.

Compare, contrast and analyse the various emerging technologies for database
systems.

Analyse strengths and weaknesses of the applications of database technologies to


various subject areas.

Employ conceptual data modelling techniques for object-oriented and object-relational


database design.

Implement an object-oriented or object-relational design using appropriate tools and


techniques.

Prerequisite modules:

Database Systems

Equipment / Software Required: MSSQL, ORACLE, MySQL


Detailed Syllabus

72

Discuss and analyse the characteristics of the object-oriented and object-relational


database models.

Discuss the limitations of the relational database model.

Demonstrate an understanding of advanced implementation concepts for the relational


database model and analyse the implications of those concepts.

Compare, contrast and analyse the various emerging technologies for database
systems.

Analyse strengths and weaknesses of the applications of database technologies to


various subject areas

Employ conceptual data modelling techniques for object-oriented and object relational
database design

Implement an object-oriented or object-relational design using appropriate tools and


techniques

Compare the various architectures for distributed databases and analyse the issues
involved in distributed database design

WEEK

Lecture Topics

1.

Discuss and analyse the


characteristics of the object-oriented
and object-relational database models.

2.

3.

4.

73

Discuss the limitations of the relational


database model.

Demonstrate an understanding of
advanced implementation concepts for
the relational database model and
analyse the implications of those
concepts.

5.

Lab/Practicals

6.

Compare, contrast and analyse the


various emerging technologies for
database systems/ Practicals/Labs

7.

Test

Lecturer
Initials

L,P,T

8.

Analyse strengths and weaknesses of


the applications of database
technologies to various subject areas

9.

Practical/Lab

10.

Employ conceptual data modelling


techniques for object-oriented and
object relational database design

11.

Practical Test

12.

Implement an object-oriented or
object-relational design using
appropriate tools and techniques

13.

Tutorial/Test

14.

15.

Compare the various architectures for


distributed databases and analyse the
issues involved in distributed database
design

Revision

Primary Texts :
Advanced Database Systems (The Morgan Kaufman (Hardcover) by Carlo Zaniolo, Stefano
Ceri

Security and Cryptography


Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

74

Describe the underlying principles of different cryptography and Steganography


algorithms

Evaluate the effectiveness of cryptography algorithms according to well known security


requirements

Recognise and justify the different scenarios of deploying cryptography and


Steganography algorithms

Define and describe network security

Discuss and relate the fundamental concepts of Security

Classify and analyse the nature and threat from viruses, worms, spyware

Design and develop best practice techniques of security

Formulate security policy of an organisation

Critically analyze different aspects of security such as policies and auditing process

Assess security compliance of an organisation

Compare and contrast international and regional security standards

Prerequisite modules: None


Equipment / Software Required: None
Detailed Syllabus

The context of cryptography


1. The Role of Cryptography.
2.

The Weakest Link Property.

3.

The Adversarial Setting.

4.

Professional Paranoia.

5. Threat Model.
6. Cryptography Is Not the Solution.
7.

Cryptography is very difficult.

8. Cryptography is the Easy Part.


9.

Generic Attacks.

10. Security and Other Design Criteria.

Introduction to cryptography
1. Encryption. Authentication.
2. Public Key Encryption.

75

3.

Digital Signatures.

4.

PKI.

5.

Attacks.

6.

Under the Hood.

7.

Security Level.

8.

Performance.

9. Complexity.

Block ciphers modes


1. Padding.
2.

ECB.

3.

CBC.

4. OFB.
5. CTR.
6. Combined Encryption and Authentication.
7.

Which Mode Should I Chose?

8. Information Leakage.

Hash functions
9. Security of Hash Functions.
10. Real Hash Functions.
11. Weakness of Hash Functions.
12. Fixing the Weakness.
13. Which Hash Function should I choose?

Message authentication codes


1. What does a MAC.?
2.

The ideal MAC and MAC Security.

3.

CBC-MAC and CMAC.

4. HMAC.
5.

GMAC.

6. Which MAC to Choose.


7. Using a MAC.

The secure channel


1. Properties of a Secure Channel.
2. Order of Authentication and Encryption.
3. Designing a Secure Channel.
4. Design Details.

76

5. Alternatives.

Implementation issues (i)


1. Creating Correct Programs.
2. Creating Secure Software.
3. Keeping Secrets.
4. Quality of Code.
5. Side Channel Attacks.

Generating randomness
1.
2.
3.
4.
5.
6.
7.

Real Random.
Attack Models for PRNG.
Fortuna.
The Generator.
Accumulator.
Seed File Management.
Choosing Random Elements.

Primes
1. Divisibility and Primes.
2. Generating Small Primes.
3. Computation Modulo a Prime.
4. Large Primes.

Diffie-hellman
1.
2.
3.
4.
5.
6.
7.

Groups. Basic DH.


Man in the Middle.
Pitfalls. Safe Primes.
Using Smaller Subgroups.
The Size of p.
Practical Rules.
What Can go Wrong.

RSA
1. Introduction.
2. The Chinese Remainder Theorem.
3. Multiplication Modulo n. RSA Defined.
4. Pitfalls using RSA.
5. Encryption.
6. Signatures.

Introduction to cryptographic protocols


1. Roles.
2. Trust.

77

3. Incentive.
4. Trust in Cryptographic Protocols.
5. Messages and Steps.

Key Negotiation
1. The Setting.
2. A First Try.
3. Protocols Live Forever.
4. Au Authentication Convention.
5. A Second Attempt.
6. A Third Attempt.
7. The Final Protocol.
8. Different Views of the Protocol.
9. Computational Complexity of the Protocol.
10. Protocol Complexity.
11. A Gentle Warning.
12. Key Negotiation from a Password.

Implementation Issues (II)


1. Larger Integer Arithmetic.
2. Falser Multiplication.
3. Side Channel Attacks. Protocols.

The Clock
1.
2.
3.
4.
5.
6.
7.

Uses for a Clock.


Using the Real Time Clock Chip.
Security Dangers.
Creating a Reliable Clock.
The Same-State Problem.
Time.
Closing Recommendations.

Key Servers
1. Basic.
2. Kerberos.
3. Simpler Solutions.
4. What to Chose.

The Dream of PKI


1. A Very Short PKI Overview.
2. PKI Examples.
3. Additional Details.
4. Summary.

78

PKI Reality

1. Names.
2. Authority.
3. Trust.
4. Indirect Authorisation.
5. Direct Authorisation.
6. Credential Systems.
7. The Modified Dream.
8. Revocation.
9. So What is PKI good for.
10. What to Choose.

PKI Practicalities
1. Certificate Format.
2. The Key of a Life.
3. Why keys Wear Out.
4. Going Further.

Storing Secrets
1. Disks.
2. Human memory.
3. Portable Storage.
4. Secure Token.
5. Secure UI.
6. Biometrics.
7. Single Sign-On.
8. Risk of Loss.
9. Secret Sharing.
10. Wiping Secrets.

Standards and Patents


1. Standards.
2. Patents.

79

WEEK

Lecture Topics

1.

Introduction to cryptography & The


context of cryptography: Threat Model,
Generic Attacks, Security and Other
Design Criteria

2.

Encryption techniques: Public Key


Encryption, Digital Signatures, PKI.

Lecturer
Initials

L,P,T

Block ciphers modes: ECB, CBC,


OFB, CTR
3.

4.

- Information Leakage and Hash


functions
Message authentication codes and the
secure channel. Implementation issues
Generating randomness and Primes

5.
Computation Modulo a Prime.
6.

Test

7.

Diffie-hellman and RSA

8.

Introduction to cryptographic protocols


and Key Negotiation

9.

Key Servers

10.

PKI issues

11.

Storing secrets

12.

Standards and Patents

13.

Case study

14.

Test

15.

Revision

Primary Text:
Cryptography Engineering: Design Principles a (Paperback) by Niels Ferguson, Bruce
Schneier

Information Systems Engineering


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

80

Identify and critically evaluate the various software process models and development
methodologies

Compare and contrast different approaches to systems development

Demonstrate a practical knowledge of the various techniques of the development of a


software system through a development lifecycle

Demonstrate a practical knowledge of requirements engineering and architectural


design

Evaluate and develop appropriate verification, validation and testing strategies

Evaluate the challenges and approaches to user interface design

Demonstrate a comprehensive knowledge of support activities such as project


management, validation and verification, configuration management, quality assurance

Prerequisite modules:

Software Engineering

Equipment / Software Required: Java, J2ME, JSP, C++, ASP.NET, HTML2


Detailed Syllabus

The information systems strategy triangle

1. Brief overview of Business Strategy Frameworks.


2. Brief overview of Organizational Strategies.
3. Brief overview of Information System Strategy.

Strategic use of information resources

1. Evolution of Information Resources.


2. Information Resources as strategic tools.
3. How information resources can be used strategically?

Organisation impact of information systems use

1. Information Technology and Organisation Design.


2. Information Technology and Management Control System.
3. Information Technology and Culture.

Information technology and the design of work

1. Work Design Framework.


2. How information technology supports communication and collaboration.
3. How information technology changes the nature of work.
4. How information technology changes where work is done and who does it.
5. Virtual teams.
6. Gaining acceptance for IT-Induced change.

81

Information technology and changing business processes

1. Silo perspective versus business process perspective.


2. The tools for change. Shared Services. Enterprise systems.
3. Integrated supply chains.

architecture and infrastructure

1. From vision to implementation.


2. The leap from strategy from Architecture to Infrastructure.
3. Architectural Principles.
4. Enterprise Architecture.
5. Other Managerial Considerations.
6. From strategy to architecture to infrastructure.

information system sourcing

1. Sourcing decision cycle framework.


2. In sourcing.
3. Outsourcing.
4. Outsourcing Abroad.
5. Back sourcing.
6. Outsourcing models.

Governance of the information systems organisation

1. Understanding the IS organisation.


2. What a manager can expects from the IS organisation.
3. What the IS organisation does not do.
4. IT Governance.

82

Use information ethically

1. Normative Theories of Business Ethics.


2. Control of Information.
3. Security and Controls.
4. IT Governance and Security.
5. Sarbanes-Oxley Act of 2002.

Funding IT

1. Funding IT Resources.
2. How much does IT costs.
3. Building a business case.
4. IT Portfolio Management.
5. Valuing IT Investments.
6. Monitoring IT Investments.
7. Option Pricing.

Project management

1. What defines a project?


2. What is a project management?
3. Project Elements.
4. IT Projects.
5. IT Project Development Methodologies.
6. Managerial influences.
7. Managing Project Risks.
8. The PMO.

Managing business knowledge

1. Knowledge Management.
2. Data, Information and Management.
3. From Managing Knowledge to Business Intelligence.
4. Why manage knowledge.

83

5. Knowledge Management Processes.


6. Competing with Business Analytics.
7. Component of Business Analytics.
8. Caveats for managing knowledge.
WEEK

Lecture Topics

1.

The information systems strategy


triangle: Overview of Business
Strategy Frameworks, Organizational
Strategies and Information System
Strategy.

2.

Strategic use of information resources

3.

Organisation impact of information


systems use

4.

Information technology and the design


of work

5.

Information technology and changing


business processes

6.

Test

7.

Architecture and infrastructure,


information system sourcing

8.

Governance of the information


systems organisation

9.

Use information ethically

10.

Funding IT

11.

Project management

12.

Managing business knowledge

13.

Quiz

14.

Test

15.

Revision

Lecturer
Initials

L,P,T

Primary Text:
Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability
and Statistics) [Paperback] by Keri E. Pearlson (Author), Carol S. Saunders (Author)

84

Geographic Information Systems


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Understand the role of GIS and its application in solving practical problems.

Understand how geographic data is represented in a computer.

Understand the unique character of geographic data and how this is mapped to the real
world.

Be able to confidently use the GIS packages.

Understand the rudiments of spatial databases and when and where to use database
technology.

Understand how GI data is created and acquired and be aware of possible sources of
data.

Understand the art and science of cartography and map design.

Solve problems in spatial analysis especially in the areas of visualization,


query/measurement and design/modelling.

Prerequisite modules: None


Equipment / Software Required: ade4 - http://cran.r-project.org/web/packages/ade4/index.html ,
GRASS GIS - http://grass.fbk.eu/
Detailed Syllabus

System, science and study


Gallery of application
Representing Geography
Nature of Geographic Data
Group discussion/seminar
Georeferencing
Uncertainty
GIS software/ Lab/practicals
Geographic Data modeling
TEST
Creating and maintaining Geographic databases
Case study
GEO web
Geovisualization

85

WEEK

Lecture Topics

1.

System, science and study

2.

Gallery of application

3.

Representing Geography

4.

Nature of Geographic Data

5.

Group discussion/seminar

6.

Uncertainty

8.

GIS software/ Lab/practicals

Geographic Data modeling

10.

TEST

11.

Creating and maintaining Geographic


databases

12.

Case study

13.

GEO web

14.
15.

L,P,T

Georeferencing

7.

9.

Lecturer
Initials

Geovisualization
Revision

Primary Text:
Geographic Information Systems and Science (Paperback) by Paul A. Longley, Mike Goodchild

86

Information Risk Management


Examination weighting: 70%
Continuous assessment weighting: 30%
Learning outcomes:

Define and understand wow the management of information risk will bring about
significant business benefits

Explain and make full use of information risk management terminology

Ability to conduct threat and vulnerability assessments, business impact analyses and
risk assessments

Define the principles of controls and risk treatment

Understand how to present the results in a format which will form the basis of a risk
treatment plan

Presenting and defining the use of information classification schemes

Prerequisite modules: None


Equipment / Software Required: None
Detailed Syllabus

WEEK

87

The security evolution


Risky business
Risk Management Cycle
Risk assessment and analysis techniques
Formulating a risk
Risk exposure factor
Security control and services
Risk evaluation and mitigation strategies
Report and consulting
Risk assessment techniques
Threat and vulnerability management
Security risk and reviews
A blue print for security
Building a risk program from scratch

Lecture Topics

Lecturer
Initials

L,P,T

The security evolution


1.
Risky business

Risk Management Cycle


2.

3.

Risk assessment and analysis


techniques

Formulating a risk
4.
Risk exposure factor
5.
6.

Test/Quiz
Security control and services

7.

Risk evaluation and mitigation


strategies

Report and consulting


8.
Risk assessment techniques
9.
Threat and vulnerability management
10.
11.

Seminar/mini project
Security risk and reviews

12.

88

13.

A blue print for security

14.

Building a risk program from scratch

15.

Revision.

Primary Text:

Security Risk Management: Building an Informa (Paperback) by Evan Wheeler

Information Security Services


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Define and describe the underlying principles of ethical hacking

Evaluate the effectiveness of ethical hacking techniques according to well they expose
system vulnerability

Recognise and justify the different scenarios of legally using ethical hacking in practice

Apply ethical hacking techniques in a simulated environment

Identify and examine different system vulnerabilities and their effect

Prerequisite modules: None


Equipment / Software Required: Backtrack, SNORT etc.,
Detailed Syllabus

Access Control Systems Methodology


Business Continuity Planning
Operational & Physical Security
Telecommunications, Networks & Internet Security
Ethical Hacking
Emergency Response Service (Incident Response & Management)
Threat analysis and management

Cyber threats, Malware infections, Phishing attacks, Web Application Attacks

WEEK

Lecture Topics

1.

Access Control Systems Methodology

2.
3.

Business Continuity Planning

4.
5.

Operational & Physical Security

6.

Group discussion/seminar

7.

Telecommunications, Networks &


Internet Security

8.

89

Lecturer
Initials

L,P,T

9.

Test

10.

Ethical Hacking

11.

12.

13.

Emergency Response Service


(Incident Response & Management)

Threat analysis and management

14.

Mini Project

15.

Revision

Primary Text:
Management of Information Security (Paperback) by Michael E. Whitman, Herbert J. Mattord

Distributed Systems and Systems Integration


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Discuss authoritatively the fundamental characteristics of distributed systems

Develop distributed applications using one or more middleware technologies

Evaluate middleware technologies and integration strategy and select an appropriate


technology for a given application, providing analyses and justifications

Demonstrate an excellent understanding of issues such as security, authentication,


coordination and timing

Configure various systems for integration with other computer systems

Prerequisite modules:

Object Oriented Programming

Advanced Computer Networking

Equipment / Software Required: JAVA, DREMWEAVER, APACHE, LINUX, WINDOWS


Detailed Syllabus
1.
2.
3.
4.
5.
6.

90

Characterization of distributed systems


System model
Networking and internetworking
Interprocess communication
Distributed objects and remote invocation
Operating system support

7. Security
8. Distributed files systems
9. Name services
10. Peer to peer system
11. Time and global state
12. Coordination and agreement
13. Transaction and concurrency control
14. Distributed Transactions
15. Replication
16. Mobile and ubiquitous computing
17. Distributed multimedia systems
18. Distributed shared memory
19. Web services
Distributed Systems: Concepts and Design (5th (Hardcover) by George Coulouris, Jean
Dollimore

91

WEEK

Lecture Topics

1.

Characterization of distributed systems


& System model

2.

Networking and internetworking and


Interprocess communication

3.

Distributed objects and remote


invocation and Operating system
support.

4.

Security

5.

Distributed files systems

6.

Test

7.

Name services and Peer to peer


system

8.

Time and global state; Coordination


and agreement

9.

Transaction and concurrency control

10.

Distributed Transactions and


replication

11.

Mobile and ubiquitous computing

12.

Distributed multimedia systems and


Distributed shared memory

Lecturer
Initials

L,P,T

13.

Web services

14.

Test

15.

Revision

Primary Text:

Technology Integration Advancements in Distributed Systems and Computing [Hardcover]


Nik Bessis (Author, Editor)

Artificial Intelligence
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

Understand what machine learning is

Implement learning algorithms to induce classification models, such as: decision trees,
naieve bayes clasifiers, regression models, and nearest neighbor models

Evaluate and report the accuracy of a model correctly

Compare the advantages and disadvantages of different models for different application
scenarios

Prerequisite modules: none


Equipment / Software Required: JAVA, C++, LISP, PROLOG
Detailed Syllabus

92

Introduction
Intelligent agents
Solving problems by searching
Adversarial search
Constraints satisfaction problems

Quantifying uncertainty

Probabilistic reasoning
Knowledge in learning
Learning probabilistic models
Reinforcement learning

Natural language processing

Natural language for communication.

Robotics
Philosophical foundations

The present and the future

WEEK

Lecture Topics
Introduction

1.
Intelligent agents
Solving problems by searching
2.
Adversarial search
Constraints satisfaction problems
3.
Quantifying uncertainty
4.

Quiz/Group discussion/test
Probabilistic reasoning

5.
Probabilistic reasoning over time
Knowledge in learning
6.
Learning probabilistic models
Reinforcement learning
7.
Natural language processing
8.

Test/Assignment/seminar

9.

Natural language for communication.

10.

Robotics

11.

Intensive recap
Philosophical foundations

12.
The present and the future
13.

93

Lecturer
Initials

L,P,T

14.

Seminar

15.

Revision

Primary Text:
Artificial Intelligence: A Modern Approach, 3 (Kindle Edition) by Stuart Russell, Peter Norvig

Spatial Databases
Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

use a database to store and query spatial data

develop applications that use a spatially enabled DBMS, e.g. spatial data mining,
navigation.

distinguish and use appropriate database models

apply the various query languages appropriate to spatial querying to given situations

understand the extensions required by application programs to handle spatial data

Prerequisite modules:

Advanced Database Systems

Equipment / Software Required: ORACLE, MyQSL


Detailed Syllabus
1. The current Status of Spatial Information Technology.
2. Concepts and Architectures of Database Systems.
3. Database Models and Data Modeling.
4. Spatial Data and Spatial Database Systems.
5. Spatial Data Standards and Metadata.
6. Spatial Data Sharing, Data Warehousing and Database Federation.
7. User Education and Legal Issues of Spatial Database System.
8. User Needs Assessment and Multiuser Spatial Solutions.
9. Project Management for Spatial Database Implementation.
10. Web enabled spatial database system.
11. Spatial data mining and Decision support systems.
12. Trends of Spatial Database System

94

WEEK

Lecturer
Initials

Lecture Topics
The current Status of Spatial
Information Technology

1.
Concepts and Architectures of
Database Systems

2.

Database Models and Data


Modeling.

3.

Spatial Data and Spatial Database


Systems

4.

Spatial Data Standards and


Metadata

5.

Labs/Practicals

6.

Spatial Data Sharing, Data


Warehousing and Database
Federation

7.

Test+ Practicals

8.

User Education and Legal Issues of


Spatial Database System

9.
10.

User Needs Assessment and


Multiuser Spatial Solutions

11.

Project Management for Spatial


Database Implementation

12.

Web enabled spatial database


system

13.

Spatial data mining and Decision


support systems

14.

Spatial data mining and Decision


support systems

15.

Primary Text:

95

Revision

L,P,T

Spatial Database Systems: Design, Implementat (Paperback) by Albert K.W. Yeung, G. Brent
Hall

Research Methodology and Report Preparation


Examination weighting: 0%
Continuous assessment weighting: 100%
Learning outcomes:

Research and report IS topics

Prepare a systems project proposal

Structure a product and user manual

Prepare a professional presentation

Use modern tools and techniques appropriate to the IS researcher

Prerequisite modules: None


Equipment / Software Required: SPSS
Course Contents:
Introduction
Nature and scope of marketing research, Marketing research as input in decision making
process, Marketing research and marketing information system. Applications of marketing
research, Planning a research project, Problem identification and formulation of Research
Design, introduction to Research Design, Market research on the Internet.
Data collection methods
Attitudes measurement and scaling techniques, Ratio, Interval, Ordinal and nominal scales,
Likert's scale, Thurstone scale, Semantic differentiation method. Observation methods and
questionnaire method, Questionnaire design, Steps in constructing a questionnaire, Types of
questions, introduction to Projective techniques and perceptual mapping.
Sampling
Sampling decisions, Sampling frame, Sample selection methods - Probability and non
probability, Sample size, sampling error and error in sampling. Application of sampling
methods to marketing problems.
Data Collection Field Force
Data collection field force, Fieldwork procedure, common sources of error in the fieldwork,
minimizing fieldwork errors, Tabulation of collected data.
Data Analysis
Data analysis-1, Test of significance Z, t, F and chi-square, Data analysis-II, Correlation and
regression techniques, Data analysis III Cluster Analysis, Introduction to Statistical Package
Report Writing

96

Research presentation and research process examination; Report writing - Types of research
report. Examination of the research procedure, Selected applications of marketing research,
identifying market segments, Product research, Advertising research.
Examination Scheme:
This module will be assessed based on 100% course work.
A mini project will have to be submitted by the students
Weekly plan

WEEK

Lecture Topics
Module I: Introduction

1.

2.

97

Nature and scope of marketing


research, Marketing research as input
in decision making process, Marketing
research and marketing information
system. Applications of marketing
research, Planning a research project,
Problem identification and formulation
of Research Design, introduction to
Research Design, Market research on
the Internet.

3.

Module II: Data collection methods

4.

Attitudes measurement and scaling


techniques, Ratio, Interval, Ordinal and
nominal
scales,
Likert's
scale, Thurstone scale, Semantic
differentiation method. Observation
methods and questionnaire method,
Questionnaire design, Steps in
constructing a questionnaire, Types of
questions, introduction to Projective
techniques and perceptual mapping.

5.

Module III: Sampling

6.

Sampling decisions, Sampling frame,


Sample selection methods - Probability
and non probability, Sample size,
sampling
error
and
error
in
sampling. Application of sampling
methods to marketing problems.

7.

Tutorials

8.

Module IV: Data Collection Field Force

Lecturer
Initials

L,P,T

9.
10.
11.

12.

13.

Data collection field force, Fieldwork


procedure, common sources of error in
the fieldwork, minimizing fieldwork
errors, Tabulation of collected data
Module V: Data Analysis
Data analysis-1, Test of significance Z,
t, F and chi-square, Data analysis-II,
Correlation and regression techniques,
Data analysis III Cluster Analysis,
Introduction to Statistical Package

Presentation
Seminar
Module VI: Report Writing

14.

15.

Research presentation and research


process examination; Report writing Types of research report. Examination
of the research procedure, Selected
applications of marketing research,
identifying market segments, Product
research, Advertising research.
Submission of Mini project

Text:

Luck, David J and Rubin, Ronald S., Marketing Research, Seventh edition, Prentice Hall of
India

References:
Aaker, David A; Kumar V and George S., Marketing Research, Sixth edition, John Wiley &
Sons
Boyd, Harper W, Westphall, Ralph & Stasch, Stanely F, Market Research Text &
Cases, Richard D. Irwin Inc. Homewood, Illinois.

Cloud Computing & Automating the Virtualized Data Center


Examination weighting: 60%
Continuous assessment weighting: 40%
Learning outcomes:

98

Understand Cloud Computing Concepts

Ability to implement and Design Cloud Patterns and Use Cases

Designing and Implementing a Data Center Architecture and Technologies

Prepare a Cloud Strategy

Preparing the Technical Building Blocks of IaaS

Designing and understanding Cloud Capacity Management

Adopting Cloud from a Maturity Perspective

Prerequisite modules: None


Equipment / Software Required: VMWARE, WINDOWS, LINUX, VBOX
Detailed Syllabus

CLOUD COMPUTING CONCEPTS


1. Virtualization.
2. Cloud Computing.

CLOUD DESIGN PATTERNS AND USE CASES


1. Typical Design Patterns and Use Cases.
2. Deployment Models.
3. IaaS as a Foundation.
4. Cloud Consumer Operating Model.

DATA CENTER ARCHITECTURE AND TECHNOLOGIES


1. Architecture.
2. Architectural Blocks of a Data Center.
3. Design Evolution in the Data Center.
4. Service Assurance.
5. Evolution of the Services Platform.

IT SERVICES
1. Classification of IT Services and Information.
2. Four Corner Stones of Cloud Technology.

THE CISCO CLOUD STRATEGY


1. A Brief History of IT Service Delivery.
2. The CISCO Cloud Strategy.
3. Infrastructure Evolution to Support Cloud Services.

CLOUD MANAGEMENT REFERENCE ARCHITECTURE


1. Standards.
2. TMF eTOM.
3. Information Technology Infrastructure Library.
4. ITU-T TMN.
5. Building Cloud Models Using Standards.

99

6.

Integration of Management Systems/Functions.

SERVICE FULLFILLMENT
1. Cloud Fulfillment Using ITILV3.
2. Cloud End-To-End Service Provisioning Flow.
3. Service Orchestration.
4. Cloud End-To-End Architecture Model.

SERVICE ASSURANCE
1. Cloud Assurance Flow Using the ITIL Process.
2. Cloud End-To-End Monitoring Flow.
3. Service Assurance Architecture.

BILLING AND CHARGEBACK


1.
2.
3.
4.
5.

Billing and Chargeback Terminology.


Cloud Consumers and Providers.
Cloud Services Billing Considerations.
Cloud Order-To-Cash Process Flow.
Billing and Charging Architecture.

TECHNICAL BUILDING BLOCK OF IaaS


1. IaaS Service Composition.
2. Developing and Offering Cloud Products.
3. Persisting Service Data.

AUTOMATING AND ORCHESTRATION RESOURCES

ON-BOARDING RESOURCES:
Building the Cloud.
Adding Services to the Cloud.
Creation and Placement Strategies.
Service Life Cycle Management.

CLOUD CAPACITY MANAGEMENT


1. Tetris and the Cloud.
2. Cloud Capacity Model.
3. Demand Forecasting.
4. Procurement in the Cloud.

PROVIDING THE RIGHT CLOUD USER EXPERIENCE


1. The Cloud User Interface.

100

2.
3.

Providing User Self Care.


Integration. Providing an Open API.

ADOPTING CLOUD FROM A MATURITY PERSPECTIVE


1.
2.
3.

Maturity models.
A Cloud Maturity Model.
Using the Cloud Maturity Model.

WEEK

Lecture Topics

1.

cloud computing concepts

2.

cloud design patterns and use cases

3.

data center architecture and


technologies

4.

IT services

5.

The Cisco cloud strategy + Lab

6.

Seminar

7.

cloud management reference


architecture

8.

service fulfillment
service assurance

9.
billing and chargeback
technical building block of iaas
10.

automating and orchestration


resources

11.

Lab/practicals

12.

on-boarding resources
cloud capacity management

13.

101

providing the right cloud user


experience

Lecturer
Initials

L,P,T

14.

adopting cloud from a maturity


perspective

15.

Revision

Primary Text:
Cloud Computing: Automating the Virtualized D (Paperback) by Venkata Josyula, Malcolm
Orr

102

You might also like