Upload
ogakhan-nyamu
View
161
Download
5
Tags:
Embed Size (px)
DESCRIPTION
.1 Introduction 7.2 POST 7.3 Preventive Maintenance 7.4 Preventive Maintenance of Peripherals of PC7.5 Fault Finding and Troubleshooting of above Peripherals 7.6 ESD (Electrostatic Discharge) 7.7 Diagnostic Software
Citation preview
COLLEGE OF BUSINESS EDUCATION
ICT DEPARTMENT
CURRICULUM FOR LEVEL 4-8
2011
1
BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT)
NTA LEVEL 4
2
CURRICULUM INFORMATION REPORT FOR BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT)
1.0 BACKGROUND INFORMATION 4
2.0 MODULE CODING 5
3.0 GRADING SYSTEM 6
4.0 AWARDS 6
5.0 AWARDS CLASSIFICATION 7
6.0 SUMMARY FRAMEWORK 7
7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUE AND ASSESSMENT CRITERIA 9
8.0 PROGRAM STRUCTURE 9
9.0 NACTE STANDARDS AND RELATED OUTCOMES 11
10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS 14
11.0 BENCHMARKING OF ASSESSMENT CRITERIA 22
12.0 MODULES DESCRIPTION 28
BTCIT 411 PC Fundamentals 28
BTCIT 412 Introduction to Computer Networking 29
BTCIT 413 Introduction to Communication Skills 30
BTCIT 414 Basic Mathematics 31
BTCIT 415 Office Automation 32
BTCIT 421 Introduction to Programming 34
3
BTCIT 422 Introduction to Entrepreneurship 36
BTCIT 423 Web Design Basics 37
BTCIT 424 Introduction to Computer Maintenance 38
BTCIT 425 Basic Database 39
4
1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competence modular curricula is to comply with the Nation’s Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.
Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.
The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.
The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that “given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn” CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization.
The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year.
5
The level has a minimum number of 120 credits as prescribed by NACTE
1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competence modular curricula is to comply with the Nation’s Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.
Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.
The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.
The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that “given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn” CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization.
6
The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year.
The level has a minimum number of 120 credits as prescribed by NACTE
0
2.0 MODULE CODINGThe coding of modules follows logical sequence as in the following example for BTCIT 411
BTCIT = Stands for Basic Technician Certificate in Information Technology
4 = The first digit for the NTA level, in this case Basic Certificate which is level Four.
1 = The second digit stands for semester, i.e for semester one
1 = The last digit stands for the order of the module in the semester. Module are arranged serially the highest number, depending upon the number for modules in the semester.
7
3.0 GRADING SYSTEMThe grading of assessment results in conformity with the NACTE grading system as follows.
4.0 AWARDSThe awards shall be made to students who satisfy the following conditions.
(a) Have completed modules for the award.(b) Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass.(c) GPA shall be computed from cumulative scores earned by students using NACTE guideline.
8
NTA Level 4
Grade Definition Score
A Excellence 80-100
B Good 65-79
C Average 50-64
F Failure 0-49
I Incomplete
5.0 AWARDS CLASSIFICATION:
6.0 SUMMARY FRAMEWORK
9
Awards Classification for NTA Level 4
Class of Award Cumulative GPA
First Class 3.5 to 4.0
Second 3.0 to 3.4
Pass 2.0 to 2.9
4.1 QUALIFICATION BASIC TECHNICIAN CERTIFICATE IN ICT
4.2 PURPOSE OF QUALIFICATION This qualification is intended for persons who will assist in performing routine operational activities with IT equipment and accessories: troubleshoot computer hardware and configure basis network; Install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers; under close supervision. Furthermore more they will assist IT users and solve their own day-to-day IT related challenges.
4.3 NATIONAL TECHNICAL AWARD 4
4.4 COMPETENCE LEVEL DESCRIPTOR The holder of this qualification will assist in performing routine operational activities in IT troubleshoot computer hardware and configure basic network; install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers.
4.5 MINIMUM OVERALL CREDITS 120
4.6 MINIMUM CREDIT AT THIS LEVEL 120
4.7 MINIMUM ENTRY QUALIFICATIONS Form four with at least three passes including mathematics
4.8 DATE OF DEVELOPMENT June 2011
10
7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA
S/N PRINCIPAL LEARNING OUTCOMES CREDIT VALUES ASSESSMENT CRITERIA
PLO 1 Trouble shoot computer hardware and configure basis network
24 1.1 Computer hardware is properly trouble shot, and network properly configured.
PLO 2 Install computer hardware and Software and maintain computers
12 2.1 Computer hardware and software are properly installed
2.2 Computers are properly maintained
PLO 3 Design the web and implement relational database
24 3.1 The web is correctly designed
3.2 The web is clearly coded, evaluated and maintained
3.3 Relational database is properly implemented
PLO 4 Optimise Office Procedures 12 4.1 Ms word, excel are properly entered and formatted
4.2 Ms Power Point is properly applied
PLO 5 Prepare and test simple programs 12 5.1 Simple programs are properly prepared and tested by applying basic VB concepts.
PLO 6 Communicate efficiently and effectively at place of work and apply mathematical
36 6.1 Principles of communication are properly applied
6.2 Entrepreneurship principles are properly applied
Total credit 120
8.0 PROGRAM STRUCTURE SEMESTER I
S/N CODE NAME OF MODULE CREDITS11
1. BTCIT 411 PC Fundamentals 12
2. BTCIT 412 Introduction to Computer Networking 12
3. BTCIT 413 Introduction to Communication 12
4. BTCIT 414 Basic Mathematics 12
5. BTCIT 415 Office Automation 12
TOTAL CREDITS FOR NTA LEVEL 4 SEMESTER II 60
SEMESTER II
S/N CODE NAME OF MODULE CREDITS
1. BTCIT 421 Introduction to Programming 12
2. BTCIT 422 Introduction to Entrepreneurship 12
3. BTCIT 423 Web Design Basics 12
4. BTCIT 424 Introduction to Computer Maintenance 12
5. BTCIT 425 Basic Database 12
TOTAL CREDITS FOR NTA LEVEL 4 SEMESTER II 60
12
9.0 NACTE STANDARDS AND RELATED OUTCOMESPRINCIPAL LEARNING OUTCOMES
ENABLING OUTCOMES SUB-ENABLING OUTCOMES
PLO 1 Troubleshoot computer hardware and configure basic network
1.1 Troubleshoot computer hardware 1.1.1 Detect hardware faults
1.1.2 Correct and report faults
1.2 Configure basic network 1.2.1 Track network resources
1.2.2 Add hardware to existing network
PLO 2 Install computer hardware and software, and maintain computers
2.1 Install computer hardware 2.1.1 Identify different parts of hardware
2.1.2 Describe the functions of different parts of computer software
2.1.3 Connect various parts of computer hardware.
2.2 Install computer software 2.2.1 Describe different types of software
2.2.2 Install computer software
2.3 Maintain computers 2.3.1 Make back-ups
2.3.2 Clean hardware
2.3.3 Defragment files
2.3.4 Protect surging and viruses
PLO 3 Design the web, describe database concepts and implement the relational database design.
3.1 Describe the web 3.1.1 Describe the web and related basic terms
3.1.2 Identify the characteristics and parts of the web.
13
3.2 Identify basic concept of the web 3.2.1 Identify the requirements for design and contents of the web
3.2.2 Identify the classes and types of the web
3.3 Design the web 3.3.1 Plan and design the web
3.3.2 Code the web
3.3.3 Evaluate and maintain the web
3.4 Describe database concepts, Applications, data models, schemas and instances
3.4.1 Describe basic database concepts and applications
3.4.2 Describe data models and schemas
3.5 Describe storage organizations concepts and identify database languages and interfaces.
3.5.1 Describe storage organization concepts.
3.5.2 Identify database, languages and identify interfaces.
3.6 Implement the relational database design and data 3.6.1 Implement relational database design
3.6.2 Implement data modelling using ER models
4.1.1 Describe word processing and a word processor
4.1.2 Start ms word4.1.3 Enter and format text4.2.1 Describe spread sheets4.1.2 Start ms excel4.3.3 Enter and format a spread sheet
14
4.3.4 Apply formulae and functions4.3.1 Describe power point4.3.2 Start ms power point4.3.3 Enter and format slides5.1.1 Describe the structure of VB5.1.2 Apply basic concepts of VB5.1.3 Describe the code writing structures5.2.1 Identify various variables5.2.2 Identify constants5.2.3 Identify various data types5.3.1 Apply functions5.3.2 Apply sub-functions5.4.1 Describing objects5.4.2 Work with objects5.4.3 Create objects5.4.4 Relate objects to each other6.1.1 Apply communication concepts, processes
and skills6.1.2 Take and make notes6.1.3 Make oral presentations6.1.4 Apply reading and writing skills6.2.1 Solve simple operations6.2.2 Work out ratios and conversion expressions6.2.3 Solve fractions and algebraic expressions6.2.4 Apply Business mathematics in real world6.3.1 Describe entrepreneurship6.3.2 Describe basic entrepreneurship issues
15
10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKSUB-ENABLING OUTCOME RELATED TASKS ASSESS MENT CRITERIA ASSESSMENT METHODS ASSESSMENT
INSTRUMENTS
1.1.1 Detect hardware faults Describe hardware fault List possible sources of hardware
faults Describe methods of detecting faults
Hardware faults are correctly detected
Class assignments and exercises
Questions and solutions
1.1.2 Correct and report hardware faults
List different ways of correcting faults
Describe contents of hardware fault Report hardware faults
Faults are correctly corrected and reported
Class assignments and exercises
Questions and solutions
1.2.1 Track network resources and add hardware to existing network
Describe network resources List network resources Add required hardware to the
network
Network resources are correctly described
Class assignments and exercises
Questions and solutions
2.1.1 Identify different parts of hardware
Identify different parts of hardware Describe input devices Describe the CPU Describe Output devices Describe External storage devices Describe Communication devices
Different parts of hardware are clearly identified
Class assignments and exercises
Questions and solutions
2.1.2 Describe the functions of different parts of computer hardware
List functions of Input devices List functions of the CPU List functions of External storage
devices List functions of Communication
devices
The functions of different parts of computer hardware are clearly described
Class assignments and exercises
Questions and solutions
2.1.3 Connect various parts of computer hardware
Identify various parts of hardware Connect together power supply,
CPU, screen, keyboard and mouse Test the system
Various parts computer hardware are correctly connected
Class assignments and exercises.
Questions and solutions
16
2.2.1 Describe different type of software
Describe software Describe system software Describe application software Identify major classes of application
software Explain advantages and
disadvantages of the two types of application software.
Different types of software are clearly described
Class assignments and exercises
Questions and solutions
2.2.2 Install computer software
Explain the preconditions of installing software
Installs software Customize software installation
package Configure software restrictions Enforce properties
Computer software is properly installed
Class assignments and exercises
Questions and solutions
2.3.1 Make back-ups Identify reasons for making back-ups Identify what is to be backed up Explain storage media to be applied Describe back methods (Manual
versus Automatic)
Back-up are properly made Class assignments and exercises
Questions and solutions
2.3.2 Clean hardware Identify various hardware that need cleaning
Identify tools needed for hardware cleaning
Clean mouse Clean keyboard Clean Screen
Hardware are properly cleaned
Class assignments and exercises
Questions and solutions
2.3.3 Defragment files Describe Fragment and Defragmentation
Identify types of causes of fragmentation
Preventing and eliminating fragmentation
Files are correctly defragmented
Class assignments and exercises
Questions and solutions
17
2.3.4
Protect surging and viruses
Describe surging Protect surging Describe viruses Protect viruses
Surging viruses are securely protected
Class assignments and exercises
Questions and solutions
3.1.1
Describe the web and related basis terms
Describe we List types of the web Describe the web terms
The web and related basic terms are clearly described
Class assignments and exercises
Questions and solutions
3.1.2
Identify the characteristics and parts of the web
Identify the characteristics of the web
Identify the parts of the web Describe the contents of the web
page
The characteristics and parts of the web are clearly identified
Class assignments and exercises
Questions and solutions
3.2.1
Identify requirement for design and contents of the web
Identify the requirement for design List contents of the web Describe the contents of the web
page
Requirement for the design and contents of the web are clearly identified
Class assignments and exercises
Questions and solutions
3.2.2
Identify the classes and types of the web
Describe the class of the web site Describe the types of the web site Identify the restrictions in web
design
The classes and types of the web are clearly described.
Class assignments and exercises
Questions and solutions
3.3.1
Plan and design the web Plan the web Design the web Review the design web
The web properly planned and designed
Class assignments and exercises
Questions and solutions
3.3.2
Code the web Code the web program Test the web Review the web
The web is correctly coded Class assignments and exercises
Questions and solutions.
3.3.3
Evaluate and maintain the web
Evaluate the web Monitor the web Maintain the web
The web is properly evaluated and maintained
Class assignments and exercises
Questions and solutions
3.4.1
Apply Database concepts and application
Describe Management Information System
Identify the advantages of Management Information System
Database concepts and applications are correctly applied
Class assignments and exercises
Questions and solutions
18
3.4.2
Apply data models and schemas
List data models Describe data models Describe schemas
Data models and data schemas are correctly described
Class assignments and exercises
Questions and solutions.
3.5.1 Apply and implement storage organisation concept
Describe data flow diagrams Implement data storage structure Evaluated storage structures
Data storage organisation concepts are properly applied
Class assignments and exercises
Questions and solutions.
3.5.2 Identify database language and interfaces
Identify database language and interfaces
Describe database language Describe the interfaces
Database language and interfaces are clearly identified
Class assignments and exercises
Questions and solutions.
3.6.1 Implement relational database design
Describe the design process Identify the steps of the database
design process Describe the steps of the design
process
Relational database is properly designed
Class assignments and exercises
Questions and solutions.
3.6.2 Implement data modelling using ER models
Describe Entity Relationship Describe attributes Implement Relationships
Data modelling is properly implemented using ER model
Class assignments and exercises
Questions and solutions.
4.1.1 Describe word processing and a word processor
Describe the word processor Describe word processing Identify the features of a word
processor
Word processing and processor are clearly described
Class assignments and exercises
Questions and solutions.
4.1.2 Start ms word Start Ms word Load documents Close Ms word
Ms word is properly started Class assignments and exercises
Questions and solutions.
4.1.3 Enter and format text Enter text Format text Save the document
Text is properly entered and formatted
Class assignments and exercises
Questions and solutions
19
4.2.1 Describe Ms excel Describe a spread sheet List the features of a speared sheet List advantages of excel
Ms excel is clearly described
Class assignments and exercises
Questions and solutions
4.2.2 Start ms excel Start Ms Excel Load Ms excel documents Close the spread sheet
Ms excel is properly started Class assignments and exercises
Questions and solutions
4.2.3 Enter and format a spread sheet
Enter data Format the spread sheet Save the spread sheet
Ms excel is properly entered and formatted
Class assignments and exercises
Questions and solutions
4.2.4 Apply formulae, and function
Apply formulae Apply functions Apply charts
Formulae and functions are properly applied
Class assignments and exercises
Questions and solutions
4.3.1 Describe power point Describe power point Identify various aspects of power
point Exit Ms Power Point
Ms Power point is clearly described
Class assignments and exercises
Questions and solutions
4.3.2 Start ms power point Start Ms power point Load power point documents List advantages of Power point
Ms Power point is properly started.
Class assignments and exercises
Questions and solutions
4.3.3 Enter and format slides Enter slides Add and delete slides Format slides
Slides are properly entered and formatted
Class assignments and exercises
Questions and solutions
5.1.1 Describe the structure of VB
Explain basic of VB List basic terminologies of VB Explain basic terminologies in VB
The structure of VB is clearly described
Class assignments and exercises
Questions and solutions.
5.1.2 Apply basic concepts of VB
Identify the structure of VB Star VB Configure environment options Identify code modules
Basic concepts of VB are properly applied
Class assignments and exercises
Questions and solutions.
20
Apply the code editor5.1.3 Describe the code writing
structures Apply decision structures (If… Then,
If….Then Else, Select Case) Apply Loop structures (Do… Loop Apply Loop structure (For…Next, For
each ..Next)
The code writing structures are clearly described
Class assignments and exercises
Questions and solutions
5.2.1 Identify various variables Identify various variables Describe various variables Apply various variables
Various variables are clearly identified
Class assignments and exercises
Questions and solutions
5.2.2 Identify constants Identify various constants Describe various constants Apply various constants
Constants are clearly identified
Class assignments and exercises
Questions and solutions
5.2.3 Identify various data types
Identify data types Describe various data types Apply various data types
Various data types are clearly identified
Class assignments and exercises
Questions and solutions
5.3.1 Apply functions Describe a function Create a sub-function Passing data to a function
Functions are properly applied
Class assignments and exercises
Questions and solutions
5.3.2 Apply sub-functions Describe a sub-function Create a sub-function Passing data to a sub-function
Sub-function are properly applied
Class assignments and exercises
Questions and solutions
5.4.1 Describe objects Describe objects Identify the source of Objects Differentiate between Objects and
Classes
Objects are clearly described
Class assignments and exercises
Questions and solutions
5.4.2 Work with objects Controlling Objects with their Properties
Setting property values Apply Methods in Codes
Objects are properly worked with
Class assignments and exercises
Questions and solutions
21
5.4.3 Create objects Apply object variables Declare object variables Assign object variables List types of objects Apply forms as objects Pass objects to procedures
Objects are properly created
Class assignments and exercises
Questions and solutions
5.4.4 Relate objects to each other
Describe Object Hierarchies Use a collection of Objects Make Objects communicate
Objects are properly related to each other
Class assignments and exercises
Questions and solutions
6.1.1 Apply communication concepts, process and skills
Identify correct tenses Write grammatical correct
sentences Identify the voices (passive/active)
Communication concepts, process and skills are properly applied
Class assignments and exercises
Questions and solutions
6.1.2 Take and make notes Write simple sentences Copy different passages Summarise simple passages
Notes are properly taken and made
Class assignments and exercises
Questions and solutions
6.1.3 Make oral presentations Read passage Respond to questions and answers
verbally Makes short presentations
Oral presentations are properly made
Class assignments and exercises
Questions and solutions
6.1.4 Apply reading and writing skills
Read selected passages Write letters Prepare e-mails
Reading and writing skills are properly applied
Class assignments and exercises
Questions and solutions
6.2.1 Solve simple operations Perform fundamental arithmetic operations
Calculate fractions and mixed numbers
Calculate percentages
Simple operations are correctly solved
Class assignments and exercises
Questions and solutions
6.2.2 Work out ratio and conversion problems
Calculate ratios Calculate proportions Calculate unit analysis
Ratios and conversions are accurately worked out
Class assignments and exercises
Questions and solutions
6.2.3 Solve fractions and algebraic expressions
Calculate fractions Calculate algebraic expressions
Fractions and algebraic expressions are correctly
Class assignments Questions and
22
Apply fractions and algebraic expressions to business problems
solved and exercises solutions
6.2.4 Apply business mathematics in real world problems
Apply business maths in calculating partnership profits
Apply business mathematics in calculating discount, commission simple or compound interest
Business mathematics is properly applied in real world problems
Class assignments and exercises
Questions and solutions
6.3.1 Describe entrepreneurship
Describe entrepreneurship Describe enterprise Describe an entrepreneur
Entrepreneurship is clearly described
Class assignments and exercises
Questions and solutions
6.3.2 Describe basic entrepreneurship issues
Describe entrepreneurial traits Describe entrepreneurial attitudes Describe entrepreneurial
characteristics
Basic entrepreneurship issues are clearly described
Class assignments and exercises
Questions and solutions
6.3.3 Describe the role of entrepreneurship in Tanzania
Identify the roles of entrepreneurship in Tanzania
Identify the importance of entrepreneurship.
Identify problems facing entrepreneurship
The role entrepreneurship Tanzania is clearly described
Class assignments and exercises
Questions and solutions
6.3.4 Run and operate a micro business
Start a micro business Run a micro business Evaluate the micro business
Micro business is properly run and operated
Class assignments and exercises
Questions and solutions
6.3.5 Describe risks rewards and key personal entrepreneurship competences
Identify entrepreneurship risks Identify entrepreneurship rewards Identify key personal competencies
Risks, rewards and key personnel entrepreneurship competencies are clearly described
Class assignments and exercises
Questions and solutions
23
11.0 BENCHMARKING OF ASSESSMENT CRITERIANO. ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT
1.1.1 Hardware faults are correctly detected
Describes hardware faults Describe hardware faults and lists possible sources of hardware faults
Describe hardware faults, lists possible sources of hardware faults and describes methods of detecting faults.
1.1.2 Faults are correctly corrected and reported
Lists different ways of correcting faults
List different ways of correcting faults and describes hardware faults
List different ways of correcting faults, describe hardware faults and reports hardware faults
1.2.1 Network resources are correctly tracked
Describes network resources Describes and lists network resources
Describe, list network resources and adds required hardware to the network
2.1.1 Different parts of hardware are clearly identified
Identifies different parts of hardware
Identifies different parts of hardware, describes the CPU, Input devices and output devices
Identifies different parts of hardware, the CPU, input devices and output device external storage and communication devices.
2.1.2 The functions of different parts of computer hardware are clearly described
List functions of input devices and the CPU
List functions of input devices, the CPU and output devices
List functions of input devices, the CPU, Output devices, external storage units and the communication devices
2.1.3 Various parts of computer hardware are correctly connected
Identifies various parts of hardware
Identifies various parts of hardware and connects together hardware parts
Identify various parts of hardware application software and explains advantages and disadvantages of application software.
2.2.1 Different types of software are Describes Software and system Describes Software and System Describes software, system
24
clearly described software software and application’s software
software, application software and explains advantages and disadvantages of application software
2.2.2 Computer software is properly installed
Explains preconditions of installing software and installs software
Explains preconditions of installing software installs software, customise software installations, and configure software restrictions
Explains preconditions of installing software, installs software, customises software installations, configures software restrictions and enforces properties
2.3.1 Back-up are properly made Identifies reasons for making back-ups
Identifies reasons for making back-ups and explains storage media to be applied
Identifies reasons for making back-ups, explains storage media to be applied and describe back up methods
2.3.2 Hardware are properly cleaned Identifies hardware to be cleaned
Identifies hardware to be cleaned and tools to be used
Identifies hardware to be cleaned and tools to be used and cleans all hardware parts.
2.3.3 Files are correctly defragmented
Describes fragmentation and defragmentation
Described fragmentation and defragmentation and identifies types and causes of fragmentation
Describes, fragmentation and defragmentation and identifies types and causes of fragmentation, and prevents and eliminates fragmentation
2.3.4 Surging and viruses are securely protected
Describe and protects surging Describes, protects surging and describes viruses
Describes, protects surging and describes viruses and protects viruses.
3.1.1 The web and related basic terms are clearly described
Describe the web Describe the web and lists types of the web.
Describes the web, parts of the web and describes characteristics
25
of the web
3.1.2 Characteristics and parts of the web are clearly identified and described.
Identifies characteristics of the web
Identifies characteristics of the web and parts of the web
Identifies characteristics of the web, parts of the web and describes characteristics of the web.
3.2.1 Requirements for the design and contents of the web are Clearly listed
Identifies requirements for the design
Identifies requirements for the design and lists contents of the web page
Identifies requirement for design and lists contents of the web page and describes identifies requirements for the design and lists contents of the web page.
3.2.2 Classes and types of the wed are clearly described
Describes classes of the wed Describes classes of the wed and types of the web
Describes classes of the wed, types of the web and identifies the restrictions of the web design.
3.3.1 The web is properly planned and designed
Plans the web Plans and design the web Plans and design the web and reviews the designed web.
3.3.2 The web is correctly coded Codes the web Codes the web and tests the web
Codes, tests the web and reviews the web
3.3.3 The web properly evaluated and maintained
Evaluates the web Evaluates and monitors the web
Evaluates, monitors the web and maintains the web.
3.4.1 Apply Database concepts and applications
Describes database Describes database, Management Information System
Describe database, Management Information System and identifies advantages of a Management Information System
3.4.2 Apply data models and schemas
List Data models Lists Data models and describes data models
Lists Data models, describes data models and describes schemas
26
3.5.1 Apply and implement storage organisation concepts.
Describes Data flow diagrams properly
Describes Data flow diagrams and implements data storage structures properly.
Describes Data flow diagrams, implements and evaluate data storage structures properly.
3.5.2 Identify database languages and interfaces
Identifies database language and interfaces
Identifies database language and interfaces and describes database languages
Identifies database language and interfaces, and describes database languages and interfaces.
3.6.1 Implement relational database design
Describes the design process Describes the design process and identifies the steps of the database design process
Describe the design process, identifies steps of the design process describes the steps of the design process properly.
3.6.2 Implement data modelling using ER models
Describes entity relationship properly
Describes entity relationship and attributes properly
Describes entity relationship, attributes and implements relationship properly.
4.1.1 Word processing and processor clearly
Describes Word processing Describes Word processing and word processor
Describe Word processing and word processor and identifies features of a word processor.
4.1.2 Ms word is properly started Starts Ms word Starts and loads Ms word documents
Starts, load and exists Ms word
4.1.3 Text is entered and formatted Enters text Enters and formats text Enters and formats text and save Ms word documents.
4.2.1 Ms excel is clearly described Describes Ms Excel Describes and lists features of Ms excel
Describes, lists features and advantages of excel
4.2.2 Ms excel is properly started Starts Ms excel Starts Ms excel and loads Ms excel documents
Starts, loads Ms excel documents and exists Ms excel.
4.2.3 A spread sheet is properly Enters data into Ms excel Enters and formats data Enters and formats data and save
27
entered and formatted Ms excel documents.
4.2.4 Formulae and functions are properly applied
Applies formulae Applies formulae and functions Applies formulae, functions and charts.
4.3.1 Ms Power point is clearly described
Describes Ms power point Describes Ms power point and identifies various aspects of power point.
Describe Ms power point, identifies various aspects of power point and exits power point.
4.3.2 Ms Power point is properly started
Starts Ms Power point is Starts Ms Power point, loads Ms power point
Starts Ms Power point, loads Ms power point and lists advantages of power point
4.3.3 Slides are properly entered and formatted
Enters slides Enters, add and deletes slides Enters, add and deletes and formats slides
5.1.1 The structure of VB is clearly described
Explains the basics of VB Explains the basics of VB and lists terminologies of VB
Explains the basics of VB, lists and explain terminologies of VB
5.1.2 Basic concepts of VB are properly applied
Identifies basic concepts of VB Identifies basic concepts of VB, start and configure environment options of VB
Identifies basic concepts of VB, start configure environment options of VB, identifies code modules, and applies the code editor.
5.1.3 The code writing structures are clearly applied
Applies the code writing structures (If… then, If…Then…Else, Select case)
Applies the code writing structures (If… then, If…Then Else, Select case) and loop structure (Do… Loop)
Applies the code writing structures (If…then, If…then…Else, Select case) and loop structures (Do…Loop, For…Next, For each…Next).
5.2.1 Various variables are clearly identified
Identifies various variables Identifies and describes various variables
Identifies, describes and applies various variables.
5.2.2 Constants are clearly identified Identifies constants Identifies and describes Identifies, describes and applies
28
constants constant
5.2.3 Various data types are clearly identified
Identifies various data types Identifies and describes various data types correctly
Identifies, describes and applies various data types correctly.
5.3.1 Functions are properly applied Describes functions correctly Describes and creates functions correctly
Describes, creates and passes data to Sub-functions correctly.
5.3.2 Sub-functions are properly applied
Describes functions correctly Describes and creates Sub-functions correctly
Describes, creates and passes data to Sub-functions correctly.
5.4.1 Objects are clearly described Described Objects clearly Describes Objects and identifies sources of objects clearly
Describes Objects, identifies sources of objects and differentiates objects and classes clearly.
5.4.2 Objects are properly worked with
Controls objects and their properties properly
Controls objects and their properties properly, and sets property values
Controls objects and their properties properly and sets properly and values and applies methods in codes.
5.4.3 Objects are properly created Applies objects variables and declares object variables
Applies objects variables and declares object variables and lists types of objects correctly
Applies objects variables, declares object variables, lists types of objects, apply forms as objects and passes objects to procedures correctly.
5.4.4 Objects are properly related to each other
Describes objects hierarchies correctly
Describes objects’ hierarchies correctly and uses a collection of objects correctly
Describes objects’ hierarchies correctly, uses a collection of objects and makes objects communicate correctly
6.1.1 Communication concepts, processes and skills are
Identifies correct tenses Identifies correct tenses and writes correct grammatical
Identifies, correct tenses and writes correct grammatical
29
properly applied sentences sentences and identifies voices (passive/active)
6.1.2 Notes is properly taken and made
Writes simple sentences correctly
Writes simple sentences correctly and copies different passages
Writes simple sentences correctly, copies different passage and summarises simple passages.
6.1.3 Oral presentations are properly made
Reads passages correctly Reads passages correctly and responds to questions and answers orally
Reads passages correctly, responds to questions and answers orally, and makes short presentations correctly.
6.1.4 Reading and writing skills are properly applied
Reads selected passages correctly
Reads selected passages and writes letters correctly
Reads selected passages, writes letters and prepares e-mails correctly.
6.2.1 Simple operations are correctly solved
Performs fundamental arithmetic operations
Performs fundamental arithmetic operations and calculates fractions and mixed numbers correctly
Performs fundamental arithmetic operations, calculates fractions and mixed numbers correctly and calculates percentages.
6.2.2. Ratios and conversions and problems are accurately worked out
Calculate ratios correctly Calculates ratios and proportions correctly
Calculates ratio, proportions and unit analysis correctly
6.2.3 Fractions and algebraic expressions are correctly solved
Calculates fractions correctly Calculates fractions and algebraic expressions correctly
Calculates fractions and algebraic expressions and applies functions and algebraic expressions to business problems correctly.
6.2.4 Business mathematics is properly applied in real world problems
Calculates business profits correctly
Calculates business profits and applies ratios in calculating partnership profits correctly
Calculates fractions and algebraic expressions and applies ratios in calculating partnership profits,
30
discounts, commission and simple/compound inters correctly.
6.3.1 Entrepreneurship is clearly described
Describe entrepreneur correctly
Describe entrepreneur and enterprise correctly
Describe entrepreneur, enterprise and entrepreneurship correctly.
6.3.2 Basic entrepreneurship issues are clearly described
Describe entrepreneurship traits correctly
Describe entrepreneurship traits and attitudes correctly
Describe entrepreneurship traits and attitudes correctly and describe entrepreneurial characteristics.
6.3.3 The role of entrepreneurship in Tanzania is clearly described
Describes the roles of entrepreneurship in Tanzania
Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship
Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship and identifies the problems facing entrepreneurship
6.3.4 Micro business is properly run and operated
Starts a micro business Starts and run a micro business Start, run and evaluates a micro business
6.3.5 Risks, rewards and key personnel entrepreneurship competencies are clearly described
Identifies entrepreneurship risks.
Identifies entrepreneurship risks and rewards correctly.
Identifies entrepreneurship risks, reward and key personal competencies correctly.
31
CODE : BTCIT 412
NAME : Introduction to Computer Networking
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
1.2.1 Track network resources1.2.2 Add hardware to existing network
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Christo J.P. Moschovitis, History of the Internet: a chronology, 2009, Prentice Hall2. Michael A. Banks, On the way to the web. 2008, A press3. Plattner B, Computer Networks, 2008, Prentice Hall4. Stallings W, Wireless Communication and Networks, 2008, Prentice Hall5. Tanenbaum A.S, Computer Networks, 2005, Prentice Hall
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60%
32
CODE : BTCIT 413
NAME : Introduction to Communication Skills
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
6.1.1. Apply communication concepts, processes and skills6.1.2. Take and make notes6.1.3. Make oral presentations6.1.4. Apply reading and writing skills work
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Davis M, Communication Skills, 2008, New Herbinger Publications, USA2. James C, Mc Coskey, Richmond P, An Introduction to Communication in the classroom: the role of
the communication in Teaching and Training, 2008, Alley and Baco.3. Mahundu C M A, A Manual on Communication Skills – Toward improving Communication Skills in
English Language, 2008, Benedict Fathers, Ndanda, Tanzania.4. Pual P and Korthali J S, Essentials of Business Communication, 2009, Sultan Chand and Sons5. Shumbusho, Mwaijande, Business Communication Skills Hand book, 2003, Mzumbe University.
INTEGRATED METHOD OF ASSESSMENT
33
Continuous assessment 40%
End of semester examination 60%
34
CODE : BTCIT 414
NAME : Basic Mathematics
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
6.2.1 Solve simple operations6.2.2 Work out ratios and conversion problems6.2.3 Solve fractions and algebraic expressions6.2.4 Apply Business mathematics in real world
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES
1. Haemstock, H, Elements of Business Mathematics, 2008, Harrp2. Hughe, R J and Richard, D, Business Maths Essentials, 2008, Irwin Inc3. Mc Keague, C P, Pre Algebra, 2009, Brooke Cole Publishing Company4. Streete, R J, Basic Mathematics Skills with Geometry, 2007, McGraw Hill5. Willace, M, Pills, C, Mathematics for Business, 2008, Gage Education Publish Ltd.
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60%
35
CODE : BTCIT 415
NAME : office Automation
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
4.1.1 Describe word processing and a word processor4.1.2 Start Ms word4.1.3 Enter and format text4.2.1 Describe spread sheets4.2.2 Start Ms excel4.2.3 Enter and format a spread sheet4.2.4 Apply formulae and functions4.3.1 Describe power point4.3.2 Start Ms power point4.3.3 Enter and format slides
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES : 1. Birton P, Introduction to Computers, 2009
2. Cox J. Lambert J, Frye C, Microsoft Office Professional 2010 Step, 2010, Microsoft press3. Doyle S, Understanding information and Communication technology, 2009, Delta Place
Thornes4. McManus S, Microsoft Office for the Older and Wiser: GetUp and Run with Office 2010,
2010 John Wiley.5. Shelly/Cashman/Vermaat, Introduction, Concepts and Techniques, 2008, Microsoft Office
36
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60%
CODE : BTCIT 422
NAME : Introduction to Entrepreneurship
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
6.3.1 Describe entrepreneurship6.3.2 Describe basic entrepreneurship6.3.3 Describe the role of entrepreneurship Tanzania6.3.4 Start and run micro business6.3.5 Describe risk, rewards and key personal entrepreneurship competencies6.2.4 Apply Business mathematics in real world
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES : 1. Backet M, Small Business-Guide to starting your Business, 2008, Macmillan
37
2. Burns P, Entrepreneurship and small Business, 2009, Palgrave3. Owen J, How to Sell, 2011, Prentice Hall4. Robson C, Confession of an Entrepreneur, 2010, Prentice Hall5. William S, Financial Times Guide to Business Plan Start up, 2011, Prentice Hall
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60%
CODE : BTCIT 423
NAME : Web design Basics
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
38
3.1.1 Describe the web and related basic terms3.1.2 Identify the characteristics and parts of the web3.2.1 Identify the requirements for design and contents of the web3.2.2 Identify the classes and types of the web3.3.1 Plan and design the web3.3.2 Code the web3.3.3 Evaluate and maintain the web
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES : 1. Fisel C, Freelance Design in Practice, 2009, Wiley
2. Hardy J A, Carneiro C Jr, Beginning Rails 2: Freom Novice to Professionals, 2009, Wioley
3. Marks T, Good Design: Deconstruction Form and What Makes Design Work, 2009 Wiley
4. Toague J C, Speaking in Styles: Fundamentals of CSS foe Web Designers, 2009, Wiley
5. Wiedemann J, Web Design Navigation, 2009, Wiley
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60%
39
CODE : BTCIT 424
NAME : Introduction to Computer Maintenance
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
2.3.1 Make back-ups2.3.2 Clean hardware2.3.3 Defragment files2.3.4 Protect surging and viruses
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES : 1. Ballew J, Computer problems solved for the over 50’s in Simple Steps, 2011, HP Indigo Digital Press
2. Ballew J, Computer Basics, 2010, HP Indigo Digital Press3. Beales R P, PC Systems, Installation and Maintenance, 2020, Prentice Hall4. Johnson S, Brilliant Office 2010, 2010, Prentice Hall5. Resonthan J, PC Repair and Maintenance, 2010, Media Publications
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60% 40
CODE : BTCIT 425
NAME : Basic Database
NUMBER OF CREDITS : 12
SUB-ENABLING OUTCOMES
7.1.1 Describe basic database concepts and applications7.1.2 Describe data models and schemas7.2.1 Describe storage organisation concepts7.2.2 Identify database languages and interfaces7.3.1 Implement relational database design7.3.2 Implement data modelling using ER models
TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer
METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions
REFERENCES : 1. Desai B P, An Introduction to Database Systems, 2008, West Publication Company
2. Group I, Introduction to Database management System, 2008, McGraw Hill
3. Henry F, Silberschatz, Database system Concepts, 2009, McGraw Hill
4. IT Education Solutions Limited, Introduction to Database Systems, Pearson Education India
5. Ullman J D, Principles of Database and knowledge Base Systems, 2009, Computer Systems Press
41
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment 40%
End of semester examination 60%
42
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.
1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competent modular curricular is to comply with the Nation’s Vision and mission, which
requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible
work force that will be responsive to the Social needs.
Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of
that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge.
Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in
a situation with discipline-transcending new and unknown problems. The foregoing are the problems that the College of Business
Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to
apply knowledge and skills.
The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that
given “Appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn”.
CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. maintain
computers, process files, manage computer networks, apply mathematics in solving computer problems, develop website, develop
database. etc). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 5 for INFORMATON AND COMMUNICATION TECHNOLOGY
specialization.
The qualification comprises of a number of modules, each module will be covered in one semester. For this course, there are 15
weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are
allocated in each semester and accounts for 34 weeks for a year.
This qualification has 120 credits which is the minimum prescribed by NACTE.43
2.0 MODULE CODING
The coding of modules follows logical sequence as in the following example for TCIT 511.
TCIT = Stands for Technician Certificate in Information Technology
5 = The first digit stands for the NTA level, in this case Technician Certificate which is level five.
1 = The second digit stands for semester, i.e. for semester one.
1 = The last digit stands for the order of the module in the semester. Modules are arranged serially
from 1 to the highest number, upon the number of modules in the semester
44
3.0 GRADING OF ASSESSMENT RESULTS
The grading of assessment results is in conformity with the NACTE grading system as follows.
NTA Level 5
Grade Definition Score
A Excellent 80 ─ 100
B Good 65 ─ 79
C Average 50 ─ 64
D Poor 40 ─ 49
F Failure 00 ─ 39
I Incomplete
4.0 AWARDS
The award shall be made to students who satisfy the following conditions.
Have completed modules for the award.
Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass.
GPA shall be computed from cumulative scores earned by students using NACTE guidelines.
45
5.0 AWARDS CLASSIFICATION:
Awards Classification for NTA level 5
Class of Awards Cumulative GPA
First Class 3.5 to 4.0
Second Class 3.0 to 3.4
Pass 2.0 to 2.9
46
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.
6.0 SUMMARY FRAMEWORK
QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION & COMMUNICATION
TECHNOLOGY
PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine
activities: develop database systems, design and analyze systems, prepare simple
computer programs, connect peripherals, ports and network hardware
communication systems, and apply office automation software, under less
supervision.
NTA LEVEL 5
COMPETENCE LEVEL
DESCRIPTOR
The holder of the qualification will apply skills and knowledge in a range of ICT
activities some of which are non-routine of developing database systems, designing
and analyzing systems, preparing simple computer programs, connecting
peripherals, ports and network hardware communication systems, applying office
automation software, and assuming some operational responsibilities.
CREDITS AT THIS LEVEL 120
CUMULATIVE CREDITS AT
THIS LEVEL
0
MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL 0
47
DATE THE QUALIFICATION
STANDARD LAST REVIEWED
New
ENTRANCE
REQUIREMENTS
BTCIT level 4, or Form six with one principal pass either in mathematics or physics.
48
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND
COMMUNICATION TECHNOLOGY
7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA
S/N PRINCIPAL LEARNING OUTCOMES CREDIT VALUES
ASSESSMENT CRITERIA
PLO 1 Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems.
24
1.1. Communication at the place of work is effectively done.
1.2 Computing mathematics skills are properly applied on solving business problems.
POL 2 Apply system design and maintenance technology in database system development, web design, and analysis and design. 48
2.1 System design technology is
Properly applied.
2.2 Computer maintenance
Technology is properly applied.
2.3 Database system development
is properly applied
2.4 Web is properly designed.
PLO 3 Prepare simple computer programmes using programming languages
12 3.1 Simple computer programs are properly prepared using computer languages.
PLO 4 Connect peripherals and ports to computer network hardware communication system and apply office automation software.
4.1 Computer peripherals and ports are correctly connected to the network hardware communication system.
49
24 4.2 Office automation software is properly applied.
PLO 5 Apply professional ethical security principles in computer use.
12
5.1 Computer professional ethical security principles are properly applied.
PLO 6 Apply knowledge, skills and techniques of all modules learned in the course in a real life situation. -
6.1 Knowledge, skills and techniques of
all modules learned in the course are properly applied in a real life situation.
120
50
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND
COMMUNICATION TECHNOLOGY
8.0 PROGRAM STRUCRTURESEMESTER I
S/NO CODE NAME OF MODULE CREDITS
1 TCIT 511 Communication Skills 12
2 TCIT 512 Computing Mathematics 12
3 TCIT 513 Database System Development 12
4 TCIT 514 Computer Maintenance 12
5 TCIT 515 Programming 12
TOTAL CREDITS SEMESTER I 60
SEMESTER II
1 TCIT 521 Advanced Office Automation 12
2 TCIT 522 Web Design 12
3 TCIT 523 Networking 12
4 TCIT 524 Professional Ethics and Security in Computer use 12
5 TCIT 525 System Analysis and Design 12
6 TCIT 526 Practical Project --
TOTAL CREDITS SEMESTER II 60
GRAND TOTAL CREDITS FOR NTA LEVEL 5 120
51
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND
COMMUNICATION TECHNOLOGY
9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES :
PRINCIPAL OUTCOMES ENABLING OUTCOMES SUB-ENABLING OUTCOMES
1. Communicate effectively
and efficiently at the place of
work and apply Computing
mathematics skills in solving
business problems.
1.1 Apply
mathematical
Concepts in ICT.
1.1.1 Apply mathematical concepts in
calculation and preparation of
database
1.1.2 Solve basic problems relating to ICTusing mathematical principles
1.2 Apply basic
communication skills.
1.2.1 Apply basic writing skills.
1.2.2 Apply principles and theories involving
business correspondences.
1.2.3 Apply employment communication.
1.2.4 Prepare simple research proposal and
write effective memos, paper
presentations and other business
presentations.
52
2. Apply system design
and maintenance technology in
database system development,
web design, and system
analysis and design
2.1 Detect and correct
Computer faults.
2.1.1 Identify conditions of faults.
2.1.2 Correct computer faults
2.1.3 Analyze the conditions of computer
systems.
2.2 Improve image and
other features in
the website.
2.2.1 Diagnose problems
2.2.2 Design web site that is easy and
effective to use.
2.2.3 Maintain a website.
2.3 Prepare database
systems,
2.3.1 Design data models
2.3.2 Install and test database system
2.3.3 Update existing database.
2.4 Collect information,
analyze and evaluate
existing system.
2.4.1 Prepare system models
2.4.2 Document system problems and
resolution for future reference.
53
3. Prepare simple
computer programs
using programming
languages
3.1. Prepare new
application
programs from
beginning to end.
3.1.1 Create codes that meet system
standards.
3.1.2 Maintain system application
3.1.3 Innovate data visualization
techniques.
4. Connect peripherals
and ports to
computer network
hardware
communication
system and apply
office automation
software
4.1 Apply software for
database and office
automation
4.1.1 Describe types of computer software
4.1.2 Apply file processes
4.1.3 Apply data traffic flow and
coordination
4.1.4 Apply communication equipment
and systems communication
channels
4.2 Build simple network. 4.2.1 Identify tools for building network
4.2.2 Connect workstation
4.2.3 Configure network
4.2.4 Test communication between
workstations
4.3. Create queries and
generate simple
reports
4.3.1 Work with queries in database
4.3.2 Create queries in design view
4.3.3 Prepare simple reports
4.3.4 Save and print simple reports
54
4.4 Administer user
Accounts
4.4.1 Maintain user accounts
4.4.2 Delete/Update user accounts
4.4.3 Assign access right (e.g.
Guest, Administrator, Students)
5. Apply professional
ethical and security
principles in
computer use.
5.1. Maintain
computer systems
5.1.1 Explain computer crime (e.g. Hacking,
cracking)
5.1.2 Solve computer virus problems.
5.1.3. Update/Install antivirus packages
5.1.4 Apply authentication methodologies in
Computer use.
5.2 Apply computer ethical
principles.
5.2.1 Maintain access right in computer
use.
5.2.2 Maintain information privacy and
accuracy
5.2.3 Detect/prevent unauthorized users.
(e.g. intruders)
6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.
6.1 Maintain computer
network systems
6.1.1 Connect, Configure, run networked
computers.
6.1.2 Analyze network systems
55
6.2 Make operational
Services
6.2.1 Maintain computer hardware
6.2.2 Connect computer hardware
6.2.3 Update computer software (e.g.
operating systems)
6.2.4 Manage computer networking
6.3 Analyze computer system
communication
6.3.1 Communicate effectively with
organizational Stakeholders (e.g.
INTRANET and EXTRANET)
6.3.2. Apply computing mathematics in
solving computer problems
56
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND
COMMUNICATION TECHNOLOGY
10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS
SUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT CRITERIA
ASSESSMENT METHODS
ASSESSMENT INSTRUMENTS
1.1.1 Apply mathematical concepts in calculation and preparation of database.
Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems).
Explain sets and relations.
Explain basic number theoretical functions.(e.g the MODE function, GCD, and LCM)
Mathematical concepts in calculation and preparation of database are properly applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
1.1.2 Solve basic problems relating to ICT using mathematical principles
Evaluate basic counting techniques and discrete probability
Explain important
Basic problems relating to ICT are accurately solved using mathematical
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
57
algorithms of graph theory.
Explain Boolean logic and techniques of mathematical proofs.
principles
1.2.1 Apply basic writing skills Apply grammar Construct
sentences Write small texts
Basic writing skills are properly applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
1.2.2 Apply principles and theories involving business correspondence
Write business letters
Write E-mail Write simple
reports Write sales
letters
Principles and theories involving business correspondence are appropriately applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
1.2.3 Apply employment communication
Write employment application letters
Write CV’s Participate in
employment interviews
Search for jobs
Employment communication is properly applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
1.2.4 Prepare simple research proposal and write effective memos, paper presentations
Prepare simple research proposal
Write effective
Simple research proposal and effective memos,
Discussion Presentation Tests and
Quiz
Whiteboard Markerpen Blackboard Chalk
58
and other business presentations.
memo’s Prepare paper
and other business presentations
paper presentation and other business presentations are properly prepared
Assignment Projector Laptop checklist
2.1.1 Identify conditions of faults Define faults Mention
condition of faults
Identify different types of faults
Conditions of faults are correctly identified
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
2.1.2 Correct computer faults Mention types of instrument used
Explain steps of correcting faults
Fix the faults
computer faults are properly
corrected
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
2.1.3 Analyze the conditions of computer systems
Define the computer system
Identify types of computer system
Explain parts of computer system
The conditions of computer systems are clearly analyzed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
2.2.1 Diagnose problems Define problems Describe the
process of fixing problems
Fix problems
Problems are correctly diagnosed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
59
2.2.2 Design website that is easy and effective to use
Define website Explain types of
websites Prepare a simple
website
Website that is easy and effective to use is correctly designed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop Checklist
2.2.3 Maintain a website Run website Update website Secure website
Website is properly maintained
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
2.3.1 Design data models Describe data models
Explain types of data models
Give ways of designing data models
Data models are correctly designed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
2.3.2 Install and test database system.
Explain database system
Describe ways of installing and testing database system
Install and run database system
Database system is properly installed and tested
Discussion Presentation Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
2.3.3 Update existing database Describe the features of databases
Explain methods of updating databases
Apply the methods to update
Existing database is properly updated
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
60
databases2.4.1 Prepare system models Define system
models Identify the types
of system models
Describe methods of preparing system models
Apply the methods to prepare system models
System models are correctly prepared
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
2.4.2 Document system problems and resolutions for future reference.
Explain system problems
Describe resolutions of system problems
Describe methods of system documentation
System problems and resolutions are correctly documented for future reference
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
3.1.1 Create codes that meet system standard
Define codes Explain types of
codes Describe
methods of creating codes using programming languages (e.g Access,VB,Java, C++)
Apply methods of creating codes
Codes that meet system standards are properly prepared
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
3.1.2 Maintain system application Define system System Discussion Whiteboard
61
application Update new
features Troubleshoot
system application.
application is properly maintained
Presentation Tests and
Quiz Assignment
Marker pen Blackboard Chalk Projector Laptop checklist
3.1.3 Innovate data visualization techniques
Define data visualization
Apply data visualization techniques
Apply data visualization techniques
Data visualization techniques are appropriately innovated
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.1.1 Describe types of computer software
Define computer software
Identify types of computer software
Identify the use of each computer software
Types of computer software are clearly described
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.1.2 Apply file processes Define computer file
Identify functions of computer files
Describe operational functions of computer file
Apply processes to prepare computer files
File processes are properly applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.1.3 Apply data traffic flow and coordination
Define data flow Identify parts of
data flow Prepare data
Data traffic flow and coordination are properly
Discussion Presentation Tests and
Quiz
Whiteboard Marker pen Blackboard Chalk
62
flow hardware communication
Test dataflow hardware communication
applied Assignment Projector Laptop checklist
4.1.4 Apply communication equipment and systems communication channels
Define of communication channels
Describe communication equipment(e.g. Access point, network routers,hubs,switchers and servers)
Identify types of communication channels and equipment
Prepare communication channels
Communication equipment and systems communication channels are properly applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.2.1 Identify tools for building network
Describe network tools
Prepare tool kit(e.g. Tester, ripping tool, Combination pliers)
Prepare trunking
Tools for building network are correctly identified
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.2.2 Connect workstations Define workstation/nodes
Describe types of workstations
Workstations are properly connected
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector
63
Identify types of topologies(e.g. Star,Bus,Ring)
Prepare and Test UTP cables
Connect different work stations
Laptop checklist
4.2.3 Configure Network Define network configuration
Describe the use of ping command
Troubleshoot network
Network is properly configured
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.2.4 Test communication between workstations
Define computer communication
Describe processes of testing communication between workstations
Use the ping command to check if your TCP/IP software is correctly configured.
Communications between workstations is correctly tested
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.3.1 Work with queries in database Define queries in database
Describe function of queries in database
Identify types of objects in database
Queries are properly worked with
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
64
4.3.2 Create queries in design view Define queries in design view
Describe data types entered in design view
Identify data types
Queries in design view are properly created.
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.3.3 Prepare simple reports in database
Define report object in database
Describe functions of reports in database
Prepare simple report from the database system
Create interface between table, query and report.
Simple reports in database are correctly prepared
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.3.4 Save and print simple reports Produce files and save the report
Produce folder and save the file into folder
Produce hardcopy of the report by printing the report
Simple reports are correctly saved and printed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.4.1 Maintain user accounts Define user account
Describe the functions of user account
Prepare user account
User accounts are properly maintained
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
4.4.2 Delete/Update user account Describe the User accounts are Discussion Whiteboard
65
process of deleting user accounts
Describe the process of updating user accounts
Apply the process for deleting user account
Apply the process for updating user account
correctly Deleted or Updated
Presentation Tests and
Quiz Assignment
Marker pen Blackboard Chalk Projector Laptop checklist
4.4.3 Assign access right(e.g Guest,Adminstrator,Students)
Define access right
Describe the function of access right
Maintain access right
Access rights are properly assigned
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist
5.1.1 Explain computer crime(e.g Hacking and Cracking)
Define computer crime
Describe types of computer crime(e.g Hacking and Cracking)
Describe ways of protecting computer from crime
Computer crime is clearly explained
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
5.1.2 Solve Computer virus problems Define computer viruses
Describe types of computer viruses
Computer virus problems are properly solved
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector
66
Describe the effect of computer viruses
Describe ways of dealing with computer viruses
Laptop checklist
5.1.3 Install/Update antivirus packages
Define antivirus packages
Define types of antivirus
Describe ways of installing/updating computer antivirus
Antivirus packages are correctly installed and updated
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
5.1.4 Apply authentication methodologies in computer use
Define the term authentication
Identify types of authentication
Explain the authentication methodologies.(e.g Domain name, passwording, access right)
Authetification methodologies are properly applied
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
5.2.1 Maintain access right in computer use
Assign the access code to access the server
Create password and IP addresses
Protect password
Access right in computer use is properly maintained
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
5.2.2 Maintain information privacy and accuracy
Define information privacy
Define
Information privacy and accuracy is
Discussion Presentation Tests and
Quiz
Whiteboard Marker pen Blackboard Chalk
67
information accuracy
Describe the function of information privacy
Describe the use of information privacy
appropriately maintained
Assignment Projector Laptop checklist
5.2.3 Detect/Prevent unauthorized users(e.g intruders)
Define unauthorized user
Describe the types of unauthorized users
Describe the ways of preventing computer intruders
Unauthorized users are properly detected and prevented
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.1.1 Connect,Configure,Run networked computers
Collect components
Organize equipment and tools
Configure and run computer network
Networked computers are correctly connected and configured
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.1.2 Analyse network systems Manage computer networks
Monitor computer users
Provide IP address to users
Network systems are correctly analysed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.2.1 Maintain Computer hardwares Keep computer Computer Discussion Whiteboard
68
hardware Store computer
hardware Organize
computer hardware
hardwares are properly maintained
Presentation Tests and
Quiz Assignment
Markerpen Blackboard Chalk Projector Laptop checklist
6.2.2 Connect computer hardwares Connect all hardwares to obtain computer systems
Test the system and install operating systems
Computer hardwares are correctly connected
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.2.3 Update computer software Install/Reinstall the operating system.
Install application software.
Run other application software
Computer software is properly updated
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.2.4 Manage computer networking Control the server
Manage other networked computers
Provide access rights to nodes/workstations
Describe the usage of networked computers
Computer networking is properly managed
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
6.3.1 Communicate effectively with organizational stakeholder
Organize the servers
Organisational stakeholders are
Discussion Presentation
Whiteboard Markerpen
69
Provide closed loop with all nodes
Organize different computers in other organizarions
effectivelly communicated with
Tests and Quiz
Assignment
Blackboard Chalk Projector Laptop checklist
6.3.2 Apply Computing mathematics in solving computer problems
Collect different equipments and tools
Apply mathematical rules in solving different computer problems
Computing mathematics is accurately applied in solving computer problems
Discussion Presentation Tests and
Quiz Assignment
Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist
70
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.
11.0 BENCHMARKING OF ASSESSMENT CRITERIA
S/NO ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT
1.1.1 Mathematical concepts in calculation and preparation of database are properly applied.
Converts various base number system
Converts various base number sytems and explains sets and relations
Converts various base number systems, explain sets and relations and basic number theoretical
71
functions
1.1.2 Basic problems relating to ICT are accurately solved using mathematical principles
Evaluates basic counting techniques and discrete probability
Evaluates basic counting techniques , and explains important algorithms of graph theory
Evaluates basic counting techniques , discrete probability and explains important algorithms of graph theory, Boolean logic and techniques of mathematical proof .
1.2.1 Basic writing skills are properly applied
Applies grammar Applies grammar and construct sentences
Applies grammar , construct sentences and writes small texts
1.2.2 Principles and theories involving business correspondence are appropriately applied.
Writes business letter and e-mails correctly
Write business letter, e-mails and simple reports
Writes business letter,e-mails,simple report and sales letter correctly
1.2.3 Employment communication is properly applied
Writes employment letters and CV’s
Writes employment letters, CV’s and participates in employment interviews
Writes employment letters, CV’s ,participate in employment interviews and search for jobs
1.2.4 Simple research proposal effective memos, paper presentations and other business presentations are properly prepared
Prepares simple research proposal
Prepares simple research proposal and write effective memo
Prepares simple research proposals , writes effective memos ,paper and other business presentations
2.1.1 Conditions of faults are correctly identified
Defines faults Defines faults and mentions conditions of faults
Define faults, mentions conditions of faults and identifies different types of faults.
2.1.2 Computer faults are properly Mentions types of instrument Mentions types of Mention types of
72
corrected used instrument used and explain steps of correcting faults
instrument used, explain steps of correcting faults,and fixes the faults
2.1.3 The conditions of computer systems are clearly analysed.
Defines computer systems Defines computer system and identify types of computer systems
Defines computer systems ,identify types of computer systems and explains parts of computer systems
2.2.1 Problems correctly diagnosed Defines problems Defines problem and describes the process of fixing problems
Define problem , describe the process of fixing problems and fix problems
2.2.2 Website that is easy and effective to use is correctly designed
Explain website Explains website and types of websites
Explain website ,types of websites and prepare simple
2.2.3 Website is properly maintained Run website Run and update website Run, update and secure website
2.3.1 Data models are correctly designed
Describes data models Describes data models and explain types of data models.
Describes data models, explain types of data models and give ways of designing data models .
2.3.2 Database system is properly installed and tested
Explains database system Explains database system and describe ways of installing and testing database system
Explains database system ,describe ways of installing and testing database system, and install and run database system
2.3.3 Existing database is properly updated
Describes features of database Describes features and explain methods of
Describes features , explain methods of
73
updating database updating database and apply methods to update database
2.4.1 System models are correctly prepared
Defines and identify types of system models
Defines, identify and describe methods of preparing system models
Defines, identify, describe methods of preparing system models and apply the methods to prepare system models
2.4.2 System problems and resolutions are correctly documented for future reference
Explains system problems Explains system problems and describe resolutions of system problems
Explains system problems ,describe resolutions of system problems and methods of system documentation
3.1.1 Codes that meet system standards are properly prepared
Defines codes and explain types of codes
Defines codes, explain types of codes and describe the methods of creating codes using programming languages
Defines codes, explain types of codes , describe the methods of creating codes using programming languages and apply methods to create codes that meet system standard
3.1.2 System application is properly maintained
Defines system application Defines system application and update new features
Defines system application, update new features and troubleshoot system application .
3.1.3 Data visualization techniques are appropriately innovated
Defines data visualization properly
Defines data visualization and apply data visualization techniques properly.
Defines data visualization, apply data visualization techniques and apply data visualization techniques properly.
74
4.1.1 Types of computer software are clearly described
Defines computer software Defines computer software and identify types of computer software ,
Defines computer software, identify types of computer software and the use of each software ,
4.1.2 File processes are properly applied
Defines computer file and identify functions of computer file m
Defines computer file, identify functions of computer files and describe operational functions of computer files ,
Defines computer file, identify functions of computer file, describe operational functions of computer file and apply process to prepare computer files.
4.1.3 Data traffic flow and coordination are properly applied
Defines and identify parts of data flow.
Defines , identify parts of data flow and prepare dataflow hardware communication-
Defines , identify parts of data flow and prepare and test dataflow hardware communication
4.1.4 Communication equipment and systems communication channels are properly applied
Defines communication channels and describe communication equipment
Defines communication channels, describe communication equipment and identify types of communication channels and equipment.
Defines communication channels, describe communication equipment, identify types of communication channels and equipment and communication channels.
4.2.1 Tools for building network are correctly identified
Describes network tools. Describes network tools and prepare tool kit.
Describes network tools and prepare tool kit and trunking.
4.2.2 Workstations are properly connected
Defines workstation/node and describe types of workstations.
Defines workstation/node, describe types of workstation, identify
Defines workstation/node, describe types of workstation, identify types of topologies and prepare
75
types of topologies and prepare and test UTP cables.
and test UTP cables and connect different workstations.
4.2.3 Network is properly configured Defines network configuration. Defines network configuration and describe the use of ping command.
Defines computer communication and describe the processes of testing communication between workstations use of ping command and troubleshoot network.
4.2.4 Communication between workstations is correctly tested
Defines computer communication.
Defines computer communication and describe the processes of testing communication between workstations
Defines computer communication and use ping command to check if your TCP/IP software . configured and some more examples
4.3.1 Quarries in database are properly worked
Defines quarries in database. Defines quarries and describe functions of quarries in database properly
Defines quarries , describe functions of quarries in database and identify types of object in database properly
4.3.2 Quarries in design view are properly created
Defines quarries in design view. Defines quarries in design view and describe data type entered in design view.
Defines quarries in design view, describe data type entered in design view and identify data types.
4.3.3 Simple reports in database are correctly prepared
Defines report object and describe functions of report in database.
Defines report object, describe functions of report in and prepare simple report in
Defines report object, describe functions of report in, prepare simple report in database and create
76
database. interface between table, query and report in database.
4.3.4 Simple reports are correctly saved and printed
Produce and save file. Produce and save file, produce folder and save files into folder.
Produce and save file, produce folder and save files into folder and print.
4.4.1 User accounts are properly maintained
Defines user accounts. Defines user account and describe functions of user accounts.
Defines user account, describe functions of user accounts and prepare user accounts.
4.4.2 User accounts are correctly deleted or updated
Describes the process of deleting user account .
Describes the process of deleting or updating user account .
Apply the process of deleting or updating user account.
4.4.3 Access rights are properly assigned
Defines access right properly Defines access right and describe the functions of access right .
Defines access right, describe the functions of access right and maintain access right .
5.1.1 Computer crime is clearly explained
Defines computer crime . Defines computer crime and describe types of computer crime .
Defines computer crime ,describe types of computer crime and describe ways of protecting computer from crime .
5.1.2 Computer virus problems are properly solved
Defines computer viruses and describe types of computer viruses .
Defines computer viruses and describe types and effect of computer viruses
Defines computer viruses, describe types and effect of computer viruses ,and describe ways of dealing with computer viruses m
77
5.1.3 Antivirus packages are correctly installed and updated
Defines antivirus packages m Defines antivirus and types of antivirus
Defines antivirus and types of antivirus, describe ways of installing/updating antivirus ,
5.1.4 Authentification methodologies are properly applied
Defines the term authentification ,
Defines the term authentification and identify types of authentification
Defines the term authentification ,identify types of authentification and explain authentification methodologies and give some examples ,
5.2.1 Access rights in computer use is properly maintained
Assigns access code to access the server ,
Assigns access code to access the server correctly and create password and IP addresses,
Assigns access code to access the server correctly and create password and IP addresses protect password ,
5.2.2 Informarion privacy and accuracy is approprietly maintained
Defines information privacy and accuracy ,
Defines information privacy and accuracy and describe the functions of information accuracy ,
Defines information privacy and accuracy and describe the functions of information accuracy and privacy ,
5.2.3 Unauthorized users are properly detected and prevented
Defines unauthorized user , Defines unauthorized user and describe types of unauthorized users ,
Defines unauthorized user, describe types of unauthorized users and describe ways of preventing computer from unauthorized users ,
6,1,1 Networked computers are correctly connected and configured
Collects computer components, Collects computer components and organize equipments and
Collects computer components and organize equipments and tools,
78
tools adding more examples.
6.1.2 Network systems are correct analyzed practically
Manages computer network Manages computer network and monitor computer users.
Manages computer network, monitor computer and provide IP address tousers,
6.2.1 Computer hardware are properly maintained
Organizes computer hardware Organizes computer hardware and connect all the hardware to obtain computer system.
Organizes computer hardware and connect all the hardware to obtain computer system and adding more examples.
6.2.2 Computer hardware is correctly connected
Connects all the hardwares to obtain computer system.
Connects all the hardware to obtain computer system. and testing the system and install operating system.
Connects all the hardware to obtain computer system. and testing the system and install operating system and adding more examples
6.2.3 Computer software are properly updated
Install/Reinstall the operating system
Install/Reinstall the operating system and install application software
Install/Reinstall the operating system , install application software and run other application software
6.2.4 Computer networking are properly managed
Control the server and manage other networked computers
Control the server ,manage other networked computers and provide access right to nodes/workstations
Control the server ,manage other networked computers , provide access right to nodes/workstations and describe the usage of networked computers
6.3.1 Communication with stakeholders is effectively done
Organizes the servers Organizes the servers and provide closed loop
Organizes the servers , provide closed loop with all
79
with all nodes nodes and organize different computers in other organizations
6.3.2 Computing mathematics is accurately applied in solving computer problems.
Collects different equipment and tools
Collects different equipment and tools ,apply mathematical rules in solving different computer problems
Collects different equipment and tools, apply mathematical rules in solving different computer problems and adding more examples.
TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY
12.0 MODULES DESCRIPTION
CODE:TCIT 511
NAME; COMMUNICATION SKILLS
NUMEBER OF CREDITS: 12
80
SUB-ENABLING OUTCOMES:
1.2.1 Apply basic writing skills
1.2.2 Apply principles and theories involving business correspondence
1.2.3 Apply employment communication
1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business
Presentations.
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Edition Royal Autralia college of general Practitioners.
2 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland.
3 Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh.
4 Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd.
5 Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh.
81
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 512
NAME; COMPUTING MATHEMATICS
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
1.11 Apply mathematical concepts calculation and preparation of databases1.12 Solve basic problems relating to ICT using mathematical principles
TEACHING AIDS
Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist
82
METHODS OF INSTRUCTION
This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit.
REFERENCES;
1 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA.2 Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer verlag Berin Heideberg Germany,
3 Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1st Edition , AA Dordrecht the Netherlands
4 Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd Edition springer Verlag Berin Heideberg Germany,
5 Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 513
NAME; DATABASE SYSTEM DEVELOPMENT
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.3.1 Design data models2.3.2 Install and test database system2.3.3 Update existing database2.3.4 Work with quarries in database2.3.5 Create quarries in design view2.3.6 Prepare simple reports2.3.7 Save and print simple reports
83
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2nd Ed,Cengage Learning,Canada2 Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. 3 Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada.4 Rob P. et al (2009) Database systems design, implementation and management, 5th Edition Cengage, Learning EMEA.5 Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 514
NAME; COMPUTER MAINTENANCE
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
84
2.1.1 Identify conditions of faults2.1.2 Correct computer faults2.1.3 Analyse the conditions of computer systems2.1.4 Diagnose problems
TOPICS
• Define faults• Mention condition of faults
• Identify different types of faults
• Mention types of instrument used
• Explain steps of correcting faults
• Fix the faults
• Define the computer system
• Identify types of computer system
• Explain parts of computer system
• Define problems
• Describe the process of fixing problems
• Fix problems
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
85
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES
1 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc.2 Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM3 Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison
Wesley, NJ.4 Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. 5 Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.Butterworth-Heinmann.UK
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 515
NAME; PROGRAMMING
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
86
3.1.1 Create codes that meet system standards3.1.2 Maintain system application3.1.3 Innovate data visualization techniques
TOPICS
• Define codes
• Explain types of codes
• Describe methods of creating codes using programming languages (e.g Access,VB,Java, C++)
• Apply methods of creating codes
• Define system application
• Update new features
• Troubleshoot system application.
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
87
REFERENCES;
1 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts2 Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4th Edition, D. C. Heath and company
125 spring street, Lexington M. A.3 Oualline S. (2003) Practical C++ Programming 2nd Edition O’Reailly media Inc, 1005 Gravenstein Highway North ,
Sebastopol4 Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German.5 Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O’ Reilly media Inc, 1005 Gravenstein Highway North
Sebastopol.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 521
NAME; ADVANCED OFFICE AUTOMATION
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
4.1.1 Describe types of computer software4.1.2 Apply file processes4.1.3 Apply data traffic flow and coordination4.1.4 Apply communication equipment and system communication channels
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist88
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK2 Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke Publishing 980 East Circle Drive
USA3 Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK4 Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins5 Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher Education.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 522
NAME; WEB DESIGN
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.2.1 Diagnose problems2.2.2 Design website that is easy and effective to use2.2.3 Maintain a website
TOPICS
• Define website
• Explain types of websites89
• Prepare a simple website
• Run website
• Update website
• Secure website
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.
REFERENCES;
1 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol.2 Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York
Institution of Technology at Utica/Rome.3 Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition O’Relly media inc. 1005,Gravenstain
Highway North, Sebastopoll.4 Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology.5 Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
90
CODE:TCIT 523
NAME; NETWORKING
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
4.2.1 Identify tools for building network4.2.2 Connect workstations4.2.3 Configure network
91
4.2.4 Test communication between workstations4.2.5 Apply communication equipment and systems communication channels
TOPICS
• Define of communication channels
• Describe communication equipment(e.g. Access point, network routers,hubs,switchers and
servers)
• Identify types of communication channels and equipment
• Prepare communication channels
• Describe network tools
• Prepare tool kit(e.g. Tester, ripping tool, Combination pliers)
• Prepare trunking
• Define workstation/nodes
• Describe types of workstations
• Identify types of topologies(e.g. Star,Bus,Ring)
• Prepare and Test UTP cables
• Connect different work stations
• Define network configuration
• Describe the use of ping command
• Troubleshoot network
• Define computer communication
92
• Describe processes of testing communication between workstations
• Use the ping command to check if your TCP/IP software is correctly configured.
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.
REFERENCES;
1 Barken L(2009) How secure is your wireless network your Wi-FLAN,2nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ
2 Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice –Hall of India, New Delh.3 Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada4 Mathew J. (2005) Computer Networks, Internet protocols in actionaddition5 Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
93
CODE:TCIT 524
NAME; PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
5.1.1 Explain computer crime5.1.2 Solve computer virus problems5.1.3 Update/Install antivirus packages5.1.4 Apply authentication methodologies in computer use5.2.1 Maintain access right in computer use5.2.2 Maintain information privacy and accuracy5.2.3 Detect/prevent unauthorized users
TEACHING AIDS
Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist
94
METHODS OF INSTRUCTION
This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.
REFERENCES;
1 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk2 Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk.3 Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo .4 Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1st ed,Jones&Bartlett Publishers,Massachussets.USA5 Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ Prentice- Hall New Delh
India.
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
CODE:TCIT 525
NAME; SYSTEM ANALYSIS AND DESIGN
NUMBER OF CREDITS: 12
SUB-ENABLING OUTCOMES:
2.4.1 Prepare system models2.4.2 Document system problems and resolution for future reference
TEACHING AIDS
Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist
METHODS OF INSTRUCTION
95
This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit.
REFERENCES;
1 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA
2 Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London
3 MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland4 Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi.5 Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin
INTEGRATED METHOD OF ASSESSMENT;
Continuous assessment ─ 40% End of semester examination ─ 60%
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY
1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competent modular curricular is to comply with the Nation’s Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs.
Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills.
96
The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that” given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn”. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 6 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization.
The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.
This qualification has 120 credits which is the minimum prescribed by NACTE.
2.0 MODULE CODING
The coding of modules follows logical sequence as in the following example for ODIT 614.
ODIT = Stands for Ordinary Diploma in Information and Communications Technology
6 = The first digit stands for the NTA level, in this case Ordinary Diploma which is level six.
1 = The second digit stands for semester, i.e. for semester one.
1 = The last digit stands for the order of the module in the semester. Modules are arranged serially from 1 to the highest number, upon the number of modules in the semester.
97
3.0 GRADING OF ASSESSMENT RESULTS The grading of assessment results is in conformity with the NACTE grading system as follows.
NTA Level 6
Grade Definition Score
A Excellent 75 ─ 100
B+ Very Good 65 ─ 74
C Good 55 ─ 64
D Average 40 ─ 54
F Failure 00 ─ 39
I Incomplete
4.0 AWARDS
The award shall be made to students who satisfy the following conditions.
Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.
5.0 AWARDS CLASSIFICATION:
Awards Classification for NTA level 6
98
Class of Awards Cumulative GPA
First Class 4.4 to 5.0
Upper Second Class 3.5 to 4.3
Lower Second Class 2.7 to 3.4
Pass 2.0 to 2.6
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION
TECHNOLOGY (ODIT)
6.0 SUMMARY FRAMEWORK
QUALIFICATION ORDINARY DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT)
PURPOSE OF
QUALIFICATION
This qualification is intended for persons who will be able to develop and test
programs, program web based applications, manage information systems resources,
plan and manage networks, develop business plans focusing on entrepreneurship
99
and perform audit assignments, analyze how computer components work and
communicate under less supervision.
NTA LEVEL 6
COMPETENCE
LEVEL DESCRIPTOR
The holder of this qualification will be able to apply skills and knowledge to develop
and test programs, program web based applications, manage information systems
resources, plan and manage networks, develop business plans focusing on
entrepreneurship and perform audit assignments, analyze how computer
components work and communicate in a broad range of ICT work activities, most of
which are non-routine and be able to assume operational and some managerial
responsibilities.
CREDITS AT THIS
LEVEL 120
CUMULATIVE
CREDITS AT THIS
LEVEL 240
MAXIMUM NUMBER
OF CREDITS THAT
COULD BE
CONSIDERED FROM 100
LOWEST LEVEL 30
DATE
QUALIFICATION
STANDARD LAST
RVIEWED
NEW
ENTRANCE
REQUIREMENTS
TCIT Level 5
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION
TECHNOLOGY (ODIT)
7.0 PRINCIPAL LEARNING OUTCOMES AND CREDIT VALUES SUMMARY
S/NO PRINCIPAL LEARNING OUTCOMES CREDIT
VALUES
ASSESSMENT CRITERIA
1 Develop, test, debug and run programs using object 15 1.1 Programs using object
101
oriented programming language, C++. oriented programming
language C++ are properly
developed, tested,
debugged, and run.
2 Design and develop database driven Web
Applications
15 2.1 Database driven web
applications are properly
designed and developed
3 Manage Information System Resources in an
organization, evaluate a range of information
systems solutions and examine the social and legal
impacts of developing and implementing information
systems and the role played by Information Systems
(IS) professionals in addressing such issues.
30 3.1 Information systems
resources in an organization
and a range of information
systems solutions are well
managed and evaluated.
3.2 Social and legal impacts
of developing and
implementing information
systems and the role played
by information systems (IS)
professional in addressing
such issues are well
examined.
4 Plan, administer, troubleshoot and manage computer 15 Computer networks and
102
Networks and network equipment. network equipment are
properly planned,
administered, and
troubleshot.
5 Analyze the working of computer components and
their communication to each other.
15 The working of computer
components and their
communication to each
other are well analyzed
6 Apply information systems assurance in developing
business plans focusing on entrepreneurship and
perform audit assignments.
30 6.1 Information systems
assurance in developing
business plans focusing on
entrepreneurship is well
applied
6.2 Audit assignments are
well performed.
TOTAL CREDITS 120
ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION
TECHNOLOGY
8.0 PROGRAM STRUCTURE
103
SEMESTER I
S/NO CODE NAME OF MODULE CREIDT
1 ODIT 611 Computer Architecture 15
2 ODIT 612 Programming in C++ 15
3 ODIT 613 Business Information Systems 15
4 ODIT 614 Entrepreneurship 15
TOTAL CREDITS FOR SEMESTER I 15
SEMESTER II
S/NO CODE NAME OF MODULE CREIDT
1 ODIT 621 Information systems assurance 15
2 ODIT 622 Database driven website design 15
3 ODIT 623 Fundamentals of network administration 15
4 ODIT 624 Project development 15
TOTAL CREDITS FOR SEMESTER I 15
GRAND TOTAL CREDITS FOR NTA LEVEL 6 120
104
9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES
PRINCIPAL
OUTCOMES (NACTE
Standards)
ENABLING OUTCOMES (As Identified
and formulated by Curriculum
Developers)
SUB-ENABLING OUTCOMES
1. Develop, test ,debug
and run programs
using object oriented
programming language,
C++
1.1 Apply Basic principles of C++
program
1.1.1 Describe Structure of a
program
1.1.2 Declare Variables and
Data types.
1.1.3 Apply Constants
1.1.4 Assign Operators in C++
programs
1.1.5 Declare Basic Input/
Output
1.2 Apply Control Structures 1.2.1 Apply Control Structures
in a C++ program
1.2.2 Declare different types of
C++ programs
1.3 Identify different data types 1.3.1 Declare arrays in C++
program
1.3.2 Declare character
105
sequences in c++ program
1.3.3 Declare pointers in C++
program
1.3.4 Allocate dynamic memory in
C++ program
1.3.5 Declare data structures in
C++ program
1.4 Apply Object Oriented Programming
techniques
1.4.1 Declare Classes in C++
program
1.4.2 Declare Friendship and
inheritance
1.4.3 Apply Polymorphism in C+
+ program
1.4.4 Pass message in C++
program
106
2. Design and develop
database driven Web
Applications
2.1 Set up and use a web server 2.1.1 Download and save Apache, PHP,
Mysql or Wamp/ Xamp
2.1.2 Install Apache,PHP, Mysql or Wamp
/ Xamp
2.1.3 Use the web server
2.2 Construct file and directory
handling in PHP
2.2.1 Read and write files
2.2.2 Manipulate API files
2.2.3 Upload and exit file
2.3 Write and test PHP program
and
2.3.1 Apply PHP syntax
2.3.2 Declare variables
107
Connect it to the database 2.3.3 Declare arrays
2.3.4 Declare functions
2.3.5 Declare classes and objects
2.3.6 Declare string operations in PHP
2.4 Develop dynamic interactive
website
2.4.1 Declare website structure
2.4.2 Prepare graphic resources
2.4.3 Design templates, upload
templates and resources
2.4.4 Create all modules and add to
templates
2.4.5 Create pages and forms
3. Manage Information
System Resources in an
3.1 Evaluate the roles of various
types of management information
3.1.1 Discuss the relationship between
the business organization ,processes,
108
organization,
evaluate a range of
information systems solutions
and examine the social and
legal impacts of developing
and implementing
information systems and the
role played by Information
Systems (IS) professionals in
addressing such issues.
systems in business organisations.
.
functions and the associated supporting
management information systems.
3.1.2 Explain appropriate management
information systems for the
range of business functions and
organizational levels.
3.2 Asses the emerging business
technologies,environments and
practices, and their impact on
management information systems.
3.2.1 Assess the impact of new
technology on business processes
and associated management information
systems.
3.2.2 Explain the emerging business
technologies environments and practices
of management information systems.
3.3 Discuss the relationship
between the decision making
process, the organizational
hierarchy and the supporting
management information systems.
3.3.1 Discuss the managerial decision
making process in business.
3.3.2 Explain the relationship between
decision making and management
information systems at different levels of
109
the organization.
3.3.3 Evaluate the importance of
collaborative decision making
environments and review group
management information systems.
3.3.4 Apply the concepts and knowledge
in the management information systems
context.
3.4 Develop awareness of the key
role of management information
systems in facilitating competitive
advantage in business.
3.4.1 Explain the key requirement of
competitive advantage.
3.4.2 Explain competitive advantage in
business
3.4.3 Relate information systems to
business competitive advantages
3.5 Apply Knowledge of security
and control aspects of
management
information systems.
3.5.1 Discuss the risk, security and
control issues associated with
management information systems.
3.5.2 Discuss the control measures for
the risks associated with managing 110
information systems.
3.6 Apply professional approach
to relating management
information
systems to business environments
3.6.1 Review the range of professional issues, which are associated
with business activities and management information systems.
3.6.2 Evaluate business activities that needs information systems support for better performance
4.Plan,
administer ,troubleshoot and
Manage computer Networks
and network equipment
4.1. Describe network hardware
and
software tools
4.1.1 Configure Network Adapter,
Modem
4.1.2 Set Repeater and Bridge
4.1.3 Set Hub and Switch
4.1.4 Connect Wireless Access Point
4.1.5 Configure Router
4.2 Configure network 4.2.1 Configure Address Resolution
111
resources Protocol (ARP)
4.2.2 Configure Internet Control
Message Protocol (ICMP)
4.2.3 Configure BootStrap
Protocal(BOOTP )
4.2.4 Configure(Dynamic Host Control
Protocal) DHCP
4.2.5 Configure Domain Name
System( DNS)
4.2.6 configure Lightweight Directory
Access Protocol ( LDAP)
4.3 Manage network resources 4.3.1 Troubleshoot problems with
computer systems
4.3.2 Assist users to resolve problems
with equipment and data
4.3.3 Plan, design, acquire new or
upgraded hardware and software
4.3.4 Install LAN/WAN and maintain
112
Computer
4.3.5 Apply ISO management model
5. Analyze the working of
computer components and
their communication to each
other
5.1 Describe the Central
Processing Unit (CPU)
5.1.1 Explain the role of CPU
5.1.2 Describe the component parts of
CPU
5.1.3 Describe purpose of instruction
pointer
5.1.4 Describe steps of processing an
instruction
5.2 Describe computer storage
capacities and memory devices
5.2.1 Explain the purpose of memory
cell
5.2.2 Apply RAM and ROM
5.2.3 Identify different types of ROM
5.2.4 Describe storage capacities
113
5.2.5 Differentiate between internal
and external buses
5.3 Describe computer peripherals
devices
5.3.1 Identify different Character
recognition devices
5.3.2 Explain the role of barcodes
5.3.3 Identify different types of Tapes
5.3.4 Identify different types of
magnetic disks
5.3.5 Assess hard disk performance
6. Apply information systems
assurance in develop business
plan focusing on
entrepreneurship and perform
audit assignments
6.1 Apply Auditing standards,
procedures and guideline of auditing
Information Systems Audit
assignments
6.1.1Audit Information Systems
according to required procedures
6.1.2 Conduct an information systems
Risk Assessment and arrange
sequence of functions
6.1.3 Perform audit assignment
114
6.2 Assess effectiveness and
efficiency of, Information Technology
Governance, and Information System
Life Cycle Management in supporting
business operations and continuity.
6.2.1Assess Information Technology
Governance
6.2.2 Assess adherence of Information
Systems development life cycle
management
6.2.3 Conduct Tests to check Business
continuity Management
6.2.4 Conduct test to check
effectiveness of Disaster recovery
planning
6.3 Relate concepts of security in
ensuring information assets of the
business organizations are protected
6.3.1 Ensure Security of Information
assets
6.3.2 Conduct test Security of
procedures and components
6.4 Analyze how information
systems affect/effect the concepts of
entrepreneurship in business
organization
6.4.1 Describe objectives of
entrepreneurship
6.4.2 Analyze entrepreneurship in
115
business organization
6.4.3 Discuss the importance of
information system in
entrepreneurship
6.4.4 Discuss the role of
entrepreneurship concepts in
developing business
10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS
SUB ENABLING
OUTCOME
RELATED TASK ASSESMENT
CRITERIA
ASSESMENT
METHOD
ASSESMENT
INSTRUMENT
S
1.1.1 Describe
Structure of
a program
Declare comments in a C++
program eg; // my first program
in C++
Declare a library function
#include <iostream>
Declare and use namespace std;
Declare the main function ;int
main ()
Structure of a
program is
clearly
described
Exercise,
assignment
Questions
and model
answer.
116
Declare a display function; cout
<< "Hello World!"
1.1.2 Declare
Variables and
Data types.
Identify reserved key words
Describe and declare integers,
boolean, float, character, double
Initialize variables
Variables and
Data types
are correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.1.3 Apply
Constants in C++
program
Identify and declare literals,
integer numbers, float pointers
constants.
Constants are
properly
applied
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.1.4 Assign
Operators in C++
program
Identify different types of
operators; assignment,
arithmetic, compound, increase
and decrease, relational and
equity, logic, conditional,
comma, bitwise, sizeoff,
precedence operators.
Operators in
C++ program
are properly
assigned. Assignments
and class in
demonstration
s
Written
assignments,
model
answer
117
Assign different types of
operators; assignment,
arithmetic, compound, increase
and decrease, relational and
equity, logic, conditional,
comma, bitwise, sizeoff ,
precedence operators.
1.1.5 Declare
Basic Input/
Output in C++
program
Identify and Declare Standard
Output (cout)
Identify Standard Input (cin).
Declare Standard Input (cin)
Basic Input/
Output are
correctly
declared Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.2.1 Apply
Control Structures
in a C++ program
Declare conditional structures
(if…..else), iteration structure
( loops: while, do…while, for…
loop),jump statements, continue
and go to statements.
Apply conditional structures
(if…..else), iteration structure
Control
structures in
C++ program
are properly
applied and
used
Assignments
and class in
demonstration
Written
assignments,
model
118
( loops: while, do…while, for…
loop),jump statements, continue
and go to statements.
s answer
1.2.2 Declare
different
types of C+
+ Functions
Identify and declare different
types of functions: exit, selective
switch, void, passing arguments,
overloaded, inline, recursivity.
Different types
of C++
program are
correctly
declared.
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.3.1 Declare
Arrays
Initialize arrays
Describe multi-dimension arrays
Pass parameters
Access values of an array
Arrays in C++
program are
correctly
declared Assignments
and class in
demonstration
s
Written
assignments,
model
answer
119
1.3.2 Declare
Character
Sequences
Initialize null-terminated
character sequence
Apply null-terminated character
sequence
Character
sequence are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.3.3 Declare
Pointers
Apply reference operator
Apply deference operators
Apply variables of pointer types
Initialize pointers; arithmetic,
void, pointer to pointer, pointer
to function and nully-pointers
Pointers are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.3.4 Allocate
Dynamic Memory
Apply operators new and new[]
Apply operators delete and
delete[]
Apply memory in ANSI-C
Dynamic
memory in C+
+ program are
properly
allocated
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.3.5 Declare
Data Structures
Apply structure_name,
object_name.
Apply pointer to pointer
Apply nesting structure
Apply other data types( typedef)
Data
structures in
C++ program
are correctly
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
120
declared
1.4.1 Declare
Classes
Apply class_name
Apply object_name
Specify private, public/protected
class
Apply class functions:
constructors and
destructors ,overloading and
default
Classes in C++
program are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.4.2 Declare
Friendship
and
inheritance
Apply friend functions
Apply friend class
Apply inheritance between
classes
Apply multiple inheritance.
Friendship and
inheritance are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.4.3 Apply
Polymorphis
m
Declare pointers to base class
Declare virtual members and
abstract base
Polymorphism
in C++
program are
properly
applied
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
1.4.4 Pass
message in
C++
declare message
find object(s) to pass message
find a function to be invoked
Message in C+
+ program is
correctly
Assignments
and class in
demonstration
Written
assignments,
model
121
program passed s answer
2.1.1 Download
and save Apache,
PHP, Mysql or
Wamp/ Xamp
connect to the internet
Download PHP for free :
http://www.php.net/downloads.p
hp
Download MySQL for free :
http://www.mysql.com/download
s/
Download Apache for free :
http://httpd.apache.org/downloa
d.cgi
Apache, PHP,
Mysql or
Wamp/ Xamp
are properly
downloaded
and saved in a
computer
Demonstratio
n and
observation
Written
materials and
list of links
for
downloading
2.1.2 install
Apache,PHP,
Mysql or Wamp /
Xamp
open the Apache/php/mysql
install file you downloaded,
click yes and ok and next and so
forth until you reach the “Server
Information” screen, then
Choose the complete installation
button
Apache, PHP,
Mysql or
Wamp/ Xamp
are properly
installed
Demonstratio
n and
observation
Written
materials.
2.1.3 Use the web
server
install the web server software
on the computer.
assign a domain name.
The web
server is
properly used
Assignments
and class in
demonstration
Written
assignments,
model
122
install antivirus software s answer
2.2.1 Read and
write files
apply PHP-file open: write
apply file fwrite function
apply file-write:overwrite
function
Files are read
and written
properly
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.2.2 Manipulate
API file
view and modify file attributes
read and list directory contents,
alter file permissions,
retrieve file contents into a
variety of native data structures,
search for files based on specific
patterns.
API files are
properly
manipulated
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.2.3 Upload and
exit file
create table upload
upload the data/files
apply fclose() function
Files are
uploaded and
exit
successfully
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
123
2.3.1 Apply PHP
syntax
apply PHP scripting block
apply PHP output text: echo,
apply HTML tags
PHP syntax is
properly
appliedAssignments
and class in
demonstration
s
Written
assignments,
model
answer
2.3.2 Declare
variables
identify the variable name and
value
apply $ to each variable name
declare $var_name = value;
apply Predefined variables
apply Variable scope
Apply Variables from outside
PHP
Variables are
properly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.3.3 Declare
arrays
identify different types of arrays;
Numeric array , Associative
array, Multidimensional array
initialize array
apply array declaration
Arrays are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.3.4 Declare
functions
identify built-in functions and
user defined functions
apply the PHP syntax for
functions:
Functions are
correctly
declared
Assignments
and class in
demonstration
Written
assignments,
model
124
function functionName()
{
code to be executed;
}
apply function calling
User-defined functions
Apply Function arguments
Apply Returning values
Apply Variable functions
s answer
2.3.5 Declare
classes and
objects
Autoload Objects
Apply Constructors and
Destructors
Apply Visibility
Apply Scope Resolution Operator
(::)
Apply Static Keyword
Apply Object Constants
Apply Object Abstraction
Apply Object Interfaces
Apply Overloading
Apply Object Iteration
Apply Patterns
Classes and
Objects are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
125
Apply Magic Methods
Apply Final Keyword
Apply Object cloning
Apply Comparing objects
Apply Reflection
2.3.6 Declare
string operations
in PHP
Apply string concatenation
Apply strlen() function
Apply strps() function
Identify different
operators :arithmetic,
assignment, comparison, and
logic operators
Apply different
operators :arithmetic,
assignment, comparison, and
logic operators
Strings
operations in
PHP are
correctly
declared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.4.1 Declare
website structure
Prepare homepage( index page)
Prepare main section ( site
Web site
structure is
Assignments
and class in
Written
assignments,
126
index)
Prepare subsection( content)
Link between sections.
correctly
declared
demonstration
s
model
answer
2.4.2 Prepare
graphic resources
Explain graphics
Differentiate graphics
Find graphics
Graphic
resources are
properly
prepared
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.4.3 Design
templates, upload
templates and
resources
Explain template
Differentiate templates
Locate template resources
Templates are
properly
designed and
template
resources are
correctly
uploaded
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.4.4 Create all
modules and add
to templates
Define modules
Differentiate modules
Attach modules
All modules
are correctly
created and
added to
templates
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
2.4.5 Create Define form Pages and Assignments Written
127
pages and form Find contents
Explain HTML Tags
forms are
correctly
created
and class in
demonstration
s
assignments,
model
answer
3.1.1 Discuss the
relationship
between the
business
organization,
processes ,functio
ns, and the
associated
supporting
management
information
systems.
Apply the Business Organization and
Supporting Management Information
Systems by:
Identify Systems and Systems
Thinking.
Outline Information systems in
modern organizations.
Discuss Types and
characteristics of systems.
Describe Business processes and
information systems.
Describe Customer Relationship
Management (CRM) and SCM.
Discuss Collaborative commerce.
Discuss Enterprise systems.
Outline Organizations and
information systems.
Discuss Organizations,
procedures, politics and culture.
The
relationship
between the
business
organization ,p
rocesses
functions, and
the associated
supporting
management
information
systems are
thoroughly
discussed
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
128
Discuss Organizational
structures and environments.
Discuss the changing role of
information systems in
organizations.
Discuss Economic and
behavioral effects of information
systems on
organizations.
3.1.2 Explain
appropriate
management
information
systems for the
range of business
functions and
organizational
levels.
Discus Types of Management
Information Systems by analyzing the
types of management information
systems by level and function:
operational level
knowledge level
management level
strategic level.
Appropriate
management
information
systems for
the range of
business
functions and
organizational
levels are
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
129
clearly
explained
3.2.1 Assess the
impact of new
technology on
business
processes
and associated
management
information
systems.
Discus E-commerce, e-business
and information systems.
Discus Internet technology and
the digital firm.
Discus New business models.
Discus Categories of e-
commerce.
Analyse Customer-centred
retailing.
The impact of
new
technology on
business
processes and
associated
management
information
systems is
correctly
assessed.
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
3.2.2 Explain the
emerging
business
technologies
environments and
practices of
management
information
Discus Business-to-Business
(B2B).
Discus E-business and the digital
firm.
Discus Challenges and
opportunities of e-commerce.
The emerging
business
technologies
environments
and practices
of
management
information
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
130
systems systems are
clearly
explained
3.3.1 Discuss the
managerial
decision making
process in
business.
Discuss how to Manage the
organization.
Discuss Models and roles of
management.
Discuss Management decision
making.
Discuss Process, stages and
models of decision making.
Discuss Information systems and
business strategy.
Discuss Strategic information
systems.
Discuss the value chain model.
Discuss Firm and industry level
strategy and information
systems.
The
Managerial
decision
making
process in
business is
thoroughly
discussed.
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
131
3.3.2 Explain the
relationship
between decision
making and
management
information
systems at
different levels of
the organization.
Discuss the Decision Making and
Management Information
Systems at Different Levels in
the Organization: Decision
Support Systems (DSS),Types of
DSS, Components of a DSS,DSS
applications, Modeling, planning
and control, Executive support
systems (ESS),Role, benefits and
success factors of ESS.
The
relationship
between
decision
making and
management
information
systems is
clearly
explained at
different levels
of an
organization
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
3.3.3 Evaluate the
importance of
collaborative
decision making
environments and
review group
management
information
Discuss the Collaborative Decision
Making Processes: Collaborative
working, Group Decision Support
Systems (GDSS), Factors for success in
enhanced collaborative decision
making.
The
importance of
collaborative
decision
making
environments
is correctly
evaluated and
review group
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
132
systems. management
information
Systems is
correctly
evaluated
3.3.4 Apply
concepts and
knowledge
management in
the management
information
systems context.
Discuss Knowledge and
knowledge management.
Discuss Systems and
infrastructure for knowledge
management.
Discuss Information and
knowledge work systems.
Discuss Enterprise knowledge
environments.
Discus Business intelligence and
enterprise reporting and
analysis.
The concepts
and knowledge
management
are properly
applied in the
management
information
systems
context .
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
3.4.1 Explain the
key requirement
of competitive
Discuss the Competitive
Advantage as a Driver for
Management Information
The key
requirements
of competitive
Assignments
and class in
demonstration
Written
assignments,
model
133
advantage . Systems: Information systems
for competitive advantage, SCM
and ERP, Organizational design,
Business value of
information ,Managing change
and implementation.
advantage are
clearly
explained
s answer
3.5.1 Discuss the
risk, security and
control issues
associated with
management
information
systems.
Discus Systems integrity and risk
assessment.
Discuss Information systems
security and control.
Discuss Systems vulnerability
and abuse.
Discuss Systems quality
problems.
Discuss Control environments.
Discuss Internet security
challenges.
Discuss Ensuring systems
quality.
Discus Disaster recovery and
business continuity planning.
The risk,
security and
control issues
associated
with
management
information
systems are
thoroughly
discussed.
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
3.5.2 Discuss the
control measures
Discuss risk control measures
Discuss information systems
The control
measures for
Assignments Model
134
for the risks
associated with
managing
information
systems.
vulnerability control
Discuss information system
security control
the risks
associated
with managing
information
systems are
thoroughly
discussed
answers
3.6.1 Review the
range of
professional
issues, which are
associated
with business
activities and
management
information
systems.
Discuss Privacy and how this is
managed.
Discuss Intellectual property
issues.
Discus Codes of conduct and
professional practice.
The range of
professional
issues, which
are associated
with business
activities and
management
information
systems are
correctly
reviewed
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
3.6.2 Evaluate
business activities
that needs
information
Discuss business activities
Discuss information systems
Relate business activities to the
information systems supporting
The business
activities that
needs
information
assignments Model
answers
135
systems support
for better
performance
them
Discuss organizational
performance
systems
support for
better
performance
are
correctively
evaluated
4.1.1 Configure
Network Adapter
and Modem
Identify Compatible modem,
Ethernet card, sound card or
other PCI card.
Cross-point (Philips) Screwdriver
suitable for your PC case.
Use Fixing screw (usually comes
with the case).
Use Anti-Static Wrist-strap (if
available)
Locate the PCI slots
Network
Adapter and
Modem are
correctly
configured
Assignments
and class in
demonstration
s
Written
assignments,
model
answer
4.1.2 Set up
Repeaters and
Bridges
Enter global configuration mode.
Enter interface configuration mode for
the radio interface
Create the SSID that the repeater uses to
Repeaters and
bridges are
correctly set
Assignments
and class in
demonstration
Written
assignments,
model
136
associate to a root access point
Designate the SSID as an infrastructure
SSID
Exit SSID configuration mode and return
to radio interface configuration mode
Set the access point's role in the wireless
LAN to repeater.
Return to privileged EXEC mode.
up s answer
4.1.3 Set up Hub
and Switch
Find the WAN or uplink port of
the Ethernet hub.
Connect an Ethernet cable from
the WAN port of the hub to
either the Ethernet port of the
internet modem or, if expanding
a network, to an empty LAN port
on the existing network’s router,
switch or hub.
Plug an Ethernet cable into one
of the LAN ports on the Ethernet
hub and connect the other end
of cable to the computer
Hubs and
switches are
correctly
set up
Demonstratio
n and
observation
Written
materials.
137
Power up the Ethernet hub and
the computers or other devices
attached to it.
Configure the network settings
on each connected computer.
Verify that all computers can
access the network and the
Internet if connected
4.1.4 Connect
Wireless Access
Point and
configure
Find the IP addresses of
your existing gateway/router and
clients
Connect to your router
administration interface to find
the DHCP range
Connect a computer to
the wireless router/AP
Configure the wireless router /
AP
Test admin page is reachable
and secure the AP
Test the AP wireless connection
Wireless
Access Point is
correctly
connected and
configured
Demonstratio
n and
observation
Written
materials.
4.1.5 configure IDENTIFY different modes; user Router is Demonstratio Written
138
Router EXEC ,privileged EXEC, global
config ,interface config, setup
Enter the model ;user ,privileged
EXEC
Enter the configuration mode
Configure the IP address
Configure the routing protocol
Open shortest path first (OSPF)
Create the IGRP Routing Process
Enable and configure BGP
Routing
correctly
configured
n and
observation
materials.
4.2.1 Configure
ARP
Define a Static ARP Cache Entry,
Enable Proxy ARP,
Configure DAGR,
Configure ARP purge-delay
Configure ARP timeout
ARP is
correctly
configured
Demonstratio
n and
observation
Written
materials.
4.2.2 Configure
ICMP
Allow ping ICMP Echo-Request
outbound and Echo-Reply
messages inbound.
ICMP is
correctly
configured
Demonstratio
n and
observation
Written
materials.
139
Allow traceroute TTL-Exceeded
and Port-Unreachable messages
inbound.
Allow path MTU ICMP
Fragmentation-DF-Set messages
inbound.
Block other types of ICMP traffic
4.2.3 Configure
BOOTP
Chose and Decide the values
that you want in the BOOTP
packet reply fields:
Choose and Decide the list of
options and their values that you
want returned to the BOOTP
client
Set values in the policy you
want associated with the BOOTP
request:
Enable the associated scope or
scopes for BOOTP processing.
Enable dynamic BOOTP
processing if you want to have
this scope provide an address for
any BOOTP client that requests
BOOTP is
correctly
configured
Demonstratio
n and
observation
Written
materials.
140
one
4.2.4 Configure
DHCP
Configure a database agent and
disable conflict loggins
Exclude IP addresses
Configure a DHCP address pool
DHCP is
correctly
configured
Demonstratio
n and
observation
Written
materials.
4.2.5 Configure
DNS
Choose a Domain name
Enable The Boot File
Start the named Daemon
Test the DNS Configuration
DNS is
correctly
configured
Demonstratio
n and
observation
Written
materials.
4.2.6 Configure
LDAP
Locate the LDAP configuration
files
add the appropriate files to your
server configuration
Restart the server
Edit the containers.ldif file in
order to include the correct LDAP
suffix for your directory
Use the ldapadd command to
add the containers. Use a bind
DN that has the appropriate
permissions.
LDAP is
correctly
configured
Demonstratio
n and
observation
Written
materials.
4.3.1 Verify connections
Ensure compatibilities of added
Problems with
computer
Demonstratio
n and
Written
141
Troubleshoot
problems with
computer systems
devices in a network
Verify functionalities of network
devices
Verify correct protocols are
installed in a computer
Ensure the firewall ports are
open
Use troubleshooting tools: ping,
ifconfig ,arp, snoop,
ndd,netstat, traceroute
systems are
properly
troubleshot.
observation materials.
4.3.2 Assist users
to resolve
problems with
equipment and
data
Set up the same IP scheme (e.g.
192.168.0.x).
Make sure you have the same
Subnet Mask, Gateway, and DNS
IP addresses
Make sure you can ping the
other computers by IP ADDRESS
and name
Make sure you have the same
workgroup name (watch for
trailing spaces)
With Windows2000, XP and
Vista, make sure you have the
Users are
assisted to
resolve
problems with
equipment and
data
satisfactorily
Demonstratio
n and
observation
Written
materials.
142
same username and password
as the person logging onto the
other computers. The default
setting for all but the Home
Versions is to require a password
for network access
Remove any unnecessary
firewalls, protocols or other
configurations the complicate
the troubleshooting process. You
can add them back in later after
you get things working.
4.3.3 Plan,
design, acquire
new or upgraded
hardware and
software
Identify different versions of
software to be used in upgrading
the network
Identify different hardware to be
used in the upgrading
Plan and design the network
New upgraded
hardware and
software are
properly
planned,
designed and
acquired.
Exercise,
assignment
Questions
and model
answer.
4.3.4 Install
LAN/WAN and
Choose LAN/WAN design
considerations
LAN/WAN is
correctly
Demonstratio
n and
Written
143
maintain
Computer
Identify hub, switch, repeater,
router to be used
Identify cables: UTP/STP ,Coax,
macro wave
Identify IP address, subnet mask,
default gateway, DHCP, proxy
server
Design a switched LAN
installed and
computer
properly
maintained
observation materials.
4.3.5 Apply ISO
management
model
Describe application layer
Describe presentation layer
Describe session layer
Describe transport layer
Describe network layer
Describe data link layer
Describe physical layer
ISO
management
model is
properly
applied
Exercise,
assignment
Questions
and model
answer.
5.1.1 Explain the
role of CPU
Describe the functions of CPU
Describe different types of
processors
The role of
CPU is clearly
explained
Exercise,
assignment
Questions
and model
answer.
5.1.2 Describe
the component
parts of CPU
Identify control unit
Identify ALU
Identify RAM
The CPU
components
are clearly
Exercise,
assignment
Questions
and model
144
Identify registers described answer.
5.1.3 Describe
purpose of
instruction pointer
Identify how the computer is in
instruction instruction sequence
The purpose of
instruction
pointer is
clearly
described
Exercise,
assignment
Questions
and model
answer.
5.1.4 Describe
steps in
processing an
instruction
Identify and describe instruction
fetch
Identify and describe instruction
decode
Identify and describe instruction
execution
Identify and describe
instruction/data storage
Steps of
processing an
instruction are
clearly
described
Exercise,
assignment
Questions
and model
answer.
5.2.1 explain the
purpose of
memory cell
Identify cache memory
Identify flash BIOS memory
Describe memory address
The purpose of
memory cell is
clearly
described.
Exercise,
assignment
Questions
and model
answer.
5.2.2 apply RAM Describe the functions and uses RAM and ROM Exercise, Questions 145
and ROM of RAM
Describe the functions and use
of ROM
are properly
applied.
assignment and model
answer.
5.2.3 Identify
different types of
ROM
Describe Mask-Programmed
ROM (MROM)
Describe Programmable ROM
(PROM)
Describe Erasable-
Programmable ROM (EPROM).
Describe Electrically Erasable
PROM (EEPROM)
Different types
of ROM are
correctly
identified.
Exercise,
assignment
Questions
and model
answer.
5.2.4 Describe
storage capacities
Analyse the storage capacity of
bit
Analyse the storage capacity of
byte
Analyse the storage capacity of
word
Analyse the storage capacity of
kilobyte(KB)
Analyse the storage capacity of
Storage
capacities are
clearly
described
Exercise,
assignment
Questions
and model
answer.
146
megabyte (MB)
Analyse the storage capacity of
gigabyte (GB)
Analyse the storage capacity of
terabyte (TB)
5.2.5 differentiate
internal and
external buses
Describe internal/external
parallel bus
Describe internal/external serial
bus
Describe self-repaired internal
bus
Describe: PCI,PCI-
EXPRESS,AGP,USB,FIREWIRE
PS/2
Internal and
external buses
are clearly
differentiated
Exercise,
assignment
Questions
and model
answer.
5.3.1 Identify
different
Character
recognition
devices
Describe the OCR
Describe the MCR
Describe the MICR
Different
character
recognition
devices are
correctly
identified.
Exercise,
assignment
Questions
and model
answer.
5.3.2 Explain the discus different barcode symbols
discuss different scanning
The role of bar
code reader is
Exercise, Questions
and model
147
role of barcodes devices
Discuss the functions of barcode
readers
clearly
explained.
assignment answer.
5.3.3 Identify
different types of
magnetic Tapes
Describe open pool tape
Describe cassette tapes
Describe tape cartridges
Different types
of magnet
tapes are
clearly
identified
Exercise,
assignment
Questions
and model
answer.
5.3.4 Identify
different types of
magnetic disks
Describe hard disk
Describe floppy disks
Different types
of magnetic
disks are
correctly
identified
Exercise,
assignment
Questions
and model
answer.
5.3.5 Asses hard
disk performance
Explain latency
Explain seek time
Explain transfer rates
Hard disk
performance is
correctly
assessed.
Exercise,
assignment
Questions
and model
answer.
6.1.1Audit
Information
Systems
according to
required
Explain different categories of
Audit assignment
Obtaining and recording an
understanding of the audit
Information
systems are
properly
audited
according to
Exercise,
assignment
Questions
and model
answer.
148
procedures area/subject
Explain sources of information
for tests.
required
procedures.
6.1.2 Conduct
information
systems Risk
Assessment and
arrange sequence
of functions
Perform Compliance test
Perform Substantive test
Develop Audit plan according to
risk level
Gather and assess Evidence
Produce report
Present report to Communicate
results
Risk
assessment for
information
systems is
properly
conducted and
sequence of
functions
properly
arranged.
Exercise,
assignment
Questions
and model
answer.
6.1.3 Perform
audit assignment
Produce detailed audit plan
Preliminary review of the audit
area/subject
Evaluating the audit area/subject
Reporting (communicating
results)
Audit
assignments
are correctly
performed
Exercise,
assignment
Questions
and model
answer.
6.2.1Assess Explain existing standards for Information Exercise, Questions 149
Information
Technology
Governance
effective Information Technology
Governance
Evaluate sufficiency of
Information systems policy and
Procedures
Evaluate adherence of the
procedures to the to regulatory
standards
Assess effectiveness of available
resources to satisfy required
obligations.
Technology
Governance is
correctly
assessed
assignment and model
answer.
6.2.2 Assess
adherence of
Information
Systems
development life
cycle
management
Evaluate procedures for
Information Systems Life Cycle
Management
Explain procedures for
Explain procedures for systems
testing
Evaluate sufficiency of real life
test to the standard test
procedure
Adherence of
Information
Systems
development
life cycle
management
is correctly
assessed.
Exercise,
assignment
Questions
and model
answer.
150
6.2.3 Conduct
Tests to check
Business
continuity
Management
Explain components of business
continuity plan
Develop a business continuity
plan
Explain decision criteria of levels
of risk for business continuity.
Test business continuity plan
Business
continuity
Management
tests are
properly
conducted
Exercise,
assignment
Questions
and model
answer.
6.2.4 Conduct
test to check
effectiveness of
Disaster recovery
planning
Explain components of Disaster
recovery plan
Evaluate roles of key players of
disaster recovery plan
Explain recovery strategy
Test practical disaster recovery
plan
Test to check
effectiveness
of disaster
recovery
planning is
properly
conducted
Exercise,
assignment
Questions
and model
answer.
6.3.1Ensure
Security of
Information
assets
Explain concepts of
Confidentiality, Integrity, and
Availability
Assess different categories of
physical and logical access
controls.
Security of
information
assets is
correctly
assessed
Exercise,
assignment
Questions
and model
answer.
151
Explain Public Key
Infrastructures and applicability
to information assets protection
6.3.2 Conduct test
of Security
procedures and
components
Develop procedures for
classifying information assets
Test controls to evaluate
sufficiency of security of real
business case
Test on
Security
procedures
and
components
are properly
conducted.
Exercise,
assignment
Questions
and model
answer.
6.4.1 Describe
objectives of
entrepreneurship
Explain background to
entrepreneurship
Define entrepreneurship
Objectives of
entrepreneurs
hip are
properly
described
Assignment,
class
exercises
Model
answers,
checklist
6.4.2 Analyze
entrepreneurship
in business
organization
List categories of businesses
Mention characteristics of
entrepreneurship
Entrepreneurs
hip in business
organization is
properly
analyzed
Assignment,
class
exercises
Model
answers,
checklist
6.4.3 Discuss the Define information system The Assignment, Model 152
importance of
information
system in
entrepreneurship
Assess relationship between
information systems and the
activities of the business
importance of
information
system in
entrepreneurs
hip is properly
discussed
class
exercises
answers,
checklist
6.4.4 Discuss the
role of
entrepreneurship
concepts in
developing
business
Describe entrepreneurship
concepts
Discuss different types of
businesses
Identify sources of business
finance
The role of
entrepreneurs
hip concepts in
developing
business is
properly
discussed
Assignment,
class
exercises
Model
answers,
checklist
153
11.0 BENCHMARKING OF ASSESMENT CRITERIA
ASSESMENT CRITERIA SATISFACTORY GOOD EXCELLENT
1.1.1 Structure of a program is
clearly described.
Declares comments in a C++
program , library function
and use namespace std;
Declares comments in a
C++ program ,library
function and gives
example #include
<iostream>,declares
and uses namespace
std;and declares the
main function ;int main
()
Declares comments, library
function #include <iostream> in a
C++ program declares and uses
namespace std;main function ;int
main (), and displays function;
cout << "Hello World!"
1.1.2 Variables and data types
are correctly declared
Identifies reserved key
words, describes and
declares integers.
Identifies reserved key
words, Describe and
declare integers,
Boolean, float,
character, double.
Identifies reserved key words,
describes and declare integers,
boolean, float, character, double,
and initializes variables
1.1.3 Constants are correctly
identified and declared
Identifies and declare
literals
Identifies and declare
literals, integer
Identifies and declare literals,
integer numbers, float pointers
154
numbers. constants.
1.1.4 Operators in C++ program
are correctly assigned.
Identifies different types of
operators; e.g. assignment,
arithmetic, compound,
increase and decrease.
Identifies different types
of operators;
assignment, arithmetic,
compound, increase and
decrease, relational and
equity, logic,
conditional, comma,
bitwise, sizeoff, and
precedence operators.
Identifies different types of
operators; assignment, arithmetic,
compound, increase and
decrease, relational and equity,
logic, conditional, comma, bitwise,
sizeoff, precedence operators.
Assign different types of
operators; assignment,
arithmetic, compound,
increase and decrease,
relational and equity, logic,
conditional, comma, bitwise,
sizeoff, and precedence
operators.
1.1.5 Basic Input/ Output are
correctly identified and
declared
Identifies Standard Output
(cout).
Identifies Standard
Output (cout) and
Standard Input (cin).
Identifies and declares Standard
Output (cout), identifies and
declares Standard input (cin).
155
1.2.1 Control structures in C++
program are properly
applied and used
Declares some conditional
structures (if…..else),
iteration structure ( loops:
while, do…while, for…loop.
Declares more
conditional structures
(if…..else), iteration
structure (loops: while,
do…while, for…loop),
jump statements,
continue and go to
statements.
Declares wide range of conditional
structures (if…..else), iteration
structure (loops: while, do…while,
for…loop), jump statements,
continue and go to statements,
and applies conditional structures
(if…..else), iteration structure
(loops: while, do…while, for…
loop), jump statements, continue
and go to statements.
1.2.2 Different types of C++
program are correctly
declared.
Identifies some types of
functions: exit, selective
switch, void.
Identifies more different
types of functions: exit,
selective switch, void,
passing arguments,
overloaded, inline,
recursivity.
Identifies and declares more
different types of functions: exit,
selective switch, void, passing
arguments, overloaded, inline,
recursivity.
1.3.1 Arrays in C++ program
are properly declared
Initializes arrays and
describes multi-dimension
arrays
Initializes arrays,
describes multi-
dimension arrays, and
passes parameters
Initializes arrays, describes multi-
dimension arrays, Pass
parameters and
156
Accesses values of an array
1.3.2 Character sequences are
correctly declared
Initializes null-terminated
character sequence
Initializes null-
terminated character
sequences, and applies
null-terminated
character sequence
Initialize null-terminated
character sequence thoroughly,
and Applies null-terminated
character sequence very correctly
1.3.3 Pointers are correctly
declared
Applies reference operator,
and deference operators
Applies reference
operator, and deference
operators and variables
of pointer types
Applies: reference operator,
deference operators, variables of
pointer types and initializes
pointers; arithmetic, void, pointer
to pointer, pointer to function
and nully-pointers
1.3.4 Dynamic memory in C++
program are properly
allocated
Applies operators new and
new[]
Applies operators
new and new[],
and
operators delete,
and delete[]
Applies operators new and new[],
operators delete, and delete[],
and also memory in ANSI-C
1.3.5 Data structures in C++
program are correctly
Applies structure_name,
object_name, and pointer to
Applies structure_name,
object_name, pointer to
Applies structure_name,
object_name, pointer to pointer, 157
declared pointer pointer and also nesting
structure
nesting structure also
Applies other data types(
typedef)
1.4.1 Classes in C++ program
are correctly declared
Applies class_name,
object_name, and specifies
private class
Applies class_name,
object_name, and
specifies private,
public/protected classes
Applies class_name, object_name,
Specifies private, public/protected
class and also class functions:
constructors and destructors
, overloading and default.
1.4.2 Friendship and inheritance
are correctly declared
Applies friend functions, and
friend class
Applies friend functions,
friend class, and
inheritance between
classes
Applies friend functions, friend
class, inheritance between
classes, and also applies multiple
inheritance.
1.4.3 Polymorphism in C++
program are correctly
applied
Declares pointers to base
class
Declares pointers to
base class, virtual
members
Declare pointers to base class,
virtual members and also abstract
base
1.4.4 Message in C++ program
are correctly passed
declares message declares message, and
finds object(s) to pass
declares message, finds object(s)
to pass message, and finds a
158
method function to be invoked
2.1.1 Apache, PHP, Mysql or
Wamp/ Xamp are properly
downloaded and saved in
a computer
Connects to the internet,
downloads PHP for free :
http://www.php.net/downloa
ds.php
Connects to the internet,
downloads PHP for free :
http://www.php.net/dow
nloads.php, MySQL for
free :
http://www.mysql.com/d
ownloads/
Connects to the internet
downloads PHP for free :
http://www.php.net/downloads.ph
p ,
Downloads MySQL for free :
http://www.mysql.com/downloads
/ , and
Downloads Apache for free :
http://httpd.apache.org/download.
cgi
2.1.2 Apache, PHP, Mysql or
Wamp/ Xamp are properly
installed
opens the Apache/php/mysql
installs file downloaded,
opens the
Apache/php/mysql
installs file downloaded,
reaches the “Server
Information” screen
during downloading
opens the Apache/php/mysql and
installs the file downloaded,
reaches the “Server Information”
screen, then
chooses the complete installation
button.
159
2.1.3 The web server is properly
used
Installs the web server
software on the computer.
installs the web server
software on the
computer, and assigns a
domain name.
installs the web server software
on the computer, assigns a
domain name and also
installs antivirus software
2.2.1 Files are read and written
properly
applies PHP-file open: write,
file fwrite function
applies PHP-file open:
write, file fwrite
function, file-
write:overwrite function
applies PHP-file open: write, file
fwrite function, file-
write:overwrite function and also
applies the above in reading
too
2.2.2 API files are properly
manipulated
views and modifies file
attributes, reads and lists
directory contents,
views and modifies file
attributes, reads and
lists directory contents,
alters file permissions,
views and modifies file attributes,
reads and lists directory contents,
alters file permissions, retrieves
file contents into a variety of
native data structures, searches
for files based on specific
patterns.
160
2.2.3 Files are uploaded and
exited successfully
creates table upload creates table upload,
uploads the data/files
creates table upload, uploads the
data/files, and applies fclose()
function
2.3.1 PHP syntax is properly
applied
applies general PHP scripting
block
applies PHP scripting
block, applies PHP
output text: e.g. echo
Applies PHP scripting block, PHP
output text: .e.g. echo,
print, HTML tags
2.3.2 Variables are properly
declared
identifies the variable name
and value, applies $ to each
variable name, declares
$var_name = value;
identifies the variable
name and value, applies
$ to each variable name,
declares $var_name =
value; and applies
Predefined variables
identifies the variable name and
value, applies $ to each variable
name, declares $var_name =
value; applies predefined
variables, applies Variable scope,
and applies variables from outside
PHP
2.3.3 Arrays are correctly
declared
identifies different types of
arrays; Numeric array ,
Associative array,
identifies different types
of arrays; Numeric
array , Associative
array, Multidimensional
identifies different types of arrays;
Numeric array , associative array,
multidimensional array, initializes
array and also applies array 161
Multidimensional array array
initializes array,
declaration
2.3.4 Functions are correctly
declared
identifies built-in functions
and user defined functions,
applies the PHP syntax for
functions:
function functionName()
{
code to be executed;
}
identifies built-in
functions and user
defined functions,
applies the PHP syntax
for functions:
function functionName()
{
code to be executed;
},
applies function calling,
User-defined functions
identifies built-in functions and
user defined functions, applies the
PHP syntax for functions:
function functionName()
{
code to be executed;
},
applies function calling, User-
defined functions, Applies
Function arguments, Applies
Returning values, Applies Variable
functions.
2.3.5 Classes and objects are Auto loads Objects, Applies Autoload Objects, Autoload Objects, Applies
162
correctly declared the following Constructors
and Destructors, Applies
Visibility, Scope Resolution
Operator (::), Static Keyword,
Comparing objects and
Reflection
Applies: Constructors
and Destructors,
Visibility, Scope
Resolution Operator (::),
Static Keyword, Object
Constants, Applies
Object Abstraction,
Object Interfaces,
Overloading, Object
Iteration, and applies
Patterns.
Constructors and Destructors,
Visibility, Scope Resolution
Operator (::), Static Keyword,
Object Constants, Object
Abstraction, Object Interfaces,
Overloading, Object Iteration,
Patterns, Magic Methods, Final
Keyword, Object cloning,
Comparing objects and Reflection
2.3.6 Strings operations in PHP
are correctly declared
Applies: string
concatenation, strlen()
function, strps() function
Applies:
string concatenation,
strlen() function, strps()
function,
Identifies different
operators :arithmetic,
assignment,
comparison, and logic
Applies: string concatenation,
strlen() function, strps() function,
Identifies: different
operators :arithmetic, assignment,
comparison, and logic operators,
and also applies different
operators :arithmetic, assignment,
comparison, and logic operators
163
operators.
2.4.1 Web site structure is
correctly declared
Prepares homepage( index
page), main section ( site
index)
Prepares
homepage( index page),
main section ( site
index), and
subsection( content)
Prepares homepage( index page),
main section ( site index),
subsection( content) and links
between sections.
2.4.2 Graphic resources are
properly prepared
Explains graphics. Explains graphics and
differentiate graphics.
Explains graphics, differentiates
graphics, and finds graphics.
2.4.3 Templates are properly
designed and template
resources are correctly
uploaded
Explains template. Explains template,
differentiate templates,
and locate template
resources.
Explains template, differentiates
templates, and locates template
resources.
2.4.4 All modules are correctly
created and added to
templates
Defines modules. Defines modules and
differentiate modules.
Define modules, differentiate
modules, and attach modules
164
2.4.5 Pages and forms are
correctly created
Defines form. Defines form, and finds
contents.
Defines form, finds contents, and
explains HTML Tags
3.1.1 The relationship between
the business
organization ,processes
and functions and the
associated supporting
management information
systems are thoroughly
discussed
Applies the Business
Organization and Supporting
Management Information
Systems by:
Identifying Systems and
Systems Thinking, Outline
Information systems in
modern organizations,
discusses types and
characteristics of systems.
Describe: Business processes
and information systems,
Customer Relationship
Management (CRM) and
SCM.
Discusses Collaborative
Applies the Business
Organization and
Supporting Management
Information Systems by:
Identifying Systems and
Systems Thinking,
Outlining, Information
systems in modern
organizations.
Discusses types and
characteristics of
systems.
Describes business
processes and
information systems,
Customer relationship
Applies the Business Organization
and Supporting Management
Information Systems by:
Identifying Systems and Systems
Thinking, Outlining Information
systems in modern organizations,
discussing types and
characteristics of systems,
Describing business processes and
information systems, Customer
Relationship Management (CRM)
and SCM, Discussing Collaborative
commerce, Enterprise systems.
Also
Outlining Organizations and
information systems.
165
commerce. Management (CRM) and
SCM.
Discusses: Collaborative
commerce, Enterprise
systems.
Outline Organizations
and information
systems, and
Organisations,
procedures, politics and
culture.
Discussing Organizations,
procedures, politics and culture,
Organizational structures and
environments, The changing role
of information systems in
organizations, Economic and
behavioral effects of information
systems on
organizations.
3.1.2 Appropriate management
information systems for
the range of business
functions and
organizational levels are
appropriately explained
Mentions Types of
Management Information
Systems by analyzing the
type of management
information systems by level
and function:operational and
knowledge levels
Mentions Types of
Management
Information Systems by
analyzing the types of
management
information systems by
level and function:
Discuss Types of Management
Information Systems by analyze
the types of management
information systems by level and
function:
operational level, knowledge level,
management level, strategic level.
166
operational level,
knowledge level,
management level,
strategic level.
3.2.1 The impact of new
technology on business
processes and associated
management information
systems is correctly
assessed
Discusses E-commerce, e-
business and information
systems, Internet technology
and the digital firm, New
business models, Categories
of e-commerce.
Discusses E-commerce,
e-business and
information systems,
Internet technology and
the digital firm, New
business models,
Categories of e-
commerce, Analyse
Customer-centred
retailing, Business-to-
Business (B2B).
Discusses E-commerce, e-business
and information systems, Internet
technology and the digital firm,
New business models, Categories
of e-commerce, analyse
Customer-centred retailing,
Business-to-Business (B2B), E-
business and the digital firm,
Challenges and opportunities of e-
commerce.
3.2.2 The emerging business
technologies environments
and practices of
management information
Discusses business-to-
business (B2B) business.
Discusses business-to-
business (B2B) business,
electronic business (e-
Discusses business-to-business
(B2B) business, electronic
business (e-business) and the
digital firm, and challenges and 167
systems are clearly
explained
business). opportunities of e-commerce.
3.3.1 Managerial decision
making processes in
business are thoroughly
discussed.
Discusses how to Manage
the organization, Models and
roles of management,
Management decision
making, Process, stages and
models of decision making.
Discusses how to
Manage the
organization, Models and
roles of management,
Management decision
making, Process, stages
and models of decision
making.
Discuss Information
systems and business
strategy, Strategic
information systems,
and the value chain
model.
Discusses how to Manage the
organization, Models and roles of
management, Management
decision making, Process, stages
and models of decision making.
Discuss Information systems and
business strategy, Strategic
information systems, the value
chain model, Firm and industry
level strategy and information
systems.
3.3.2 The relationship between Explains briefly the Decision Discusses generally the Discuss the Decision Making and
168
decision making and
management information
systems is clearly
explained at different
levels of an organization
Making and Management
Information Systems at
Different Levels in the
Organization.
Decision Making and
Management
Information Systems at
Different Levels in the
Organization :Decision
Support Systems
(DSS),Types of DSS,
Components of a
DSS,DSS applications.
Management Information Systems
at Different Levels in the
Organization: Decision Support
Systems (DSS), Types of DSS,
Components of a DSS, DSS
applications, Modeling, planning
and control, Executive support
systems (ESS),Role, benefits and
success factors of ESS.
3.3.3 The importance of
collaborative decision
making environments and
review group management
information
Systems is correctly
evaluated
Discusses briefly the
Collaborative Decision
Making Processes:
Collaborative working, Group
Decision Support Systems
(GDSS).
Discusses the
Collaborative Decision
Making Processes:
Collaborative working,
Group Decision Support
Systems (GDSS), Factors
for success in enhanced
collaborative decision
making.
Discusses at lengthy the
Collaborative Decision Making
Processes: Collaborative working,
Group Decision Support Systems
(GDSS), Factors for success in
enhanced collaborative decision
making.
3.3.4 The concepts and
knowledge and knowledge
management are properly
applied in the
Mentions knowledge and
knowledge management
elements, Systems and
infrastructure for knowledge
Discusses Knowledge
and knowledge
management, Systems
and infrastructure for
Discusses Knowledge and
knowledge management, Systems
and infrastructure for knowledge
management, Information and
169
management information
systems context
management. knowledge
management,
Information and
knowledge work
systems, Enterprise
knowledge
environments.
knowledge work systems,
Enterprise knowledge
environments, Business
intelligence and enterprise
reporting and analysis.
3.4.1 The key requirements of
competitive advantage are
clearly explained
Mentions the Competitive
Advantage as a Driver for
Management Information
Systems.
Mentions and explains
the Competitive
Advantage as a Driver
for Management
Information Systems:
Information systems for
competitive advantage,
SCM and ERP,
Organizational design.
Discusses the Competitive
Advantage as a Driver for
Management Information
Systems: Information systems for
competitive advantage, SCM and
ERP, Organizational design,
Business value of
information ,Managing change
and implementation.
3.5.1 The risk, security and
control issues associated
with
Mentions the following:
Systems integrity and risk
assessment, Information
systems security and control,
Mentions the following:
Systems integrity and
risk assessment,
Information systems
Discusses the following: Systems
integrity and risk assessment,
Information systems security and
control, Systems vulnerability and
170
Management information
systems are thoroughly
discussed.
Systems vulnerability and
abuse, Systems quality
problems, Control
environments, Internet
security challenges, Ensuring
systems quality, and Disaster
recovery and business
continuity planning.
security and control,
Systems vulnerability
and abuse, Systems
quality problems,
Control environments.
abuse, Systems quality problems,
Control environments, Internet
security challenges, Ensuring
systems quality, and Disaster
recovery and business continuity
planning.
3.5.2 The control measures for
the risks associated with
managing information
systems are thoroughly
discussed
Discusses risk control
measures.
Discusses risk control
measures, and
information systems
vulnerability control.
Discusses risk control measures,
information systems vulnerability
control, and information system
security control.
3.6.1 The range of professional
issues, which are
associated
with business activities
and management
information systems are
correctly reviewed
Discusses privacy and how
this is managed.
Discusses privacy and
how this is managed,
and intellectual property
issues.
Discusses privacy and how this is
managed, Intellectual property
issues and Codes of conduct and
professional practice.
3.6.2 The business activities Discusses business activities, Discusses business Discusses business activities,
171
that needs information
systems support for better
performance are
correctively evaluated
information systems. activities, information
systems, and relate
business activities to the
information systems
supporting them.
information systems, and relate
business activities to the
information systems supporting
them, and organizational
performance.
4.1.1 Network Adapter, Modem
are correctly configured
Identifies Compatible
modem, ethernet card,
sound card or other PCI card.
Identifies Compatible
modem, ethernet card,
sound card or other PCI
card, Cross-point
(Philips) Screwdriver
suitable for your PC
case.
Identifies Compatible modem,
ethernet card, sound card or
other PCI card, Cross-point
(Philips) Screwdriver suitable for
your PC case and Uses Fixing
screw (usually comes with the
case), Anti-Static Wrist-strap (if
available)and Locates the PCI
slots
4.1.2 Repeaters and bridges are
correctly set up
Enters global configuration
mode and interface
configuration mode for the
radio interface.
Enters global
configuration mode and
interface configuration
mode for the radio
interface. Creates the
SSID that the repeater
uses to associate to a
root access point and
Enters global configuration mode
and interface configuration mode
for the radio interface. Creates
the SSID that the repeater uses
to associate to a root access
point, designates the SSID as an
infrastructure SSID, exits SSID
configuration mode and return to
172
Sets the access point's
role in the wireless LAN
to repeater.
radio interface configuration
mode, Sets the access point's
role in the wireless LAN to
repeater and Returns to
privileged EXEC mode.
4.1.3 Hub and switches are
correctly set up
Finds the WAN or uplink port
of the Ethernet hub and
Connects an Ethernet cable
from the WAN port of the
hub to either the Ethernet
port of the internet modem
or, if expanding a network, to
an empty LAN port on the
existing network’s router,
switch or hub.
Finds the WAN or uplink
port of the Ethernet hub
and Connects an
Ethernet cable from the
WAN port of the hub to
either the Ethernet port
of the internet modem
or, if expanding a
network, to an empty
LAN port on the existing
network’s router, switch
or hub.Plugs an Ethernet
cable into one of the
LAN ports on the
Ethernet hub and
connect the other end of
Find the WAN or uplink port of
the Ethernet hub and Connect an
Ethernet cable from the WAN port
of the hub to either the Ethernet
port of the internet modem or, if
expanding a network, to an
empty LAN port on the existing
network’s router, switch or
hub .Plugs an Ethernet cable into
one of the LAN ports on the
Ethernet hub and connect the
other end of cable to the
computer and Powers up the
Ethernet hub and the computers
or other devices attached to it.
Configures the network settings
173
cable to the computer on each connected computer and
verifies that all computers can
access the network and the
Internet if connected.
4.1.4 Wireless Access Point is
correctly configured.
Finds the IP addresses of
your existing gateway/router
and clients and connects to
your router administration
interface to find the DHCP
range
Finds the IP addresses of
your existing
gateway/router and
clients and connects to
your router
administration interface
to find the DHCP
range,computer to the
wireless router/AP and
configures the wireless
router / AP.
Finds the IP addresses of your
existing gateway/router and
clients and connect to your router
administration interface to find
the DHCP range, computer to the
wireless router/AP. Configures the
wireless router / AP, tests admin
page is reachable and secure the
AP, tests the AP wireless
connection
4.1.5 Router is correctly Identifies different modes; Identifies different Identifies modes; user
174
configured user EXEC ,privileged EXEC,
global config ,interface
config, setup and
Enters the
model ;user ,privileged EXEC
modes; user
EXEC ,privileged EXEC,
global config ,interface
config, setup and
Enters the
model ;user ,privileged
EXEC, the configuration
mode and also
Configures the IP
address, the routing
protocol.
EXEC ,privileged EXEC, global
config ,interface config, setup,
Enters the model ;user ,privileged
EXEC,
Identifies different modes; user
EXEC ,privileged EXEC, global
config ,interface config, setup,
Enters the model ;user ,privileged
EXEC, the configuration mode
and
Configures the IP address, the
routing protocol also
Opens shortest path first (OSPF),
Creates the IGRP Routing
Process,
Enables and configure BGP
Routing.
4.2.1 The Address Resolution
Protocol(ARP) is correctly
configured
Defines a Static ARP Cache
Entry,
Enables Proxy ARP,
Defines a Static ARP
Cache Entry,
Enables Proxy ARP,
Defines a Static ARP Cache Entry,
Enables Proxy ARP,
Configures DAGR, ARP purge-
175
Configures DAGR, delay, ARP timeout
4.2.2 ICMP is correctly
configured
Allows ping ICMP Echo-
Request outbound and Echo-
Reply messages inbound,
traceroute TTL-Exceeded and
Port-Unreachable messages
inbound.
Allows ping ICMP Echo-
Request outbound and
Echo-Reply messages
inbound, traceroute TTL-
Exceeded and Port-
Unreachable messages
inbound, MTU ICMP
Fragmentation-DF-Set
messages inbound.
Allows ping ICMP Echo-Request
outbound and Echo-Reply
messages inbound, traceroute
TTL-Exceeded and Port-
Unreachable messages inbound,
MTU ICMP Fragmentation-DF-Set
messages inbound.
Blocks other types of ICMP traffic
4.2.3 The BOOTP is correctly
configured
Choses and Decide the
values that you want in the
BOOTP packet reply fields,
and Decide the list of options
and their values that you
want returned to the BOOTP
client
Choses and Decide the
values that you want in
the BOOTP packet reply
fields, and Decide the
list of options and their
values that you want
returned to the BOOTP
client.
Sets values in the policy
Choses and Decide the values
that you want in the BOOTP
packet reply fields, and decide
the list of options and their
values that you want returned to
the BOOTP client.
Sets values in the policy you
176
you want associated
with the BOOTP request:
want associated with the BOOTP
request:
Enables the associated scope or
scopes for BOOTP processing,
enables dynamic BOOTP
processing if you want to have
this scope provides an address
for any BOOTP client that
requests one.
4.2.4 The Dynamic Host Control
Protocol (DHCP) is
correctly configured
Configures a database agent
and disable conflict logins
Configures a database
agent and disable
conflict logins
Excludes IP addresses
Configures a database agent and
disable conflict logins,
Excludes IP addresses,
Configures a DHCP address pool
4.2.5 Domain Name
System(DNS) is correctly
configured
Chooses a Domain name,
Enables The Boot File
Chooses a Domain
name,
Enables The Boot File,
Starts the named
Daemon.
Chooses a Domain name,
Enables The Boot File,
Starts the named Daemon and
Tests the DNS Configuration
177
4.2.6 LDAP is correctly
configured
Locates the LDAP
configuration files, adds the
appropriate files to your
server configuration,
Restarts the server
Locates the LDAP
configuration files, adds
the appropriate files to
your server
configuration, Restarts
the server, Edits the
containers. ldif file in
order to include the
correct LDAP suffix for
your directory
Locates the LDAP configuration
files, adds the appropriate files to
your server configuration,
Restarts the server, and Edits the
containers. Uses ldif file in order
to include the correct LDAP suffix
for your directory
Uses the ldapadd command to
add the containers. Use a bind
DN that has the appropriate
permissions.
4.3.1 Different computer
systems problems are
properly troubleshot
Verifies connections, Ensures
compatibilities of added
devices in a network, and
Verifies functionalities of
network devices
Locates the LDAP
configuration files, adds
the appropriate files to
your server
configuration, Restarts
the server, Verifies
connections, Ensures
compatibilities of added
Locates the LDAP configuration
files, adds the appropriate files to
the server configuration, restarts
the server, verifies connections,
ensures compatibilities of added
devices in a network, verifies
functionalities of network devices
and correct protocols are
178
devices in a network. installed in a computer, Ensures
the firewall ports are open
Uses troubleshooting tools: ping,
ifconfig ,arp, snoop,
ndd,netstat, traceroute
4.3.2 Equipment problems are
resolved properly and
users are able to do their
work correctly
Sets up the IP scheme is the
same, (e.g. 192.168.0.x), the
same Subnet Mask, Gateway,
and DNS IP addresses also
can ping the other
computers by IP ADDRESS
and name.
Sets up the same IP
scheme (e.g.
192.168.0.x), Subnet
Mask, Gateway, and
DNS IP addresses
Also pings the other
computers by IP
ADDRESS and name,
the same workgroup
name (watch for trailing
spaces).
Sets up the same IP scheme (e.g.
192.168.0.x).
Makes sure that there is the
same Subnet Mask, Gateway, and
DNS IP addresses, can ping the
other computers by IP ADDRESS
and name, have the same
workgroup name (watch for
trailing spaces)
With Windows2000, XP and Vista,
makes sure that have the same
username and password as the
person logging onto the other
computers. The default setting
for all but the Home Versions is
to require a password for network
179
access
Removes any unnecessary
firewalls, protocols or other
configurations the complicate the
troubleshooting process. You can
add them back in later after you
get things working.
4.3.3 New upgraded hardware
and software are properly
planned, designed and
acquired
Identifies different versions
of software to be used in
upgrading the network
Identifies different
versions of software to
be used in upgrading the
network
Identifies different
hardware to be used in
the upgrading
Identifies different versions of
software to be used in upgrading
the network
Identifies different hardware to
be used in the upgrading
Plans and designs the network
4.3.4 LAN/WAN is correctly
installed and computer
properly maintained
Chooses LAN/WAN design
considerations.
Identifies hub, switch,
repeater, router to be used
Chooses LAN/WAN
design considerations.
Identifies hub, switch,
repeater, router to be
used and cables:
Chooses LAN/WAN design
considerations.
Identifies hub, switch, repeater,
router to be used, cables:
UTP/STP ,Coax, macro wave, IP 180
UTP/STP ,Coax, macro
wave
address, subnet mask, default
gateway, DHCP, proxy server and
dsigns a switched LAN.
4.3.5 ISO management model is
properly applied
Describes application layer,
presentation layer and the
session layer
Describes application
layer, presentation
layer, session layer, and
network layer
Describes application layer,
presentation layer, session layer,
transport layer, network layer,
data link layer and physical layer.
5.1.1 The role of CPU is clearly
explained
Describes the functions of
CPU
Describes the functions
of CPU, different types of
processors
Describes the functions of CPU,
different types of processors and
gives examples of different
manufacturers.
5.1.2 The CPU components are
clearly described
Identifies control unit, ALU Identifies control unit,
ALU, and RAM
Identifies control unit, ALU, RAM
and registers
181
5.1.3 The purpose of instruction
pointer is clearly described
Defines instruction cycle Identifies different types
of instruction cycle
Identifies how the computer is in
instruction sequence
5.1.4 Steps of processing an
instructions are correctly
described
Identifies and describes
instruction fetch, and
instruction decode.
Identifies and describes
instruction fetch,
instruction decodes,
Identifies and describe
instruction execution.
Identifies and describe
instruction fetch,
Identifies and describe
instruction decode,
Identifies and describe
instruction execution,
Identifies and describe
instruction/data storage.
5.2.1 The purpose of memory
cell is clearly described
Identifies cache memory Identifies cache
memory, and flash BIOS
memory
Identifies cache memory, flash
BIOS memory and
Describes memory address
5.2.2 RAM and ROM are properly
applied.
Describes the functions and
uses of RAM
Describes the functions
and uses of RAM, the
functions and use of
Describes the functions and uses
of RAM, the functions and use of
ROM and
182
ROM States the difference between the
two.
5.2.3 Different types of ROM are
correctly identified.
Describes Mask-Programmed
ROM (MROM), Programmable
ROM (PROM)
Describes Mask-
Programmed ROM
(MROM), Programmable
ROM (PROM), Erasable-
Programmable ROM
(EPROM), Mask-
Programmed ROM
(MROM), and
Programmable ROM
(PROM).
Describes Mask-Programmed
ROM (MROM), Programmable
ROM (PROM), Erasable-
Programmable ROM (EPROM),
Electrically Erasable PROM
(EEPROM), Mask-Programmed
ROM (MROM), and programmable
ROM (PROM)
5.2.4 Storage capacities are
clearly described.
Analyses the storage
capacity of bit, the storage
capacity of byte, and the
storage capacity of word
Analyses the storage
capacity of bit, the
storage capacity of byte,
the storage capacity of
word, the storage
capacity of kilobyte(KB)
Analyses the storage capacity of
bit, the storage capacity of byte,
the storage capacity of word, the
storage capacity of kilobyte(KB),
the storage capacity of megabyte
(MB), the storage capacity of
gigabyte (GB), the storage
capacity of terabyte (TB).
5.2.5 internal and external Describes internal/external Describes Describes internal/external 183
buses are clearly
differentiated
parallel bus, internal/external
serial bus
internal/external parallel
bus, internal/external
serial bus and self-
repaired internal bus
parallel bus, internal/external
serial bus, self-repaired internal
bus, PCI,PCI-
EXPRESS,AGP,USB,FIREWIRE,
PS/2
5.3.1 Different character
recognition devices are
correctly identified.
Describes the OCR Describes the OCR the
MCR
Describes the OCR, the MCR and
the MICR
5.3.2 The role of bar code
reader is clearly explained
discusses different barcode
symbols
discusses different
barcode symbols,
different scanning
devices
discusses different barcode
symbols, different scanning
devices, and the functions of
barcode readers
5.3.3 Different types of are
clearly identified.
Describes open pool tape Describes open pool
tape, cassette tapes
Describes open pool tape,
cassette tapes, and tape
cartridges
5.3.4 Different types of
magnetic disks are
Describes hard disk Describes hard disk, Describes hard disk, floppy disks,
differentiates with other media 184
correctly identified. floppy disks e.g. tape drives
5.3.5 Hard disk performance is
correctly assessed.
Explains latency Explains latency, seek
time
Explains latency, seek time, and
transfer rates
6.1.1 Information systems are
properly audited according
to required procedures.
Explains different categories
of Audit assignment
Explains different
categories of Audit
assignment,
Obtains and recording
an understanding of the
audit area/subject
Explains different categories of
Audit assignment,
Obtains and recording an
understanding of the audit
area/subject,
Explains sources of information
for tests.
6.1.2 Risk assessment for
information systems is
properly conducted and
sequence of functions
properly arranged.
Performs Compliance test,
Substantive test
Performs Compliance
test, Substantive test
and
Develops Audit plan
according to risk level
Performs Compliance test,
Substantive test, and
Develops Audit plan according to
risk level,
185
Gathers and assess Evidence,
Produces report,
Presents report to Communicate
results.
6.1.3 Audit assignments are
correctly performed
Produces detailed audit plan Produces detailed audit
plan, and prepares
Preliminary review of the
audit area/subject
Produces detailed audit plan, and
prepares preliminary review of
the audit area/subject,
Evaluates the audit area/subject,
Reports (communicating results).
6.2.1 Information Technology
Governance is correctly
assessed
Explains existing standards
for effective Information
Technology Governance,
Evaluates sufficiency of
Information systems policy
and Procedures
Explains existing
standards for effective
Information Technology
Governance,
Evaluates sufficiency of
Information systems
policy and Procedures,
Evaluates adherence of
the procedures to the to
regulatory standards
Explains existing standards for
effective Information Technology
Governance,
Evaluates sufficiency of
Information systems policy and
Procedures,
Evaluates adherence of the
procedures to the to regulatory
standards,
186
Assesse effectiveness of available
resources to satisfy required
obligations.
6.2.2 Adherence of Information
Systems development life
cycle management is
correctly assessed.
Evaluates procedures for
Information Systems Life
Cycle Management,
Explains procedures for
Evaluates procedures for
Information Systems Life
Cycle Management,
Explains procedures for
system development,
Explains procedures for
systems testing
Evaluates procedures for
Information Systems Life Cycle
Management,
Explains procedures for system
development, procedures for
systems testing,
Evaluates sufficiency of real life
test to the standard test
procedure
6.2.3 Business continuity
management tests are
properly conducted.
Explains components of
business continuity plan,
Develops a business
continuity plan
Explains components of
business continuity plan,
Develops a business
continuity plan,
Explains decision criteria
of levels of risk for
business continuity.
Explains components of business
continuity plan,
Develops a business continuity
plan,
Explains decision criteria of levels
of risk for business continuity,
Tests business continuity plan
187
6.2.4 Disaster recovery planning
is correctly performed
Explains components of
Disaster recovery plan
Explains components of
Disaster recovery plan,
Evaluates roles of key
players of disaster
recovery plan
Explains components of Disaster
recovery plan,
Evaluates roles of key players of
disaster recovery plan,
Explains recovery strategy, and
Tests practical disaster recovery
plan
6.3.1 Security of information
assets is correctly
assessed
Explains concepts of
Confidentiality, Integrity, and
Availability
Explains concepts of
Confidentiality, Integrity,
and Availability
Assesses different
categories of physical
and logical access
controls.
Explains concepts of
Confidentiality, Integrity, and
Availability
Assesses different categories of
physical and logical access
controls.
Explains Public Key
Infrastructures and applicability
to information assets protection
6.3.2 Security procedures and
components are correctly
Develops procedures for
classifying information
Develops procedures for
classifying information
Develops procedures for
188
tested. assets assets,
Tests controls to
evaluate sufficiency of
security of
classifying information assets
Tests controls to evaluate
sufficiency of security of
6.4.1 Objectives of
entrepreneurship are
properly described
Explains background to
entrepreneurship
Defines
entrepreneurship
Explain
background to
entrepreneurship,
and define
entrepreneurship
Explain background to
entrepreneurship, and
define entrepreneurship by
providing relevant
examples
6.4.2 Entrepreneurship in
business organization is
properly analyzed
Lists categories of
businesses
Lists categories of
businesses, and
mentions
characteristics of
entrepreneurship
with examples
Lists categories of
businesses, and mentions
characteristics of
entrepreneurship with
correct examples according
to the context
6.4.3 The importance of
information system in
entrepreneurship is
properly discussed
Define information
system
Define information
system, and
assess relationship
between
information
systems and the
Define information system
by providing examples of
different information
systems, and assess
relationship between
information systems and 189
activities of the
business
the activities of the
business
6.4.4 The role of
entrepreneurship concepts
in developing business is
properly discussed
Describes
entrepreneurship
concepts.
Describes
entrepreneurship
concepts, and
discusses different
types of
businesses.
Describes entrepreneurship
concepts, discusses
different types of
businesses, and identifies
sources of business finance
190
NTA LEVEL 6
12.0 MODULES DESCRIPTION
ODIT 611: COMPUTER ARCHITECTURE NAME: COMPUTER ARCHITECTURE
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
5.1.1 Identify the role of CPU
5.1.2 Describe the component parts of CPU
5.1.3 Describe purpose of instruction pointer
5.1.4 Describe steps in processing an instruction
5.2.1 Describe the purpose of memory cell
5.2.2 Identify the use of RAM and ROM
191
5.2.3 Identify different types of ROM
5.2.4 Describe storage capacities(bit, byte, word, KB,MB,GB,TB)
5.2.5 Identify internal and external buses
5.3.1 Identify different Character recognition devices
5.3.2 Identify the role of barcodes
5.3.3 Identify different types Tapes
5.3.4 Identify different magnetic disks
5.3.5 Describe hard disk performance
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc
METHODS OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Abd-El-Barr M., El-Rewin M, (2008), Fundamentals of Computer Organization and Architecture, Addison Wesley, McGraw-Hill Co, USA
2. Carter N. P., (2008), Schaum’s Outline of Computer architecture, 5th Edition, Prentice Hall, India3. Harris D. M., Harris S. L, (2007), Digital Design and Computer Architecture, 5th edition, Addison
Wesley, McGraw-Hill Co, USA.4. Hennesy J. L, et al, (2007), Computer Architecture- A Quantitative Approach, 4th Edition, McGraw-Hill,
USA
192
5. Gragon H. C, (2007), Computer Architecture and Implementation, 4th edition, Prentice-Hall USA
INTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semester Examination – 60%
ODIT 612: PROGRAMMING IN C++NAME: PROGRAMMING IN C++
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
1.1.2 Describe Structure of a program
1.1.2 Declare Variables and Data types.
1.1.3 Use Constants
1.1.4 Assign Operators
1.1.5 declare Basic Input/ Output1.2.1 Use Control Structures in a program
1.2.2 Declare Functions
1.4.1 Declare Classes 1.4.2 Declare Friendship and inheritance1.4.3 apply Polymorphism1.4.4 apply message passing
TEACHING AIDS:
193
Chalk boards, white board marker, power point, flip charts stand, pictures etc
METHODS OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Dale N. B., Weems C., (2004), Programming in C++, 4th Edition, Addison-Wesley Publishing Co. USA2. Deitel P., Deitel H. M, (2009), C++ How to Program, 7th Edition, Pearson Publishing Co. UK 3. Duffy D. J., (2006), Introduction to C++ for Financial Engineers, 4th Edition, Pearson Publishing Co. UK 4. Joyce F., (2008), Object Oriented Programming Using C++, 6th Edition, Addison Wesley Longman,
USA.5. Mike M., (2006), C++ Programming in Easy steps, 5th edition, Addison Wesley Longman, USA.
INTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semester Examination – 60%
194
ODIT 613: BUSINESS INFORMATION SYSTEMSNAME: BUSINESS INFORMATION SYSTEMS
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
3.1.1 Discuss the relationship between the business organization, processes and functions and the associated supporting
management information systems.
3.1.2 Explain appropriate management information systems for the
range of business functions and organizational levels.
3.2.1 Explain how new technology is impacting on business processes
and associated management information systems.
3.3.1 Discuss the managerial decision making process in business.
3.3.2 Explain the relationship between decision making and management information systems at different
levels of the organization.
195
3.3.3 Evaluate the importance of collaborative decision making environments and review group
management information
systems.
3.3.4 Explain the concepts of knowledge and knowledge management
in the management information systems context.
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc
METHODS OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Abramowic W., Fensel D., (2008), Business Information Systems, 5th Edition, Prentice Hall, Warsaw, Poland
2. Abramowic W., Mayr H. C, (2007), Technologies for Business Information Systems, 5th Edition, , Prentice- Hall, Warsaw, Poland
3. Abramowic W., Flejter D., (2009), Business Information Systems Workshops, 5th edition, Prentice-Hall, Poznan Poland
4. Curtis G., Cobham D., (2008), Business Information Systems: Analysis, Design and Practice, 5th Edition, Addison Wesley, McGraw-Hill Co. USA
5. Elliot G., (2007), Global Business Information Technology, 5th Edition, Addison Wesley, McGraw-Hill Co, USA
INTEGRATED METHOD OF ASSESMENT:
196
Continuous Assessments - 40%
End of Semester Examination – 60%
ODIT 614: ENTREPRENEURSHIPNAME: ENTREPRENEURSHIP
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
6.4.1 Describe objectives of entrepreneurship
6.4.2 Analyze entrepreneurship in business organization
6.4.3 Discuss the importance of information system in entrepreneurship
6.4.4 Discuss the role of entrepreneurship concepts in developing business
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc.
METHODS OF INSTRUCTION:
197
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Carson M, Buckley P. J. (2010), Entrepreneurship: Theory, Networks, History, 2nd Edition, Prentice-Hall, Poznan Poland.
2. Davidson P., (2005), Researching Entrepreneurship, 5th Edition, Addison Wesley, McGraw-Hill Co, USA3. Drucker P. F., (2009), Innovation and Entrepreneurship, 3rd Edition, Addison Wesley McGraw-Hill Co,
USA4. Kuratko D. F., Hodgetts R. M., (2008), Entrepreneurship: Theory, Process, and Practice, 4th Edition,
Prentice- Hall, Delhi.5. Wickham P. A., (2007), Strategic Entrepreneurship, Prentice-Hall, UK.
INTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semester Examination – 60%
198
ODIT 621: INFORMATION SYSTEM ASSURANCENAME: INFORMATION SYSTEMS ASSURANCE
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
6.1.1Perform Information Systems audit according to required procedures
6.1.2 Perform information systems Risk Assessment
Arrange sequence of functions
6.1.3 perform audit assignment
6.2.1Assess Information Technology Governance
6.2.2 Assess adherence of Information Systems development life cycle management
6.2.3 Perform Tests to check Business continuity Management
6.2.4 Perform test to check effectiveness of Disaster recovery planning
199
6.3.1 Assess Security of Information assets
6.3.2 Test Security procedures and components
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc
METHOD OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Andrew B., Kovacich G. L, (2006), Information Assurance: Security in the Information Environment, 6th Edition, Prentice Hall, Warsaw.
2. Dube D. P., Gulati V. P., (2005), Information Systems audit and Assurance, 5th Edition, Prentice Hall, New Delhi India.
3. Gelinas U. J., Dull R. B., (2009), Accounting Information Systems, 5th Edition, Addison Wesley Co., USA.
4. Qian Y., Tipper D., Krishnamurthy P., (2008), Information Assurance: Dependability and security in Networked Systems, 6th Edition, Prentice Hall, India.
5. Warketin M., Vaughn R., (2006), Enterprise Information Systems Assurance and System Security, 7th Edition, Addison Wesley, USA
INTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semister Examination – 60%
200
ODIT 622: DATABASE DRIVEN WEBSITE DESIGNNAME: DATABASE DRIVEN WEBSITE DESIGN
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
2.1.1 download Apache, PHP, Mysql or Wamp/ Xamp
2.1.2 install download Apache,PHP, Mysql or Wamp / Xamp
2.1.3 use the server
2.2.1 reading and writing files
2.2.2 API file manipulation
2.2.3 Uploading and exit file
2.3.1 use PHP syntax
2.3.2 declare variables
201
2.3.3 declare arrays
2.3.4 declare functions
2.3.5 declare classes and objects
2.3.6 declare string operations
2.4.1 declare site’s structure
2.4.2 prepare graphic resources
2.4.3 design templates, upload templates and resources
2.4.5 create all modules and add to templates
2.4.6 create pages and forms
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc
METHODS OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Dunlap I. H, (2006), Open Source Database Driven Web Development, 5th edition, Kauffmann, USA2. Norman M., (2007), Database Design Using MySQL for Windows, 6th edition, Prentice-Hall, California,
USA3. Oxer J., (2007), How to Build a Website and Stay Sane, 4th Edition, Prentice-Hall, USA
202
4. Reynolds J., (2007), The Complete E-Commerce Book: Design, Build & Maintain, 6th Edition, Prentice-Hall, USA
5. Yank K., (2008), Build Your Own Database Driven Website Using PHP & MySQL, 5th Edition, Addison Wesley, USA
INTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semester Examination – 60%
ODIT 623: FUNDAMENTALS OF NETWORK ADMINSTRATION
NAME: FUNDAMENTALS OF NETWORK ADMINISTRATION
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
4.1.1 configure Network Adapter, Modem
4.1.3 set Repeater and Bridge
4.1.4 set Hub and Switch
4.1.5 connect Wireless Access Point
4.1.6 configure Router
4.2.1 configure ARP
203
4.2.2 configure ICMP
4.2.3 configure BOOTP
4.2.4 configure DHCP
4.2.5 configure DNS
4.2.6 configure LDAP
4.3.1 Troubleshoot problems with computer systems
4.3.2 assist users to resolve problems with equipment and data
4.3.3 plan, design, acquire new or upgraded hardware and software
4.3.4 Install LAN/WAN (Cabling, Modifying, Testing), Maintaining Computer
4.3.5 Apply ISO management model
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc
METHODS OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Limoncelli T. A., et al, (2007), 8th Edition, McGraw-Hill, USA2. Maiwald E, (2006), Fundamentals of Network Security, 4th Edition, Addison Wesley Co., USA
204
3. Skandier T., (2009), Network Administrator Street Smart: A Real World Guide to CompTIA, 6th Edition, Prentice-Hall, USA.
4. Stein L. D., (2001), Network Programming with Perl, 5th edition, Pearson Publishing Co. Ltd, UK5. Suehring S., et al, (2007), Wiley Pathways Windows Network Administration, 5th edition, Pearson
Publishing Co. Ltd, UKINTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semester Examination – 60%
ODIT 624: PROJECT DEVELOPMENT
NAME: PROJECT DEVELOPMENT
NO. OF CREDITS: 15
SUB-ENABLING OUTCOMES:
3.4.1 Explain the key requirement of competitive advantage that drives the need for management
information systems and its manifestation through processes such as Supply Chain Management
(SCM), Enterprise Resource Planning (ERP), organizational redesign and change.
3.5.1 Discuss the risk, security and control issues associated with managing
Information systems projects.
3.6.1 Review the range of professional issues, which are associated
with managing business project activities and management information systems.
205
TEACHING AIDS:
Chalk boards, white board marker, power point, flip charts stand, pictures etc.
METHODS OF INSTRUCTION:
This module will be conducted through lecturers, demonstrations, role-plays and discussions
REFERENCES
1. Cleland D. I., Ireland L. R., (2006), Project Management: Strategic Design and implementation, 5th Edition, Pearson Publishing Co., UK.
2. Haynes M. E., (2006), Project Management: Practical Tools for Success, 5th edition, McGraw-Hill, USA3. Heerkens G. R., (2007), Project Management: 24 Steps Help You Master any Project, 4th Edition,
Pearson Publishing Co., UK.4. Kerzner H., (2009), Project Management: A Systems Approach to Planning, Scheduling, 10th edition,
McGraw-Hill, New Jersey, USA5. Lewis J. P., (2007), Fundamentals of Project Management, 3rd Edition, Prentice-Hall, California, USA
INTEGRATED METHOD OF ASSESMENT:
Continuous Assessments - 40%
End of Semester Examination – 60%
206
1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competence modular curricula is to comply with the Nation’s Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative, and flexible work force that will be responsive to the social needs.
Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.
The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.
The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that “given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn”. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g. create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 7 for the INFORAMTION AND COMMUNCITION TECHNOLOGY specialization.
207
The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated for this qualification and this accounts for 34 weeks for a year or 68 weeks for the whole qualification of 2 years (4 semesters)
This level has a minimum number of 240 credits as prescribed by NACTE.
208
2.0 MODULE CODING
The coding of modules follows logical sequence as in the following example for HDIT 711.
HDIT = Stands for Higher Diploma in Technology
7 = The first digit stands for the NTA level, in this case Higher Diploma which is level Seven.
1 = The second digit stands for semester, i.e. for semester one
1 = the last digit stands for the order of the module in the semester. Modules are arranged serially the highest number, depending upon the number for modules in the semester.
209
3.0 GRADING OF ASSESSMENT RESULTSThe grading of assessment results is in conformity with the NACTE grading system as follows.
NTA Level 7
Grade Definition Score
A Excellence 75-100
B+ Very Good 65-74
B Good 55-64
C Average 40-54
F Failure 0-39
I Incomplete
210
4.0 AWARDSThe award shall be made to students who satisfy the following conditions.
(a) Have completed modules for the award.(b) Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass.(c) GPA shall be computed from cumulative scores earned by students using NACTE guideline
5.0 AWARDS CLASSFICATION
Awards Classification for NTA Level 7
Class of Award Cumulative GPA
First Class 4.4 to 5.0
Upper Second 3.5 to 4.3
Lower Second Class 2.7 to 3.4
Pass 2.0 to 2.6
211
6.0 SUMMARY FRAMEWORKQUALIFICATION HIGHER DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY
PURPOSE OF QUALIFICATION
This qualification is intended for persons who will configure and manage operating systems,
prepare graphical user interfaces and animations, apply knowledge, skills and principles of
accounting and JAVA to prepare and manage office automation packages, including accounting
packages, apply principles of computer network and other computing techniques to manage
organization systems and recommend appropriate measures for management decisions.
NTA LEVEL 7
COMPETENCE LEVEL DESCRIPTOR
The holder of this qualification will apply knowledge, skills and principles in a broad range of complex technical ICT activities of developing and managing operating systems, graphical interfaces, animations and office automation packages with higher degree of personal responsibility and some responsibility for the work of others.
CREDITS AT THIS LEVEL
240
CUMULATIVE CREDITS AT THIS LEVEL 360
MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL
30
DATE NEW
212
QUALIFICATION STANDARD LAST RVIEWED
ENTRANCE REQUIREMENTS
ODIT Level 6 or Form Six with 2 Principal level Passes, with total points of not less than 4.5; one of them should be either Physics or Advanced Mathematics.
7.0 PRINCIPAL LERNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIAS/NO PRINCIPAL LEARNING OUTCOME CREDIT VALUE ASSESSMENT CRITERIA
1 Configure and manage Operating System 15 1.1 Operating Systems are properly configured and managed.
2 Manage business environment performance and social well being by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication.
60 2.1Computer graphics techniques to manage business performance are properly applied
2.2Entrepreneurship skills to manage business performance are properly applied.
2.3Knowledge and skills of development studies are properly applied in business environment.
2.4Business Communication skills are properly applied for effective and efficient communication.
3 Apply Artificial Intelligence, Discrete Mathematics, Research methods and Quantitative techniques in managing
60 3.1 Artificial Intelligence skills in managing businesses are properly applied.
3.2 Discrete Mathematics and statistics knowledge is properly applied to
213
businesses. manage businesses.
3.3 Research methods skills and techniques are properly applied.
3.4 Quantitative techniques to solve business problems are properly applied.
4 Apply Java skills and knowledge of accounting in developing and managing different application programs
45 4.1 Java skills and knowledge to develop and manage application programs are properly applied.
4.2 Principles of accounting skills to manage application program are properly applied.
4.3 Knowledge and skills of computer applications are applied to manage accounting packages
5 Manage the organization information systems
by applying skills and knowledge of computer
network and multimedia.
30 5.1 Knowledge and skills of computer network are properly applied to manage organization information systems.
5.2 Knowledge and skills of multimedia are properly applied to manage organization information systems.
6 Apply technologies of mobile computing and
explain the potential, importance and ways of
30 6.1 Knowledge and skills of mobile computing are clearly explained and properly applied to improve business
214
utilizing them in ICT projects and working
environment.
performance.
6.2 Knowledge and skills of ICT Project management are properly applied to improve business performance.
TOTAL CREDITS FOR NTA LEVEL 7 240
8.0 PROGRAM STRUCTURE
215
SEMESTER I
S/NO CODE NAME OF MODULE CREDIT
1 HDIT 711 Discrete Mathematics and Statistics 15
2 HDIT 712 Business Communication 15
3 HDIT 713 Computer Graphics Designing 15
4 HDIT 714 Operating Systems Configuration 15
TOTAL CREDITS FOR SEMESTER I 60
SEMESTER II
S/NO CODE NAME OF MODULE CREDIT
1 HDIT 721 Development Studies 15
2 HDIT 722 Principles of Accounting 15
3 HDIT 723 Artificial Intelligence Applications 15
4 HDIT 724 Quantitative Techniques 15
5 HDIT 725 Field Attachment
TOTAL CREDITS FOR SEMESTER I 60
SEMESTER III
S/NO CODE NAME OF MODULE CREDIT216
1 HDIT 731 Multimedia Systems Design 15
2 HDIT 732 Programming with Java 15
3 HDIT 733 Research Methodology 15
4 HDIT 734 Computerized accounting 15
TOTAL CREDITS FOR SEMESTER III 60
SEMESTER IV
S/NO CODE NAME OF MODULE CREDIT
1 HDIT 741 Networking Management 15
2 HDIT 742 Entrepreneurship Development 15
3 HDIT 743 Mobile Computing 15
4 HDIT 744 Project Management 15
TOTAL CREDITS FOR SEMESTER IV 60
GRAND TOTAL CREDITS FOR NTA LEVEL 7 240
9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES
PRINCIPAL OUTCOMES ENABLING OUTCOMES (As Identified and SUB-ENABLING OUTCOMES
217
(NACTE Standards) Formulated by Curriculum Developers)
1. Configure and manage Operating Systems.
1.1 Configure Operating Systems 1.1.1Install Operating Systems
1.1.2 Create users of operating systems with their rights.
1.2 Manage Operating System 1.2.1 Administer users of operating system
1.2.2 Secure Operating Systems components
1.2.3 Assess systems performance and diagnose faults
2. Manage business environment performance and social wellbeing by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication.
2.1 Design graphical user interfaces and animations
2.1.1 Design graphics in media such as print digital or motion pictures.
2.1.2 Decorate products
2.1.3 Assemble images, motions and graphics.
2.2 Communicate effectively in business environment and apply skills of development studies.
2.2.1 Apply writing and presentation skills for effective communication
2.2.2 Make effective presentations in international business environment
2.2.3 Interrelate different development
218
studies concepts to manage business
2.2.4 Apply techniques to manage different social development challenges
2.3 Develop entrepreneurship venture and manage them for business growth
2.3.1 Prepare business plans
2.3.2 Apply marketing skills to market products for opportunities identified.
2.3.3 Apply skills for overcoming business challenges.
3. Apply Artificial Intelligence, Discrete Mathematics, Research methods and Quantitative techniques in managing businesses.
3.1 Apply intelligent algorithms, artificial intelligence and software tools to solve business problems
3.1.1 Interrelate Intelligent Algorithms tools to business problems.
3.1.2 Apply methods for encoding knowledge in computer systems
3.2 Apply quantitative techniques calculations of real business transactions.
3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems.
3.2.2 Design quantitative models of estimation and forecasting for decision making.
3.3 Apply discrete Mathematical and Statistical techniques in computing operations.
3.3.1 Apply information technology in mathematical contexts
3.3.2 Explain the logical and systematic approach to solving problems in particular simple combinatorial
219
problems.
3.4 Apply Research Methodology for writing the field attachment report.
3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations.
3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.
4. Apply Java skills and
knowledge of accounting in developing and managing different application programs.
4.1 Prepare application programs using Object oriented tools
4.1.1 Analyze user requirements for program development.
4.1.2 Apply skills and knowledge of designing and building application programs.
4.1.3 Test and Implement application programs
4.2Apply Principles of accounting to manage business finance
4.2.1 Prepare financial statements for business
4.2.2 Identify and describe legal aspects of company formation, shares and bonus.
4.3 Manage accounting application programs 4.3.1Monitor and evaluate designed application programs.
4.3.2 Maintain application Programs.
220
5. Manage the organization information systems by applying skills and knowledge of computer network and multimedia.
5.1Configure the organization system
5.1.1 Design the network system for the organization.
5.1.2 Install, test and implement the computer network system
5.2Manage the organization information system
5.2.1 Deploy security mechanism5.2.2 Troubleshoot the network systems5.2.3 Evaluate and Maintain network
systems.
5.3Apply multimedia tools and techniques to develop, present and solve business problems.
5.3.1 Design appropriate multimedia systems to solve specific business problems.
5.3.2 Evaluate business problems to be solved by multimedia tools.
6. Apply technologies of mobile computing and explain the potential, importance and ways of utilizing them in ICT and projects and working environment.
6.1 Formulate requirements for a mobile computing application in a chosen
Specialized business case.
6.1.1 Design wireless systems for solving business problems.
6.1.2 Apply Wireless transmission in solving business problems.
6.1.3 Evaluate wireless transmission systems
6.2 Apply Information Communication Technology concepts to business projects in order to improve business performance
6.2.1 Assess business performance requiring ICT enhancement
6.2.2 Implement ICT concepts in solving business problems.
6.3 Apply Information Communication Technology concepts to support business at place of work.
6.3.1 Apply ICT skills to support organization applications and infrastructure.
221
6.3.2 Maintain and evaluate system optimum performance
222
10.0 ASSESSMENT CRITERIA AND ASSESSMENT INSTRUMENTSUB-ENABLING OUTCOMES
RELATED TASK ASSESSMENT CRITERIA
ASSESSMENT METHODS
ASSESSMENT INSTRUMENTS
1.1.1 Install Operating Systems
Set boot sequence Partition hard disk Format hard disk
Operating systems are properly installed.
Observe procedure
Practical test,
Systems logs
1.1.2 Create users of operating systems with their rights
Create a user to a specific group
Set initial password to be changed
Configure user right Test user credentials
Users of operating systems with their rights are properly created.
Login to the created account
Systems log
1.2.1 Administer users of operating systems.
Set permissions for files and application
Set login schedule Set network access
Users of operating systems are appropriately administered.
Test user privileges
Practical test
1.2.2 Secure Operating Systems components
Explain procedures for turning on firewall
Install anti-virus Authenticate users. Enforce sharing. Setup communication
security
Components of operating system are properly secured.
Login to the firewall.
Observe installed antivirus
System Logs report
1.2.3 Assess system performance and diagnose faults
Diagnose software and hardware errors.
Troubleshoot errors Report fault rectification
systematically
System performance is properly assessed and correctly diagnosed.
Problem solved Practical test
2.1.1 Design graphics Perform needs analysis Graphics in media Group Presentation,
223
in media such as print, digital or motion pictures.
Prepare design plan. Develop the design.
such as print digital or motion pictures are properly designed.
assignment, test class test
2.1.2 Decorate products
Design colors, sounds and photo
Set appropriate styles Test the objects (color,
sound and photo)
Products are clearly decorated.
Group assignment, test
Presentation, class test
2.1.3 Assemble images, motions and graphics.
Assemble images Assemble sound and
motion pictures Integrate assembled
objects
Images, motion and graphics are properly assembled.
Group assignment
Practical test
2.2.1 Apply writing and presentation skills for effective communication.
Explain techniques for effective communication
Write a report. Make presentation in
group work.
Writing and presentation skills are properly applied for effective communication.
Group presentation
Report and tools used in Presentation
2.2.2 Make effective presentations in international business environment.
Apply tools for effective communication in International business environment
Make presentation for a real business case
Effective presentations in international business environment are properly made.
Group presentation
Report and tools used in Presentation
2.2.3 Apply techniques to manage different social
Apply tools to enhance good governance
Relate gender issues with
Techniques are properly applied to manage different
Group presentation
Report and Questions from
224
development challenges
social development Explain development
challenges and opportunities in regional integration and trade
social development challenges.
and discussion audience
2.3.1 Prepare business plans
Initiate Entrepreneurial venture
Prepare feasible business plan
Monitor and Evaluate venture initiated
Business plans are properly prepared.
Individual/ group assignment
Report submission
2.3.2 Apply marketing skills to market products for opportunities identified.
Identify market opportunities
Explain key factors for business venture development
Give examples of creativity and innovation for product development
Marketing skills are properly applied to market products for opportunities identified.
Practical case identification
Report submission and case presentation
2.3.3 Skills are applied for overcoming business challenges
Explain sources of financing entrepreneurial venture
Explain contemporary entrepreneurship issues
Apply business networking skills to overcome business challenges
Skills for overcoming business challenges are properly applied
Case Study Report submission and case presentation
3.1.1 Interrelate Intelligent Algorithms tools to business problems.
Apply intelligent algorithms in problem solving.
Discuss strengths and limitations of various artificial intelligence and machine learning
Intelligent algorithms tools are properly interrelated to business
Real business practical case
Report submission
225
techniques Implement Artificial
Intelligent and machine learning algorithms to solve real problems
problems.
3.1.2 Apply methods for encoding knowledge in computer systems
Distinguish between a conventional system and intelligent system
Explain Artificial Intelligence concept and its applications
Apply Artificial Intelligent techniques in solving problems of a particular domain.
Methods are properly applied for encoding knowledge in computer systems.
System coding case study
Working system design
3.2.1 Apply different Decision models and Quantitative methods in analysing and solving business problems.
Apply transportation model to solve business problems
Apply network analysis and project scheduling for resource allocation
Apply basic inventory techniques for decision making
Different decision models and quantitative methods are properly applied in analysing and solving business problems.
Case study, individual and group assignments
Report submission
3.2.2 Design quantitative models of estimation and forecasting for decision making.
Formulate Linear programming model
Apply linear programming models to solve complex business cases.
Analyze quantitative models of estimation for decision making.
Quantitative models of estimation and forecasting are properly designed for decision
Business case study
Report submission
226
making.
3.3.1 Apply information
technology in
mathematical
context
Practise basic concepts of mathematical proof.
Solve complex ideas and relate them
Apply methods to solve a given task
Information technology is properly applied in mathematical context.
Exercises, assignments
Questions and model answers
3.3.2 Explain the logical
and systematic
approach to
solving problems
in particular
simple
combinatorial
problems.
Implement selected Artificial Intelligence and machine learning algorithms to solve real world problems
Apply different decision models and quantitative methods in analyzing and solving business problems.
Apply sensitivity analysis techniques to solve business challenges
The logical and
systematic
approach is clearly
explained in
solving problems
in particular simple
combinatorial
problems.
.
Exercises, assignments, examinations
Questions and model answers
3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in
Explain a research process
Design research with tested hypothesis using real business case
Develop research instruments for data collection.
Test research instruments
Different research methodologies, tools and techniques are properly applied in exercising critical judgment in the resolution of
Individual and group assignment
Report submission
227
the resolution of complex problematic situations.
complex problematic situations.
3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.
Develop research problem and research design
Write research proposal Explain research analysis
techniques Produce research report
Research methods and techniques are properly applied in reporting and presenting the required results in agreed format.
Individual and group assignment
Report submission
4.1.1 Analyze user requirements for program development
Examine user objectives Identify user resources Identify user contents
Users’ requirements are clearly analyzed for program development.
Case study, assignment
Report and presentation
4.1.2 Apply skills and knowledge of designing and building application program
Prepare a programming environment
Plan for application program
Design an application program
Write a program(coding)
Skills and knowledge of designing and building application programs are properly applied
Case study, assignment
Report and presentation
4.1.3 Test and implement application programs
Install designed program Login data to test its
effectives Execute (compile)
Application programs are properly tested and implemented.
System coding Working system presentation
228
program
4.2.1 Monitor and evaluate designed application program
Check for routine errors Document the errors Examine program
performance
Designed application programs are properly monitored and evaluated.
Individual case study
Case study presentation
4.2.2 Maintain application Programs.
Check required update Perform necessary
updates Report changes
performed accordingly
Application programs are properly maintained.
Guided simulation
Practical presentation
5.1.1 Design computer
network system
for an
organization.
Explain technical issues associated with virtual, switching tools for LAN and WAN internetworking.
Explain cost, merits and demerits of wide area and local area network.
Explain the role of different Layers of OSI Network model
Apply design technologies concepts to develop computer network system
Computer network system for an organization is properly designed.
Practical case Working system report submission and presentation
5.1.2 Install, test and implement computer network system
Apply hardware network connectivity system to implementation
Explain and apply software tools to
Computer network system is properly installed, tested and implemented
Practical case Working system presentation
229
implement network system Apply tools to test
implemented network system
5.2.1 Establish security mechanism
Explain issues related to threats and vulnerabilities to computer networks
Explain the mechanism of setting and using Intrusion Detection System,firewall,data encryption algorithms, Kerberos key exchange to ensure maximum network security
Apply security mechanism and techniques to control and manage the network system security
Security mechanism is properly established.
Practical case Case presentation
5.2.2 Troubleshoot the network systems
Identify the problem by checking the settings and options.
Describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing.
Select and use diagnostic tools and equipment to identify and analyze network malfunctions
The network systems are correctly troubleshot
Practical case Presentation
Report
230
Apply software and hardware tools to recover the problem
5.2.3 Evaluate and Maintain network systems.
Analyze current system and organization requirements to identify system upgrade requirements
Perform upgrade installation, test effectiveness and functionality of upgrade, and document results
Evaluate system performance and produce performance report
Network systems are properly evaluated and maintained
Simulation case Report submission
5.3.1 Design appropriate multimedia systems to solve specific business problem.
Describe basic concepts and domains in Multimedia
Explain the techniques used to create and combine different media types.
Implement design theories by building interactive web–based multimedia product.
Appropriate multimedia systems are properly designed to solve specific business problems.
Simulation case Report submission
5.3.2 Evaluate Assess practicability of Business problems Case study/ Report
231
business problems to be solved by multimedia tools.
multimedia applications using contemporary hardware and software.
Assess impact of multimedia applications to enhance business process performance.
Assess implementation issues surrounding key facets of multimedia design, including interface design.
are appropriately evaluated by multimedia tools.
simulation submission
6.1.1 Design wireless systems for solving business problems.
Identify user requirements for the system development
Examine the resources for the design
Implement program for business resolution
Wireless systems are properly designed to solve business problems.
Practical case Report submission
6.1.2 Apply wireless transmission technologies in solving business problems.
Explain business processes as related to mobile computing
Explain the concept of wireless communication to support connectivity to mobile networks and wireless internet.
Apply the principles of transaction and e-commerce over wireless devices to support e-business
Wireless transmission is properly applied in solving business problems.
Practical case Report submission
6.1.3 Evaluate wireless Assess systems integrity Wireless Simulation/ case Report
232
transmission systems
Monitor system log files Evaluate systems
availability
transmission systems are correctly evaluated
study
6.2.1 Assess performance of mobile systems developed
Integrate all required resources
Improve resource accessibility time
Report system performance
Performance of Mobile systems developed is properly assessed.
Simulation/ case study
Report
6.2.2 Assess business
performance after
mobile computing
implementation
Check business growth Check cost improvement
after implementation Check level of business
competitiveness in the global market
Business performance after mobile computing implementation is properly assessed.
Simulation Report submission
11.0 BENCHMARKING OF ASSESSMENT CRITERIAASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT
1.1.1 Operating systems properly installed.
Sets boot sequence Sets boot sequence and partition hard disk
Sets boot sequence, partitions hard disk and formats appropriately and install
233
operating system
1.1.2 Users with their rights are properly created.
Creates a user to a specific group
Creates a user to a specific group and sets password features
Creates a user to a specific group, sets password features, configure user right and tests user credentials.
1.2.1 Uses of operating system are appropriately administered.
Sets permissions for files and application
Sets permissions for files and application login schedule
Sets permissions for files and application, schedules the logging and sets network access.
1.2.2 Components of operating system are properly secured.
Explains procedures for turning on firewall and install anti-virus
Explain procedures for turning on firewall, install anti-virus, and authenticate of users.
Explains procedures for turning on firewall, installs anti-virus, authenticate of users, enforce sharing and setup communication security.
1.2.3 System performance is properly assessed and correctly diagnosed.
Diagnoses software and hardware errors.
Diagnoses software, hardware errors and troubleshoot errors
Diagnoses software and hardware errors, troubleshoots errors, and reports fault rectification systematically
2.1.1 Graphics in media such as print digital or motion pictures are properly
Does needs analysis Performs needs analysis and prepares design plan.
Performs needs analysis, prepares design plan and develops the design.
234
designed.
2.1.2 Products are clearly decorated.
Designs colors, sounds and photo
Designs colors, sounds and photo and sets appropriate styles
Designs colors, sounds and photo, sets appropriate styles and objects (color, sound & photo)
2.1.3 Images, motion, and graphics are properly assembled.
Assembles images Assembles images, sound and motion pictures
Assembles images, sound and motion pictures and integrates assembled objects
2.2.1 Writing and presentation skills are properly applied for effective communication.
Explains techniques for effective communication
Writes a report and explains techniques for effective communication
Explains techniques for effective communication, writes a report and makes presentation in group work.
2.2.2 Effective presentations in international business environment are
Explains quality features of international business
Explains quality features of international business and develops tools for effective communication in International business
Explains quality features of international business, develops tools for effective communication in International business environment and
235
properly made. environment makes presentation for a real business case
2.2.3 Techniques are properly applied to manage different social development challenges.
Develop tools to enhance good governance
Develops tools to enhance good governance and relates gender issues with social development
Develops tools to enhance good governance, relates gender issues with social development and explains development challenges and opportunities in regional integration and trade
2.3.1 Business plans are properly prepared.
Initiates Entrepreneurial venture
Initiates Entrepreneurial venture and prepares feasible business plan
Initiates Entrepreneurial venture, prepares feasible business plan, monitor and evaluates venture initiated
2.3.2 Marketing skills are properly applied to market products for opportunities identified.
Identifies market opportunities
Identifies market opportunities, and explains key factors for business venture development
Identifies market opportunities, explains key factors for business venture development and gives examples of creativity and innovation for product development
2.3.3 Skills for overcoming business challenges are properly applied
Explains sources of financing entrepreneurial venture
Explains contemporary entrepreneurship issues
and explains sources of financing entrepreneurial venture
Explains sources of financing entrepreneurial venture, explains contemporary entrepreneurship issues and applies business networking skills to overcome business
236
challenges
3.1.1 Intelligent algorithms tools are properly interrelated to business problems.
Explains strengths and limitations of various artificial intelligence and machine learning techniques
Discusses strengths and limitations of various artificial intelligence and machine learning techniques and applies intelligent algorithms in problem solving.
Discusses strengths and limitations of various artificial intelligence and machine learning techniques, applies intelligent algorithms in problem solving and implements Artificial Intelligent and machine learning algorithms to solve real problems
3.1.2 Methods are properly applied for encoding knowledge in computer systems.
Distinguish between a conventional system and intelligent system
Distinguishes between a conventional system and intelligent system, and explains Artificial Intelligence concept and its applications
Distinguishes between a conventional system and intelligent system, explains Artificial Intelligence concept and its applications, and applies Artificial Intelligent techniques in solving problems of a particular domain
3.2.1 Different decision models and quantitative methods are properly applied in
Applies transportation model to solve business problems
Applies transportation model to solve business problems, and applies network analysis and project scheduling for
Applies transportation model to solve business problems, network analysis and project scheduling for resource allocation, and basic inventory
237
analysing and solving business problems.
resource allocation techniques for decision making
3.2.2 Quantitative models of estimation and forecasting are properly designed for decision making.
Formulates Linear programming model
Formulates Linear programming model, and applies linear programming models to solve complex business cases.
Formulates Linear programming model, applies linear programming models to solve complex business cases, and analyzes quantitative models of estimation for decision making.
3.3.1 Information technology is properly applied in mathematical context.
Practices basic concepts of mathematical proof.
Practices basic concepts of mathematical proof, and solve complex ideas and relate them
Practices basic concepts of mathematical proof, solves complex ideas and relate them, and applies methods to solve a given task
3.3.2 The logical and systematic approach is clearly explained in solving problems in particular simple combinatorial problems.
Implements selected Artificial Intelligence and machine learning algorithms to solve real world problems
Implements selected Artificial Intelligence and machine learning algorithms to solve real world problems, and applies different decision models and quantitative methods in analyzing
Implements selected Artificial Intelligence and machine learning algorithms to solve real world problems, applies different decision models and quantitative methods in analyzing and solving business problems, and applies
238
and solving business problems.
sensitivity analysis techniques to solve business challenges
3.4.1 Different research methodologies, tools and techniques are properly applied in exercising critical judgment in the resolution of complex problematic situations.
Explains research process Explains research process, and design research with tested hypothesis using real business case, develops research instruments for data collection.
Explains research process, design research with tested hypothesis using real business case, develops research instruments for data collection, and tests research instrument
3.4.2 Research methods and techniques are properly applied in reporting and presenting the required results in agreed format.
Develops research problem and research design
Develops research problem and research design, and writes research proposal
Develops research problem and research design, write research proposal, explains research analysis techniques, and produces report
4.1.1 Users’ requirements are clearly analyzed for program development.
Examines user objectives Examines user objectives, and identify user resources
Examines user objectives, identifies user resources, and identify user contents
4.1.2 Skills and Prepares a programming Prepares a programming Prepares a programming
239
knowledge of designing and building application programs are properly applied
environment environment, and plans for application program
environment, plans for application program, designs an application program and write a program(coding).
4.1.3 An application program is properly tested and implemented.
Installs designed program Installs designed program, login data to test its effectives
Installs designed program, login data to test its effectives and execute (compile) program
4.2.1 Designed application program is properly monitored and evaluated.
Checks for routine errors Checks for routine errors, and documents the errors
Checks for routine errors, documents the errors, and examines the program performance
4.2.2 Application programs are properly maintained.
Checks required update Checks required update and performs necessary updates
Checks required update, performs necessary updates, and reports changes performed accordingly
5.1.1 Computer network system for an organization is properly designed.
Explains technical issues associated with virtual local area networks, switching and other tools
Explains technical issues associated with virtual local area networks, switching and other tools
Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN
240
of, LAN and WAN internetworking.
of, LAN and WAN internetworking, and explains cost, implementation, benefits and disadvantages of wide area and local area network.
internetworking, explains cost, implementation, benefits and disadvantages of wide area and local area network, explain the role of different Layers of OSI Network model, and applies design technologies concepts to develop computer network system
5.1.2 Computer network system is properly installed, tested and implemented.
Applies hardware network connectivity technologies to implement network system
Applies hardware network connectivity technologies to implement network system, explains and applies software tools to implement network system
Applies hardware network connectivity technologies to implement network system, explains and apply software tools to implement network system, and applies tools to test implemented network system
5.2.1 Security mechanism is properly established
Explains issues related to threats and vulnerabilities to computer networks.
Explains issues related to threats and vulnerabilities to computer networks, and explains the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms,
Explains issues related to threats and vulnerabilities to computer networks, explains the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms, Kerberos key exchange to ensure maximum network security
241
Kerberos key exchange to ensure maximum network security.
applies security mechanism and techniques to control and manage the security mechanism.
5.2.2 The network systems are correctly troubleshot
Identifies the problem by checking the settings and options.
Identifies the problem by checking the settings and options, and describes the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing.
Identifies the problem by checking the settings and options, describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing, detects and use diagnostic tools and equipment to identify and analyze network malfunctions, and applies software and hardware tools to recover the problem
5.2.3 Network systems are properly Evaluated and Maintained
Analyzes current system and organization requirements to identify system upgrade requirements
Analyzes current system and organization requirements to identify system upgrade requirements, performs upgrade installation, tests effectiveness and functionality of upgrade, and documents results
Analyzes current system and organization requirements to identify system upgrade requirements, perform upgrade installation, tests effectiveness and functionality of upgrade, and document results, and evaluates system performance and produce performance report.
242
5.3.1 Appropriate Multimedia systems are properly designed to solve specific business problems
Describes basic concepts and domains in Multimedia
Describes basic concepts and domains in Multimedia and explain the techniques used to create and combines different media types.
Describes basic concepts and domains in Multimedia, explain the techniques used to create and combines different media types, and implements design theories by building interactive web–based multimedia product.
5.3.2 Business problems are appropriately evaluated to be solved by multimedia tools
Assess practicability of multimedia applications using contemporary hardware and software.
.
Assesses practicability of multimedia applications using contemporary hardware and software, and assess impact of multimedia applications to enhance business process performance.
Assesses practicability of multimedia applications using contemporary hardware and software, asses impact of multimedia applications to enhance business process performance, and assess implementation issues surrounding key facets of multimedia design, including interface design.
6.1.1 Wireless systems are properly designed to solve business problems.
Identifies user requirements for the system development
Identifies user requirements for the system development and Examine the resources for the design.
Identifies user requirements for the system development, examines the resources for the design and implements program for business resolution
6.1.2
Wireless transmission is properly applied in solving business
Explain business processes as related to mobile computing
Explains business processes as related to mobile computing and explains the concept of
Explains business processes as related to mobile computing, explains the concept of wireless communication to
243
problems. wireless communication to support connectivity to mobile networks and wireless internet.
support connectivity to mobile networks and wireless internet and applies the principles of transaction and e-commerce over wireless devices to support e-business
6.1.3 Wireless transmission systems are correctly evaluated
Assesses systems integrity
Assesses systems integrity and monitors system log files.
Assesses systems integrity, monitor system log files and evaluates systems availability
6.2.1 Performance of Mobile systems developed is assessed.
Integrates all required resources
Integrates all required resources and improves resource accessibility time.
Integrates all required resources, improves resource accessibility time and reports system performance
6.2.2 Business performance after mobile computing implementation assessed.
Checks business growth Checks business growth and checks cost improvement after implementation
Checks business growth, checks cost improvement after implementation and checks level of business competitiveness in the global market
12.0 MODULES DESCRIPTION
CODE : HDIT 711
NAME : DISCRETE MATHEMATICS AND STATISTICS
NO OF CREDITS : 15
244
SUB-ENABLING OUTCOMES
3.3.1 Apply information technology in mathematical contexts
3.3.2 Explain the logical and systematic approach to solving problems in particular simple combinatorial problems.TEACHING AIDS:
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures and demonstration
REFERENCES:
1. Gossett,E(2009), Discrete Mathematics with Proof, Second Edition, John Wiley & Sons, United Kingdom2. Gupta, S.C and Kapoor, V.K (2007), Fundamentals of mathematical Statistics, 11th Edition, Sultan Chand and
Sons. India.3. Johnsonbaugh,R (2008) ,Discrete Mathematics, 8th edition, Macmillan- London4. Kenneth,H (2007) ,Discrete Mathematics and its Applications, Sixth Edition, McGraw-Hill,Asia.5. Susanna, S(2011), Discrete Mathematics with Applications, Fourth Edition, Brooks/Cole,Boston.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 712
NAME : BUSINESS COMMUNICATON
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
245
2.2.1 Apply writing and presentation skills for effective communication
2.2.2 Make effective presentations in international business
TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, demonstration and role model
REFERENCES
1. Gilbald.(2006);MLA Handbook for writers of Research Paper Edition, Mod Lang Association of America.2. Guffey, Mary Ellen.(2006);Business Communication Process and Product 5th Edition, South-Western Los Angels.3. Madhukerr RK.(2005);Business Communication and Customer,1st ed., Vikas Publishing house, New Dethi.4. Munter,M.(2006);Guide to Managerial Communication Effective Business Writing and Speaking ,Prentice Hall New
Jersey-USA.5. Urmila,Rai S.M(2006);Business Communication: Himalaya Publishing, New,Dethi.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 713
NAME : COMPUTER GRAPHICS DESIGNING
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
2.1.1 Design graphics in media such as print digital or motion pictures.
246
2.1.2 Decorate products
2.1.3 Assemble images, motion graphics
TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, demonstration and role model
REFERENCES
1. Asthana, R & Sinha,N (2007) Computer Graphics For Scientists And Engineers, Second Edition New Age International Publisher-USA.
2. Cunningham, S (2007); Computer Graphics: Programming in OpenGL for Visual Communication, Prentice Hall New Jersey -USA.
3. Edward, A (2008) Interactive Computer Graphics: A Top-down Approach with OpenGL, 5th Edition, Addison-Wesley,NY
4. Hill,F &Kelley, S (2006); Computer Graphics Using OpenGL, 3rd Edition, Prentice New Jersey -USA.
5. Lengye, E (2006); Mathematics for 3D Game Programming and Computer Graphics, 3rd Edition, California.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 714
NAME : OPERATING SYSTEMS CONFIGURATION
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES1.1.1Install Operating Systems1.1.2 Create users with their rights
247
1.2.1 Administer users1.2.2 Secure Operating Systems components1.2.3 Assess systems performance and diagnose faults
TEACHING AIDSChalk board ,flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. Galvin,S( 2011) “Operating System Concepts” 8th Edition, John Wiley and Sons Cleveland, OH-USA.
2. Stallings,W ( 2009),Operating Systems: Internals and Design Principles 5th Edition, Prentice Hall, New Jersey.
3. Stallings.W (2011); Operating Systems: Internals and Design Principles 6th Edition Prentice Hall, New Jersey.
4. Tanenbaum,A &.Woodhull, A (2008) “Operating Systems Design and Implementation” Third Edition Prentice Hall, New Jersey,USA.5. Tanenbaum,A (2008) “Modern Operating Systems”, 3rd Edition, Prentice Hall Press, Atlanta-USA.
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 721
NAME : DEVELOPMENT STUDIES
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
248
2.2.3 Interrelate different development studies concepts to manage business
2.2.4 Apply techniques to manage different social development challenges
TEACHING AIDS
Chalk board ,flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. Chambers, R. (2005); Ideas for Development, Earthscan, London.2. Crocker, D. A. (2008); Ethics of Global Development: Agency, Capability and Deliberative Democracy, Cambridge
University Press, Cambridge.3. Peet, R. with Hartwick, E. (2009) Theories of Development, Contentions, Arguments , Alternatives. Second Edition,
Guilford Press, New York and London.4. Smith, J. (2008) Social Movements for Global Democracy, John Hopkins University Press, Baltimore-USA.5. Willis, K. (2005) Theories and Practices of Development, Routledge, London and New York-USA.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 722
NAME : PRINCIPLES OF ACCOUNTING
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES249
4.2.1 Prepare financial statements for business4.2.2 Identify and describe legal aspects of company formation, shares and bonus.TEACHING AIDS
Chalk board ,flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB
2. Jat, R.B. and Jugu, Y.A. (2008); Modern Financial Accounting: Theory and Practice. Jos: Ehindero (Nig.) Limited
3. Jugu, Y. G. (2008); Financial Accounting Synopsis 2nd Edition, Jos Ehindero Ltd (Nig.)
4. Raimes Jane,(2006);Financial Accounting Prentice Hall New Jersey-USA.
5. Wood Frank, Alan Sangster,(2005);Business Accounting 10th Edition Prentice Hall, New Jersey-USA.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 723
NAME : ARTIFICIAL INTELLIGENCE APPLICATIONS
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
3.1.1 Interrelate Intelligent Algorithms tool to business problem.250
3.1.2 Apply methods for encoding knowledge in computer systems TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. Elaine,R &Kevin,K((2009),Artificial Intelligence (2nd ed.),McGraw Hill, NY
2. Macmillan, R(2009) Artificial Intelligence,(3rd ed.),Prentice Hall, London
3. Wesley,G(2008), Artificial Intelligence (6th ed.), Addison Wesley, NY
4. Wesley,P(2007), Artificial Intelligence(7th ed.),Addison Wesley, NY.
5. Stuart, R &Peter,N(2010), Artificial intelligence: a modern approach, (2nd Edition), Prentice Hall, USA
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 724
NAME : QUANTITATIVE TECHNIQUES
NO OF CREDITS : 15
SUB-ENABLING OUTCOME
251
3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems.
3.2.2 Design quantitative models of estimation and forecasting for decision making. TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. Denzin NK, Lincoln YS (2009). Handbook of Qualitative Research. Sage Publications London.
2. Nkwi P, et al (2008) Field Research into Social Issues: Methodological Guidelines.
3. Osborne,J (2007),Best Practices in Quantitative Methods,
4. Pope C,& Mays N (2009) Qualitative Research in Health Care. London: BM
5. Richard. I. Levin & David. S. Rubin(2006) Statistics for Management,7th Edition ,Pearsons,New Delhi. Washington, DC.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 725
NAME : FIELD ATTACHMENT
NO OF CREDITS : 320
SUB-ENABLING OUTCOMES
252
6.3.1 Apply ICT skills to support organization applications and infrastructure.
6.3.2 Maintain and evaluate system optimum performance
INTEGRATED METHOD OF ASSESSMENT:
Employers work certificate - 40% Report - 30% Internal supervisor assessment - 30%
CODE : HDIT 731
NAME : MULTIMEDIA SYSTEMS DESIGN
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES253
5.3.1.Design appropriate multimedia systems to solve specific business problems.
5.3.2. Evaluate business problems to be solved by using multimedia tools
TEACHING AIDS
Chalk board ,flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. Agnew,P& Keller,P man.(2006);Distributed Multimedia: Technologies, Applications, and Opportunities in the Digital Information Industry,2nd ed, Addison Wesley,NY.
2. Banerji,A & Ghosh,A (2010) Multimedia Technologies 3rd Edition McGraw Hill, New Jersey-USA.
3. Gibbs,J& Dionysion C. (2005); Multimedia Programming 2nd Edition Addison Wesley, New Jersey-USA
4. Halsall,F (2007);Multimedia Communications: Applications, Networks, Protocols and Standards,3rd Edition ,Addison Wesley,NY-USA.
5. Jeffcott,J (2007); Multimedia In Practice :Technology and. Applications, First Edition Prentice Hall New Jersey..
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 732
NAME : PROGRAMMING WITH JAVA
NO OF CREDITS : 15
254
SUB-ENABLING OUTCOMES
4.1.1 Analyze user requirements for program development.
4.1.2 Apply skills and knowledge of designing and building application programs.
4.1.3 Test and Implement application programs
TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration.
REFERENCES
1. Bruce Eckel(2010);Thinking in Java 4th Edition O'Reilly Cambridge-USA.
2. David Flanagan(2007) ;Java in a Nutshell ,4th Edition, : O'Reilly Cambridge-USA.
3. David Poplawski,(2009); Objects Have Class, An Introduction to Programming with Java, Fourth Edition McGraw-Hill,Columbus-USA.4. John Lewis and William Loftus(2008);Java Software Solutions, Foundations of Program Design, 2nd Edition. , Addison-Wesley,NY-USA.5. Vlada Matena, Sanjeev Krishnan.(2007);Applying Enterprise JavaBeans, Second Edition Addison Wesley NY-USA.
NTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 733
NAME : RESEARCH METHODOLOGY
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
255
3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations.
3.4.2 Apply research methods techniques in reporting and presenting the required results in agreed format.TEACHING AIDS
Chalk board ,flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. Burke J, Larry C (2010);Educational Research: Quantitative, Qualitative, and Mixed Approaches2. Burton, D & Steve Bartlett(2009);Key Issues for Education Researchers,4th Edition, SAGE Publications Ltd Darville-USA. 3. Denscombe, M (2007);The good research guide: for small-scale social research projects McGraw-Hill International ,Columbus –USA.4. Gary, T (2009); How to do your research project: A guide for students in education and applied social sciences 2nd Edition, SAGE
Publications Ltd, London. 5. Ian,B (2008); Questionnaire Design: How to Plan, Structure and Write Survey Material for Effective Market Research,Kogan Page
Publishers, London.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 734
NAME : COMPUTERIZED ACCOUNTING
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
256
4.2.1 Prepare financial statements for business
4.2.2 Identify and describe legal aspects of company formation, shares and bonus.
TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES:
1. Carol,Y & Susan,C (2007),Computer Accounting Essentials with Microsoft Office Accounting, (1st ed.),McGraw Hill,NY2. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB.
3. Raimes J,(2006);Financial Accounting Prentice Hall New Jersey-USA.
4. Robert,H (2009),Accounting Information Systems,(3rd ed.)McGraw Hill,NY
5. Wood, F. and Alan S. (2005); Business Accounting 1 (10th ed.),Prentice Hall,London.
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 741
NAME : NETWORKING MANAGEMENT
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
257
5.11 Design the network system for the organization.
5.1.2 Install, test and implement the system5.2.1 Establish security mechanism5.2.2 Troubleshoot the network systems6.1.4 Evaluate and Maintain network systems.TEACHING AIDSChalk board ,flip chart, overhead projector and computer.METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration REFERENCES
1. Alexander, C (2006); Network Management Fundamentals,1st Edition,Cisco Press, Indiana-USA.2. Gerard, B (2008);Network Management 100 Success Secrets - the Complete Guide to Network Management
Software, Tools, Systems, Services and Performance Management,1st Edition, Emereo Pty Limited Brisbane Australia.
3. Joseph, D (2006); Network Troubleshooting Tools: 3rd Edition, O'Reilly Media Inc, Cambridge. 4. Neal, A (2009 );Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems
2nd Edition NJ-USA.5. Udupa, D(2006); Network Management Systems Essentials,2nd Edition, McGraw-Hill, New York, NY:
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 742
NAME : ENTREPRENEURSHIP DEVELOPMENT
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES2.3.1 Prepare business plans
258
2.3.2 Apply marketing skills to market products. 2.3.3 Apply skills for overcoming business challenges.TEACHING AIDSChalk board ,flip chart, overhead projector and computer.METHODS OF INSTRUCTION:This module will be conducted through lectures, discussion and demonstration REFERENCES
1. André van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, New York-USA.
2. Lawrence, A& Webber (2005),Business and Society 11th Edition, McGraW, Hill NJ.
3. Norman W (2009), Entrepreneurship and Local Economic Development, 11th Edition, Rowman & Littlefield Maryland-USA..
4. Randall G (2007) Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA.
5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press, Atlanta-USA
INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 743
NAME : MOBILE COMPUTING
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES
259
6.1.1 Evaluate performance of mobile systems developed6.1.2 Assess business performance after mobile computing implementation
TEACHING AIDS
Chalk board ,flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES
1. André van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, New York-USA.
2. Lawrence,A& Weber,J (2005),Business and Society 11th Edition, Mc GraW, Hill NJ.
3. Norman W (2009), Entrepreneurship and Local Economic Development , 11th Edition, Rowman & Littlefield Maryland-USA..
4. Randall G (2007)Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA.
5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press,Atlanta-USA
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
CODE : HDIT 744
NAME : PROJECT MANAGEMENT
NO OF CREDITS : 15
SUB-ENABLING OUTCOMES260
6.2.1 Assess business performance requiring ICT enhancement6.2.2 Implement ICT concepts in solving business problems.TEACHING AIDS
Chalk board, flip chart, overhead projector and computer.
METHODS OF INSTRUCTION:
This module will be conducted through lectures, discussion and demonstration
REFERENCES:
1. Anuj S.(2008);Enterprise Contract Management: A Practical Guide to Successfully Implementing an ECM Solution, 1st Edition, New York-USA.
2. Gerry, K and Steve R (2009); Advanced Project Portfolio Management and the PMO,2nd Edition NJ-USA.3. Howard G. (2008);Project Management for Designers and Facilities Managers, third edition, ‘Reilly Media-USA.4. Schragenheim, E, et al (2009). Supply chain management at warp speed: integrating the system from end to end,2nd
Edition Cleverand-USA.5. Sturdy, A et al (2009);Management Consultancy,1st Edition Oxford University Press-UK
INTEGRATED METHOD OF ASSESSMENT:
Continuous Assessment - 40% End of Semester Examination – 60%
BACHELOR DEGREE (NTA LEVEL 8) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.
261
1.0BACKGROUND INFORMATIONThe philosophy behind the development of competent modular curricular is to comply with the Nation’s Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs.
Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills.
The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that “ given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn”. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria.
The present review covers NACTE Technical Award (NTA) level 8 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization.
The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.
This qualification has 120 credits which is the minimum prescribed by NACTE.
2.0MODULE CODING
The coding of modules follows logical sequence as in the following example for BDIT 811.
262
BDIT = Stands for Bachelor Degree in Information and Communication Technology
8 = The first digit stands for the NTA level, in this case Bachelor Degree which is level eight.
1 = The second digit stands for semester, i.e. for semester one.
1 = The last digit stands for the order of the module in the semester. Modules are arranged serially from 1 to the highest number, upon the number of modules in the semester.
3.0GRADING OF ASSESSMENT RESULTS
The grading of assessment results is in conformity with the NACTE grading system as follows.
NTA Level 8
Grade Definition Score
A Excellent 75 ─ 100
B+ Very Good 65 ─ 74
C Good 55 ─ 64
D Average 40 ─ 54
F Failure 00 ─ 39
I Incomplete
4.0AWARDS
The award shall be made to students who satisfy the following conditions.263
Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.
5.0AWARDS CLASSIFICATION:
Awards Classification for NTA level 8
Class of Awards Cumulative GPA
First Class 4.4 to 5.0
Upper Second Class 3.5 to 4.3
Lower Second Class 2.7 to 3.4
Pass 2.0 to 2.6
6.0SUMMARY FRAMEWORK
QUALIFICATION BACHELOR DEGREE IN INFORMATION & COMMUNICATION TECHNOLOGY
264
PURPOSE OF QUALIFICATION This qualification is intended for persons who will analyze, interpret and make decisions, design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve complex problems, apply design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets without supervision.
NTA LEVEL 8
COMPETENCE LEVEL DESCRIPTOR The holder of this qualification will apply knowledge and skills in a wide and unpredictable variety of contexts to design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve routine problems, use design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets and assume personal responsibility, responsibility for the work of others, and the responsibility in the allocation of resources, policy formulation, planning, execution and evaluation.
CREDITS AT THIS LEVEL 120
CUMULATIVE CREDITS AT
THIS LEVEL
0
265
MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL
0
DATE THE QUALIFICATION
STANDARD LAST REVIEWED
New
ENTRANCE
REQUIREMENTS NTA LEVEL 7 in Information and Communication Technology.
7.0 PRINCIPAL LEARNING OUTCOMES AND CREDITS VALUES AND ASSESSMENT CRITERIA
266
S/NO PRINCIPAL LEARNING OUTCOMES CREDITS VALUES
ASSESSMENT CRITERIA
1 Design and manage a distributed system that fulfills
requirements with regard to key system properties
15 Distributed systems that fulfill requirements
with regard to key system properties is clearly
designed and managed.
2 Design and manage web applications by applying current
web technologies and programming techniques.
15 Web applications that apply current web
technologies and programming techniques are
clearly designed and managed
3 Apply software engineering techniques, design tools and software development processes to develop software
30 3.1 Software development tools, models and
processes are properly applied to develop
software
3.2 Object oriented techniques are properly
applied to develop software
3.3 Object oriented analysis and design using
UML are properly applied to develop
software
3.4 Object oriented programming with JAVA is
properly applied to develop software
4 Apply management information system concepts to
manage information systems including E-business, and
develop IT projects in a contemporary business setting
45 4.1 E-business concepts are properly applied
to manage business systems
4.2 Principles of MIS are properly applied in
decision making and business needs
clearly identified
267
4.3 IT projects are properly designed and
implemented to overcome business
challenges
5 Apply various technologies to implement appropriate
security measures within an organization
15 5.1 Various technologies and security
measures are properly applied to
implement appropriate security measures
within an organization.
TOTAL CREDITS 120
8.0 PROGRAM STRUCTURE
268
SEMESTER I
S/NO CODE NAME OF MODULE CREDITS
1 BDIT 811 Distributed Systems management 15
2 BDIT 812 Web programming 15
3 BDIT 813 Software Engineering 15
4 BDIT 814 Object Oriented Database Management Systems 15
TOTAL CREDITS SEMESTER I 60
SEMESTER II
1 BDIT 821 E-Business Management 15
2 BDIT 822 Management of Information Systems 15
3 BDIT 823 IT Security Management 15
4 BDIT 824 Project Development 15
TOTAL CREDITS SEMESTER II 60
GRAND TOTAL CREDITS FOR NTA LEVEL 8 120
269
9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES:PRINCIPAL OUTCOMES ENABLING OUTCOMES SUB-ENABLING OUTCOMES
1.1. Design and manage a distributed system that fulfills requirements with regard to key system properties
1.1. Explain understand the basics of distributed systems
1.1.3 Apply the concept of distributed systems1.1.4 Identify examples of distributed systems1.1.5 Discuss the pros and cons of distributed systems
1.3 Explain system architecture and communication
1.3.1 Explain the concept of system autonomy in distributed systems1.3.2 Describe distributed computing and programming concepts1.3.3 Explain design issues with distributed systems1.3.4 Describe models of distributed systems1.3.5 Explain inter-process communication in distributed systems
1.3. Explain replication, consistency and distributed shared memory systems.
1.3.1 Explain replications and their reasons1.3.2 Apply consistency models1.3.3 Analyze distributed system implementation models
1.4 Design distributed file systems
1.4.1 Explain the concept of distributed file system1.4.2 Describe file services types in distributed systems1.4.3 Discuss and classify issues in distributed file systems
1.5 Explain fault tolerant systems
1.5.1 Describe faults, errors, and failures1.5.2 Explain failure models in distributed systems1.5.3 Apply hardware reliability models1.5.4 Apply recovery mechanisms.
2.1 Design and manage web applications by applying current web technologies and programming techniques
2.1 Design web applications 2.1.4 Apply web technology concepts in web design2.1.5 Apply web development tools in web design
2.2. Manage websites 2.2.1 Apply the concept of website management2.2.2 Apply access control mechanisms2.2.3 Manage users of websites
2.2.4 Analyze management of website contents
270
2.2.5 Manage website updates.3.1 Apply software
engineering techniques, and design tools, and software development process to develop software
3.2. Apply different software development methodologies
5.1.5 Apply software development tools5.1.6 Apply various software development models5.1.7 Apply the steps in the requirements analysis process5.1.8 Design software information systems
5.2 Apply software engineering techniques
5.2.1 Apply object oriented techniques in software development5.2.2 Apply agile software development techniques to develop software5.2.3 Apply object oriented concepts using UML do describe software
development processes5.3 Apply the Unified
Modeling Language concept
5.3.1 Apply object oriented analysis and design with UML5.3.2 Discuss object oriented programming with JAVA
5.4 Apply the concept of object orientation
3.4.1 Describe objects and classes of software systems
3.4.2 Explain inheritance, polymorphism, and message passing3.4.3 Describe UML diagrams in software development
3.5 Explain object oriented database management systems
3.5.1 Apply the concept Object Oriented Database Management Systems3.5.2 Design Object Oriented Database Management Systems
4 Apply management information system concepts to manage information systems including E-Business and IT projects in a contemporary business setting
4.1 Assess business information needs
4.1.1 Analyze current e-business situations4.1.2 Identify Business e-application needs4.1.3 Apply various e-business application in contemporary business settings4.1.4 Discuss the advantages and disadvantages of e-business
4.2 Ability to deploy MIS solutions
4.2.1 Analyze current business situations4.2.2 Identify Business information needs4.2.3 Explain different information systems4.2.4 Apply various information systems in business
4.3 Apply MIS principles in decision making
4.3.1 Explain the principles of MIS4.3.2 Apply the MIS principles in making decisions
5 Apply various technologies to implement appropriate security
5.1 Detect security threats 5.1.1 Discuss common security threats5.1.2 Explain different types of security threats5.1.3 Assess the effects of security threats
5.2 Apply various 5.2.1 Apply various security technologies
271
measures within an organization
technologies to implement security measures within an organization
5.2.2 Identify security resources for safeguarding of information systems
5.3 Inspect and protect information assets
5.3.1 Explain the role of data in an organization5.3.2 Describe different information assets5.3.3 Inspect information systems for security threats5.3.4 Implement mechanisms to protect information systems from security
threats
10.0 ASSESSMENT CRITEIA AND ASSESSMENT INSTRUMENTSSUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT ASSESSMENT ASSESSMENT
272
CRITERIA METHOD INSTRUMENTS
1.1.1 Apply the concept of distributed systems
Explain a distributed system Identify types of distributed
systems Discuss the features of distributed
system.
The concept of distributed system is clearly applied
Oral questioning,
group discussions,
buzz sessions
Model answers
1.1.2 Identify the types of distributed systems
Mention examples of distributed systems
Discuss types of distributed systems
Compare distributed systems with other systems
Types of distributed systems properly given
Oral questioning,
group discussions,
buzz sessions
Assignments, Test and Examinations
1.1.3 Discuss the pros and cons of distributed systems
Identify advantages of distributed systems
Identify disadvantages of distributed systems
Apply the limitations of distributed system in design process
The pros and cons of the distributed systems are thoroughly discussed
Questions
Group discussion
Check list
Model answers
1.2.1 Explain the concept of system autonomy in distributed systems
Define system autonomy Explain the concept of system
autonomy in distributed systems Explain the functions of system
autonomy
The concept of system autonomy in distributed systems is clearly explained
Group discussion
Assignments
Assignments, Test and Examinations
1.2.2 Explain distributed computing and programming concepts
Explain the concept of distributed computing
Explain the concept of programming
Describe different programming technology
Distributed computing and programming concepts are clearly explained
Assignments, and exercises
Model answers
1.2.3 Explain design issues with distributed systems
Discuss the known design issues in distributed systems
Describe the issues in distributed
Design issues with distributed systems
Demonstration Assignments.
Model answers, checklist
273
system Explain the role of design issues in
distributed system.
clearly explained
1.2.4 Describe models of distributed systems
Apply the models of distributed systems
Describe the distributed systems resources
Apply the architectural, interactive and fault models
Models of distributed systems clearly described
Demonstration Assignments.
Demonstration, model answers
1.2.5 Explain inter-process communication in distributed systems
Define communication Explain communication in
distributed systems Describe process communications
Inter-process communication in distributed systems clearly explained
Assignments, discussion, brainstorming
Model answers
1.3.1 Explain replication and their reasons
Apply the concept of replication Discuss the reasons for replication Explain the importance of
replication concept
Replication and their reasons are clearly explained
Assignments, presentations
Model answers
Assignments.
tests
1.3.2 Apply consistency models Define models Mention common consistency
models Describe the models Describe consistency protocols
Consistency models clearly applied
Demonstrations, assignments,
discussions
model answers
1.3.3 Analyze distributed system implementation model
Explain distributed system Describe distributed model system Explain the function of distributed
model.
Distributed system implementation is clearly analyzed
Demonstration
assignment
Model answers
Examination
1.4.1 Explain the concept of distributed file system
Explain a file system Explain distribution of resources in
a system Describe files in a distributed
system
The concept of distributed file system clearly explained
Demonstrations, assignments,
Discussions
Assignments,
Test and Examinations
274
1.4.2 Describe file service types in distributed systems
Explain a file service Mention common file service types Describe file service types in a
distributed system
File service types in distributed systems clearly described
Demonstrations, assignments,
discussions
Assignments,
Discussions
Test and Examinations
1.4.3 Discuss and classify issues in distributed file systems
Explain reasons for using distributed file systems
Discuss design issues with distributed file systems
Identify types of file system
Issues in distributed file systems thoroughly discussed
Demonstrations, assignments,
Discussions
Assignments,
Test and Examinations
1.5.1 Describe and classify faults, errors, and failures and classify faults
Explain faults , errors and failure in distributed systems
Identify faults Describe the identified faults
Faults, errors and failures are clearly described and classified
Demonstrations, assignments,
Discussions
Assignments, Test and Examinations
1.5.2 Explain failure models in distributed systems
Apply system failure concept Explain failure models in
distributed systems Describe different models applied
in distributed system
Failure models in distributed systems clearly explained
Demonstrations, assignments,
Discussions
Demonstration, case studies, test, assignments
1.5.3 Apply hardware reliability models in distributed system
Define hardware Apply hardware reliability concept Mention known hardware
reliability models
Hardware reliability models properly applied
Demonstrations, assignments,
Discussions
Demonstrations, Assignments, Test and Examinations
1.5.4 Apply recovery mechanisms in distributed system
Define recovery Explain what is a recovery
mechanism Discuss common recovery
mechanism in a distributed system
Recovery mechanisms correctly applied
Demonstrations, assignments,
Discussions
Case studies, demonstration, study tours Test and Examinations
2.1.1 Apply web technology concepts in web design
Explain the concept of computer networking
Explain the concept of resource
Web technology concepts are properly applied in
Assignments, and exercises
Model answers
275
networking Define world wide web Describe internet facilities
web design
2.1.2 Apply web development tools in web design
Apply HTML tags Apply PHP tool Apply Knowledge of SQL basics Apply Java Scripts
Web development tools are properly applied
Assignments, practical sessions
Model answers, checklist
2.2.1 Apply the concept of website management
Discuss web hosting issues Apply website management tools Analyze content of management
issues
The concept of website management is properly applied
Assignments, Model answers
2.2.2 Apply access control mechanisms
Discuss administrative rights issues Discuss different privileges Discuss security policy issues
Access control mechanisms are properly applied
Assignments, presentations
Model answers
2.2.3 Manage user s of website Explain Password management Create, delete users Provide passwords and access
rights to users Modify user details
Users of the website are properly managed
Practical sessions, assignments
Demonstration, model answers
2.2.4 Analyze management of website contents
Explain upload and download issues
Explain forms and password issues Explain telnet, ftp
Management of website contents properly analyzed
Assignments, Test and Examinations and model answers
Demonstration, model answers
2.2.5 Manage website updates Describe website update tools Explain and apply HTML Explain and apply PHP Apply Knowledge of Dreamweaver
Website updates are properly managed
Assignments, exercises and model answers
Demonstration, model answers
3.2.1. Apply software development tools
Explain software development lifecycle (SDLC)
Explain structured software development techniques
Explain object oriented software development techniques
Software development tools are properly applied
Assignments, exercises and model answers
Demonstration, model answers
276
3.1.2 Apply various software development models
Explain waterfall model Explain V-Model Describe Prototyping
Various software development models are properly applied
Assignments, Test and Examinations
Demonstration, model answers
3.1.3 Apply the steps in the requirements analysis process
Apply requirements elicitation concept
Explain user’s role in the requirements definition
Explain the role of documentation in requirements definition
The steps in the requirements analysis process are properly applied
Assignments, Test and Examinations
Model answers, checklist
3.1.4 Design software information systems
Apply design techniques Explain object oriented design Apply structured design techniques
Software information systems are properly designed
Assignments, Test and Examinations
Model answers, checklist
3.2.1 Apply object oriented techniques
Explain objects Explain classes Describe UML diagrams
Object oriented techniques are properly applied
Assignments, Test and Examinations
Model answers, checklist
3.2.2 Apply agile software development techniques
Apply Dynamic System Development Method (DSDM)
Apply extreme Programming (XP) method
Explain agile techniques in software development
Agile software development techniques are properly applied
Assignments, Test and Examinations
Model answers, checklist
3.2.3 Apply object oriented concepts using UML to describe software development process
Apply cases, Apply actors Apply UML diagrams
Object oriented techniques using UML are properly applied
Assignments, Test and Examinations
Model answers, checklist
3.3.1 Apply object oriented analysis and design with UML
Explain the objects Explain the classes apply the use cases and other UML
diagrams
Object oriented analysis and design is properly applied
Assignments, Test and Examinations
Model answers, checklist
277
using UML
3.3.2 Discuss object oriented programming with JAVA
Declare comments in JAVA Declare classes and objects in JAVA Explain inheritance Explain JDK
Object oriented programming with JAVA is clearly discussed
Assignments, Test and Examinations
Model answers, checklist
3.4.1 Describe objects and classes of software systems
Apply object methods Apply object properties Explain message passing function
Objects and classes are clearly described
Assignments, Test and Examinations
Model answers, checklist
3.4.2 Explain inheritance, polymorphism, message passing in object orientation
Apply object orientation concepts Explain objects Explain classes
Inheritance, polymorphism, and message passing are clearly explained
Assignments, Test and Examinations
Model answers
3.4.3 Describe UML diagrams in software development
Apply object orientation concepts Explain class diagrams Explain collaborative diagrams Understand deployment diagrams Explain use cases
UML diagrams are clearly described
Assignments, Test and Examinations
Model answers
3.5.1 Apply the concept of Object Oriented Database Management Systems
Define OODBMS Explain the function of OODBMS Describe features of OODBMS
The concept of OODBMS are clearly applied
Exercise
examination
Modal answers
3.5 .2 Design Object Oriented Database Management Systems
Explain OODBMS Explain the relationship between
objects and classes Apply inheritance concept.
OODBMS are properly designed
Exercise
Test
model answers
checklist
4.1.1 Analyze current e-business situations
Analyze the operations of current e-business
E-business situations Assignments, Test Case studies,
278
Identify the gap between expected situation and the current situation
Apply knowledge of ICT to gather e-applications needs
clearly analyzed and Examinations demonstration, study tours Test and Examinations
4.1.2 Identify business e-applications needs
Discuss different business e-applications needs
Apply information systems techniques in capturing data
Discuss different models for capturing data
Business e-applications needs identified
Assignments, Test and Examinations
Case studies, demonstration, study tours Test and Examinations
4.1.3 Apply various e-business applications in contemporary business settings
explain use of e-applications in business
Discuss different e-business systems
Explain different information technology that support e-business
E-business applications applied contemporary business settings
Assignments, Test and Examinations
Case studies, demonstration, study tours Test and Examinations
4.1.4 Discuss the advantages and disadvantages of e-business
Discuss the pros and cons of e-application
Discuss the strengths of e-applications
Compare e-application with traditional applications
Advantages and disadvantages of e-business discussed
Assignments, Test and Examinations
Case studies, demonstration, study tours Test and Examinations
4.2.1 Analyze current business situations
Analyze the operations of current system
Identify the gap between expected situation and the current situation
Apply knowledge of system analysis and design to capture data
Current business situations are properly analyzed
Exercises
assignment
checklist
Model answers
4.2.2 Identify business information needs
Discuss different business information systems
Apply information systems techniques in capturing data
Discuss different models for capturing data
Business information needs
are clearly identified
Group work
Examination
Demonstrations, Assignments, Test and Examinations
4.2.3.Explain different information Define a system Different information Exercises questions and model
279
systems Explain information system Differentiate between information
and a system
systems are properly explained
assignment
answers
4.2.4 Apply various information systems in business
explain use of information system in business
Discuss different information system that support business
Explain different information technology that support business
Various information systems in business are properly applied
assignment
exercise
Demonstrations, Assignments, Test and Examinations
4.3.1 Explain the principles of MIS Define MIS Discuss uses of MIS in business
organization Identify different types of MIS
Principles of MIS are clearly explained.
Exercise
assignment
model answers
4.3.2Apply the MIS principles in making decisions
Explain the function of MIS in an organization.
Discuss the role MIS in decision making.
Discuss steps in decision making
Principles of MIS in making decisions are properly applied
Assignment
Group discussion
Model answers
checklist
5.1 .1 Discuss common security threats
define security threats Identify common threats Classify threats
Security threats are thoroughly discussed
Exercise
Test
Model answers
Checklist
5.1.2 Explain different types of security threats
Describe security threats Understand the causes of threats Classify security threats according
to their causes
Different types of security threats are clearly explained
assignment
exercise Demonstrations, Assignments, Test and Examinations
5.1.3 Asses the effects of security threats
Describe the importance of security Apply appropriate measures to
prevent/minimize threats Identify different sources of threats
Effects of security threats are properly assessed
Assignment
Group discussion
Model answers
Checklist
5.2.1 Apply various security technologies
Define security technology Identify different features of
security technology
Various security technologies are
Exercise Answers
280
Discuss different security technology
properly applied assignment Checklist
5.2.2 Identify security resources for safeguarding information systems
Describe IT in relation to security Discuss different Information
technologies used to safeguard information systems.
Discuss different technology used to safeguard information system
Security resources for safeguarding information systems are clearly identified.
exercise
assignment Demonstrations, Assignments, Test and Examinations
5.3.1 Explain the role of data in an organization
Define data Apply the concept of data quality Discuss different uses of data
The role of data in an organization, is clearly explained
Group work
exercise
model answers
checklist
5.3.2 Describe different information assets
Define information assets Identify different information
assets within an organization Discuss the functions of
information assets
Information assets are clearly described.
Exercise
assignment
checklist
modal answers
5.3.3 Inspect information systems for security threats
Identify different security threats Discuss the behavior of Information
systems before and after security threats.
Apply different techniques in inspection
information systems for security threats are properly inspected
Practical exercise
Group work
Demonstrations, Assignments, Test and Examinations
5.3.4 Implement mechanisms to protect information systems from security threats
Apply different security measures Identify strong and weak security
measures Discuss the effects of applying
weak security measures in information systems
Mechanisms to protect information systems are properly implemented
exercise
assignment
Demonstrations, Assignments, Test and Examinations
281
11.0 BENCHMARKING OF ASSESSMENT CRITERIA
S/NO ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT
1.1.1 The concept of distributed system is clearly applied
Explains the concept of distributed system
Explains the concept of distributed systems and identifies types of distributed systems
Explains the concept of distributed systems, identifies types of distributed systems and discusses the features of distributed systems
1.1.2 The types of distributed systems properly identified.
Mentions the examples of distributed systems
Mentions the examples of distributed systems and discusses the types of distributed systems
Mentions the examples of distributed systems, discusses the types of distributed systems and compares distributed systems with other systems
1.1.3 The pros and cons of the distributed systems are thoroughly discussed
Identifies the advantages of distributed systems
Identifies the advantages and disadvantages of distributed systems
Identifies the advantages, disadvantages of distributed systems and the limits of distributed systems
1.2.1 The concept of system autonomy in distributed systems is clearly explained
Defines system autonomy concept
Defines system autonomy concept, explains the concept of system autonomy on distributed systems
Defines system autonomy concept, explains the concept of system autonomy on distributed systems, and explains the importance of system autonomy
1.2.2 Distributed computing and programming concepts are clearly explained
Explains the concept of distributed computing
Explains the concept of distributed computing, and the concept of distributed programming
Explains the concept of distributed computing, the concept of distributed programming, and describes different programming technologies
1.2.3 Design issues with distributed systems clearly explained
Mentions the known design issues in distributed systems
Mentions the known design issues in distributed systems, and describes the
Mentions the known design issues in distributed systems, describes the issues in distributed systems, and explains the
282
issues in distributed systems
role of design issues in distributed systems
1.2.4 Models of distributed systems clearly described
Mentions the models of distributed systems
Mentions the models of distributed systems, and describes the distributed systems resources
Mentions the models of distributed systems, describes the distributed system resources and describes the architectural, interactive and fault models
1.2.5 Inter-process communication in distributed systems clearly explained
Defines communication
Defines communication and explains communication in distributed systems
Defines communication, explains communication in distributed systems and describes process communications
1.3.1 Replication and their reasons are clearly explained
Explains the concept of replication
Explains the concept of replication and discusses the reasons for replication
Explains the concept of replication, discusses the reasons for replication, and explains the importance of replication
1.3.2. Consistency models clearly applied Defines models Defines models and explains, mentions common consistency models
Defines models, explains mentions common consistency models and describes the models
1.3.3 Distributed system implementation models clearly analyzed
Explains the concept of distributed systems
Explains the concept of distributed systems and describes distributed system models
Explains the concept of distributed systems, describes distributed system models and explains the functions of distributed system models
1.4.1 The concept of distributed file system clearly explained
Explains an file system
Explains a file system and explains distribution of resources in a system
Explains a file system, explains distribution of resources in a system, and describes files in a distributed system
1.4.2 File service types in distributed systems clearly described
Explains a file service Explains a file service, and mentions common file
Explains a file service, mentions common file service types, and describes file
283
service types service types in a distributed system
1.4.3 Issues in distributed file systems properly discussed
Explains reasons for using distributed file systems
Explains reasons for using distributed file systems and explains design issues with distributed file systems
Explains reasons for using distributed file systems, explains design issues with distributed file systems and identifies types of file systems
1.5.1 Faults, errors and failures are clearly described and classified
Defines faults, errors and failures
Defines faults, errors and failures, explains these in a distributed system environment
Defines faults, errors and failures, explains these in a distributed system environment and identifies and describes identified faults
1.5.2 Failure models in distributed systems clearly explained
Applies system failure concepts
Applies system failure concepts and explains failure models in distributed systems
Applies system failure concepts, explains failure models in distributed systems and describes different models applied in distributed systems
1.5.3 Hardware reliability models properly applied
Defines the term hardware
Defines the term hardware and applies hardware reliability concepts
Defines the term hardware, applies hardware reliability concepts and mentions common hardware reliability models
1.5.4 Recovery mechanisms correctly applied
Defines recovery concept
Defines recovery concept and explains what is a recovery mechanism
Defines recovery concept, explains what is a recovery mechanism and discusses common recovery mechanisms in distributed systems
2.1.1 Web technology concepts are properly applied in web design
Explains the concept of computer networking and resource networking
Explains the concept of computer networking and resource networking and defines the world wide web (www)
Explains the concept of computer networking and resource networking and defines the world wide web (www) and describes internet facilities
284
2.1.2 Web development tools are clearly applied
Applies HTML tags Applies HTML tags, PHP tools and SQL basics
Applies HTML tags, PHP tools and SQL basics and java scripts
2.2.1 The concept of website management is properly applied
Discusses web hosting issues
Discusses web hosting issues and applies website management tools
Discusses web hosting issues, applies website management tools and analyses contents of management
2.2.2 Access control mechanisms are properly applied
Discusses administrative rights issues
Discusses administrative rights issues and discusses different privileges
Discusses administrative rights issues, different privileges and security policy issues
2.2.3 Users of the website are properly managed
Explains password management
Explains password management and creates, modifies and deletes users
Explains password management , creates, modifies and deletes users and provides access rights to users
2.2.4 Management of website contents properly managed
Explains upload and download issues
Explains upload and download issues and understands forms and password issues
Explains upload and download issues, understands forms and password issues and explains telnet, ftp
2.2.5 Website updates are properly managed
Describes website update tools
Describes website update tools and explains and applies PHP and HTML
Describes website update tools and explains and applies PHP and HTML and applies knowledge of Dreamweaver
3.1.1 Software development tools are properly applied
Explains software development life cycles (SDLC)
Explains software development life cycles (SDLC) and structured software development tools
Explains software development life cycles (SDLC) and structured software development tools with examples
3.1.2 Various software development models are properly applied
Explains waterfall model
Explains waterfall model and V-model
Explains waterfall model, V-model and describes prototyping
3.1.3 The steps in the requirements Applies requirements Applies requirements Applies requirements elicitation concepts, 285
analysis process are properly applied
elicitation concepts elicitation concepts,
and explains user’s role in the requirements definition
explains user’s role in the requirements definition and the role of documentation in requirements definition
3.1.4 Software information system are properly designed
Applies design techniques
Applies design techniques and explains object design
Applies design techniques, explains object design, and applies structured design techniques
3.2.1 Object oriented techniques using UML are properly applied
Explains objects Explains objects and classes Explains objects ,classes, and describe UML diagrams
3.2.2 Agile software development techniques are properly applied
Applies dynamic system development method(DSDM)
Applies dynamic system development method(DSDM) and extreme programming (XP) method
Applies dynamic system development method (DSDM) ,eXtreme programming (XP) method and explains agile techniques in software development.
3.2.3 Object oriented techniques using UML are properly applied
Applies cases Applies cases, and actors Applies cases ,actors, and UML diagrams
3.3.1 Object oriented analysis and design using UML is properly applied
Explains the objects Explains the objects and classes
Explains the objects ,classes, applies the use cases and other UML diagrams
3.3.2 Software development process using UML is properly applied
Applies object oriented concepts
Applies object oriented concepts and explains the UML diagram
Applies object oriented concepts, explains the UML diagram and applies class methods and properties
3.3.3 Object oriented programming with JAVA is clearly discussed
Declares, comments and objects in JAVA
Declares, comments , classes, objects in JAVA and explains inheritance
Declares, comments , classes, objects in JAVA ,explain inheritance and JDK
3.4.1 Objects and classes are clearly Applies object Applies object methods Applies object methods ,properties and
286
described methods and properties explains message passing function
3.4.2 Inheritance, polymorphism and message passing are clearly explained
Applies object orientation concepts
Applies object orientation concepts and explain objects
Applies object orientation concepts, explain objects and classes
3.4.3 UML diagrams are clearly described Applies object orientation concepts and explains class diagrams
Applies object orientation concepts, explains class diagrams and collaborative diagrams.
Applies object orientation concepts, explains class diagrams ,collaborative diagrams ,deployment diagrams and explains use cases
3.5.1 The concept of OODBMS are clearly applied
Explains OODBMS Explains OODBMS and function.
Explains OODBMS, f unction and describes features
3.5.2 OODBMS are properly designed Explains OODBMS Explains OODBMS and the relationship between objects and classes
Explains OODBMS and the relationship between objects, classes and applies inheritance concept.
4.1.1 E-business situations clearly analyzed
Analyses the operations of current e-business
Analyses the operations of current e-business and identifies the gap between expected situation and the current situation
Analyses the operations of current e-business, identifies the gap between expected situation, and the current situation and applies the knowledge of ICT to gather e-applications needs
4.1.2 Business e-applications needs identified
Discusses different business e-applications
Discusses different business e-applications and applies e-business techniques in capturing data
Discusses different business e-applications, applies e-business techniques in capturing data and discusses different models for capturing data
4.1.3 E-business applications applied contemporary business settings
Explains the use of e-applications in business
Explains the use of e-applications in business and discusses different e-
Explains the use of e-applications in business, discusses different e-business systems and explains different
287
business systems information technology that support e-business
4.1.4 Advantages and disadvantages of e-business discussed
Discusses the pros and cons of e-applications
Discusses the pros and cons of e-applications and discusses the strengths of e-applications
Discusses the pros and cons of e-applications, discusses the strengths of e-applications and compares e-applications with traditional applications
4.2.1 Current business situations are properly analyzed
Analyses of the operations of current system
Analyses of the operations of current system and identify the gap between expected situation and the current situation,
Analyses of the operations of current system and identify the gap between expected situation and the current situation and applies knowledge of system analysis and design to capture data.
4.2.2 Business information needs are clearly identified
Discuss different business information systems
Discuss different business information systems and apply information systems techniques in capturing data.
Discuss different business information systems, apply information systems techniques in capturing data and discuss different models for capturing data.
4.2.3 Different information systems are properly explained
Defines a system Defines a system and explain information system
Defines a system, explain information system and differentiate between information and a system
4.2.4 Various information systems in business are properly applied
Explains use of information systems in business
Explains use of information systems in business and discusses different information system that support business
Explains use of information systems in business, discusses different information systems that support business and explains different ITthat support business.
4.3.1 Principles of MIS are clearly explained
Defines MIS Defines MIS and discuss uses of MIS in business
Defines MIS ,discuss uses of MIS in business organization and identifies
288
organization different types of MIS
4.3.2 Principles of MIS in making decision are properly applied
Explains function of MIS in an organization
Explains function of MIS in an organization and discusses the role of MIS in decision making
Explains function of MIS in an organization ,discusses the role of MIS in decision making and discusses steps in decision making
5.1.1 Security threats are thoroughly discussed
Defines security threats
Defines security threats and identifies common threats
Defines security threats , identifies common threats, and classifies security threats
5.1.2 Different types of security threats are clearly explained
Describes security threats
Describes security threats and understands the causes of threats
Describes security threats, understands the causes of threats and, classifies security threats according to their causes.
5.1.3 The effects of security threats are properly assessed
Describes the importance of security
Describes the importance of security and applies appropriate measures to prevent or to minimize threats
Describes the importance of security, applies appropriate measures to prevent or to minimize threats, and identifies different sources of threats
5.2.1 Various security technologies are properly applied
Describes the importance of security
Describes the importance of security and applies appropriate measures to prevent/minimize threats
Describe the importance of security ,applies appropriate measures to prevent /minimize threats and identifies different sources of threats
5.2.2 Security resources for safeguarding information systems are clearly identified
Describes IT in relation to security
Describes IT in relation to security and identifies different information technologies used to safeguard information systems
Describes IT in relation to security , identifies different information technology used to safeguard information systems and discusses different technologies used to safeguard information system
289
5.3.1 The role of data in an organization is clearly explained
Define data Define data and applies the concept of data quality
Define data, applies the concept of data quality and discusses different uses of data.
5.3.2 Information assets are clearly described
Defines information assets
Defines information assets and identifies different information systems within an organization.
Defines information assets, identifies different information systems within an organization, and discusses the functions of information assets
5.3.3 Information systems for security threats are properly inspected
Identifies different threats
Identifies different security threats and discusses the behavior of information systems before and after security threats
Identify different threats and discuss the behavior of information systems before and after security threats and applies different techniques in inspection.
5.3.4 Mechanisms to protect information systems are properly implemented
Applies different security measures
Applies different security measures, and identifies strong and weak security measures
Applies different security measures, identifies strong and weak security measures and discusses the effects of applying weak security measures in information system
290
NTA LEVEL 8
12.0 MODULES DESCRIPTION
CODE: BDIT 811
NAME: DISTRIBUTED SYSTEMS MANAGEMENTNUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES:
1.1.1 Apply the concept of distributed systems1.1.2 Identify the examples of distributed systems1.1.3 Discuss the pros and cons of distributed systems1.2.1 Explain the concept of systems autonomy in distributed systems1.2.2 Describe distributed computing and programming concepts1.2.3 Discuss design issues with distributed systems1.2.4 Describe models of distributed systems1.2.5 Explain inter-process communication in distributed systems1.3.1 Explain replication and the reasons for replication1.3.2 Apply consistency models1.3.3 Analyze distributed systems implementation models1.4.1 Explain the concept of distributed file systems1.4.2 Describe file service types in distributed systems1.4.3 Discuss and classify issues in distributed file systems1.5.1 Describe faults, errors and failures1.5.2 Classify faults1.5.3 Explain failure models in distributed systems1.5.4 Apply hardware reliability models1.5.5 Apply recovery mechanisms
291
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION
This module will be conducted through class lectures, demonstrations and practical work in the computer laboratory under close supervision of
the lecture.
REFERENCES;
1. Blair, G.S., F. Costa, G. Coulson, H. Duran, et al, (2005), “The Design of a Resource-Aware Reflective Middleware Architecture”, Proceedings
of the 2nd International Conference on Meta-Level Architectures and Reflection, St.-Malo, Springer-Verlag, France.
2. Coulouris, G. et al , (2000), Distributed Systems : Concepts and Design, Third Edition, 2000, Books News Inc, USA
3. George Coulouris, Jean Dollimore and Tim Kindberg, (2000), Distributed Systems: Concepts and Design, Addison Wesley, USA
4. Mullender, S (2009), Distributed Systems, 2nd Edition, Longman Group United Kingdom, UK
5. Tanenbaum, A & Martin, V (2007); Distributed Systems- Principles and Paradigms; 2nd Edition, Pearson Prentice Hall, New Delhi, India
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60%
292
CODE: BDIT 812
NAME: WEB PROGRAMMING
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES
2.1.1 Apply web technology concepts in web design
2.1.2 Apply web development tools in web design
2.1.3 Discuss the standardization process of websites
2.2.1 Apply the concept of website management
2.2.2 Apply access control mechanisms
2.2.3 Manage users of websites
2.2.4 Analyze management of website contents
2.2.5 Manage website updates
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION
This module will be conducted through class lectures, tutorials, demonstrations and practical work in the computer laboratory under close
supervision of the lecture.
293
REFERENCES;
1. Jackson, J (2006), Web Technologies: A Computer Science Perspective. Prentice Hall, New Delhi, India.
2. O'Reilly, T and John, B (2004), Opening Welcome: State of the Internet Industry. In San Francisco, California, USA
3. Paul, G andShriram, K (2001), “Programming the Web with High-Level Programming Languages”. Proceedings of ESOP 2001. India.
4. Scott, Dand Sharp, R (2002); Abstracting application-level Web security. In Proceedingsof 11th ACM International World Wide Web
Conference, Hawaii,USA,
5. Sebesta, R (2007), Programming the World Wide Web (4th Edition). Addison Wesley, McGraw-Hill Co, USA.
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60
294
CODE: BDIT 813
NAME: SOFTWARE ENGINEERING
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES:
3.1.1 Apply software development tools
3.1.2 Apply various software development models
3.1.3 Apply the steps in the requirement analysis process
3.1.4 Design software information systems
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION
This module will be conducted through lectures, tutorials, practical work in the computer laboratory under close supervision of the lecture and
fields during vacations.
295
REFERENCES;
1. Carlo, G; Jazayeri, M and Mandrioli, D (2003), Fundamentals of Software Engineering, 2nd International Edition, Pearson Education, Prentice-
Hall, United Kingdom.
2. Lauesen, R.S ((2005), Software requirements: Styles and Techniques , 4th Edition, Addison-Wesley Pub Co. USA
3. Pressman, R. S (2005). Software Engineering: A Practitioner's Approach , 6th edition, Boston, Mass: McGraw-Hill, USA
4. Roger, P.S (2009), Software Engineering –A practitioner’s Approach, 5th edition, Pearson Publishing Co. LTD, UK.
5. Sommerville, I (2007) , Software Engineering,8th Edition , Pearson Education, Harlow, England
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60%
296
CODE: BDIT 814
NAME: OBJECT ORIENTED DATABASE MANAGEMENT SYSTEMS
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES:
3.2.1 Apply object oriented techniques in software development3.2.2 Apply agile software techniques to develop software3.2.3 Apply object oriented concepts using UML to describe software development processes3.3.1 Apply object oriented analysis and design with UML3.3.2 Discuss object oriented programming with JAVA5.4.1 Describe object and classes of software systems5.4.2 Explain inheritance, polymorphism and message passing 5.4.3 Describe UML diagrams in software development5.4.4 Apply objects and classes in preparing class diagrams3.5.1 Apply concept of Object Oriented Database Management System3.5.2 Design Object Oriented Database Management Systems
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION
This module will be conducted through class lectures, tutorials, and practical work in the computer laboratory under close supervision of the
lecture or tutorial assistants.
297
REFERENCES;
1. Ambler, S. W (2004). The Object Primer: Agile Model Driven Development with UML 2. Cambridge University Press, UK
2. Booch, G, et al(2000) OMG Unified Modeling Language Specification, Version 1.3 First Edition Pearson Co. UK
3. Elmasri, R&Navathe, S.B (2000), Fundamentals of Database Systems (3rd Edition), Addison-Wesley, USA
4. Jacobson, I, Grady B &James Rumbaugh (2000). The Unified Software Development Process. Addison-Wesley New Jersey, USA.
5. Penker, M and Hans-Erik E (2000), Business Modeling with UML, John Wiley & Son, USA.
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60%
298
CODE: BDIT 821
NAME: E-BUSINESS
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES:
4.1.1 Analyze current business e-applications
4.1.2 Identify business e-applications needs
4.1.3 Explain different information systems
4.1.4 Apply various e-business applications in contemporary business settings.
4.1.5 Discuss the advantages and disadvantages of e-applications.
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION
This module will be conducted through class lectures, case studies, tutorials and practical work in the computer laboratory under close
supervision of the lecture.
299
REFERENCES;
1. Eastlake, D. E (2010), 3rd and T. Goldstein. ECML v1.1: Field specifications forE-commerce, London School of Business, UK
2. Kalakota, R & Robinson, M (2000), E-Business 2.0: Roadmap for Success, 2nd Edition, Addison-Wesley professional; UK
3. Lynda M. A (2002), Excerpts from the E-business Handbook, The St. Lucie Press, Fair Association, Inc, USA
4. Minoli, D and Minoli, E (2008) Web Commerce Technology Handbook, TataMcGraw-Hill, New Delhi, India.
5. Rosen, A (2000), The E-commerce Question and Answer Book, American Management Association, USA.
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60%
300
CODE: BDIT 822
NAME:MANAGEMENT INFORMATION SYSTEMS
NUMBER OF CREDITS: 30
SUB-ENABLING OUTCOMES:
4.2.1 Analyze current business situations
4.2.2 Identify business information needs
4.2.3 Explain different information systems
4.3.1 Explain the principles of MIS in making decisions
4.3.2 Apply various information systems in business
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
METHODS OF INSTRUCTION:
This module will be conducted through class lectures, field tours and practical work in the computer laboratory under close supervision of the
lecture.
301
REFERENCES:
1. Davis,G.B (2006), The Blackwell Encyclopedia of Management, Management Information Systems (Blackwell Encyclopedia of Management)
Volume 7, Wiley-Blackwell, United Kingdom
2. Effy, O (2008), management Information Systems, Sixth Edition, Course Technology, McGraw-Hill ,USA.
3. Jessup, Leonard M.; Joseph S. Valacich (2008), Information Systems Today, 3rd Edition, Pearson Publishing Co, United Kingdom.
4. O’Brien, J (2009), Management Information Systems – Managing Information Technology in the Internetworked Enterprise,( 7th Edition ),
Boston: Irwin McGraw-Hill, USA
5. O’Brien, J.A., &George M.M (2008). Management Information Systems, 8th Edition. New York: McGraw-Hill, USA.
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60%
302
CODE: BDIT 823
NAME: INFORMATION TECHNOLOGY SECURITY MANAGEMENT
NUMBER OF CREDITS: 15
SUB-ENABLING OUTCOMES:
5.1.1 Discuss common security threats
5.1.2 Explain different types of security threats
5.1.3 Assess the effects of security threats
5.2.1 Apply various security technologies
5.2.2 Identify security resources for safeguarding information systems
5.3.1 Explain the role of data in an organization
5.3.2 Describe different information assets
5.3.3 Inspect information systems for security threats
5.3.4 Implement mechanisms to protect information systems from security threats
TEACHING AIDS:
Chalk board, Overhead projectors, Flip chart stand and power points.
303
METHODS OF INSTRUCTION
This module will be conducted through class lectures, tutorials, observations and practical work in the computer laboratory under close
supervision of the lecture.
REFERENCES;
1. Mansour, O &Ghazawneh, A. (2009) Research in Information Systems: Implications of the constant changing nature of IT capabilities in the
social computing era, Molde University College, Molde, Norway.
2. Schechter, S.E (2004). Computer security strength and risk: a quantitative approach, Ph.D. thesis, Harvard University
3. Stallings (2001), Network Security Essentials, Pearson Education Asia, New Delhi
4. Varian. H System reliability and free riding. In Economics of Information Security. J. Camp, S. Lewis, eds. (Kluwer Academic Publishers, 2004),
vol. 12 of Advancesin Information Security, UK.
5. Varian, H (2000), Managing online security risks; In the New York Times, New York, USA.
INTEGRATED METHOD OF ASSESSMENT
Continuous assessment – 40%
End of Semester exams – 60%
304