new ict curriculum (all levels)

401
COLLEGE OF BUSINESS EDUCATION ICT DEPARTMENT CURRICULUM FOR LEVEL 4-8 2011 1

Upload: ogakhan-nyamu

Post on 09-Nov-2014

157 views

Category:

Documents


5 download

DESCRIPTION

.1 Introduction 7.2 POST 7.3 Preventive Maintenance 7.4 Preventive Maintenance of Peripherals of PC7.5 Fault Finding and Troubleshooting of above Peripherals 7.6 ESD (Electrostatic Discharge) 7.7 Diagnostic Software

TRANSCRIPT

Page 1: New Ict Curriculum (All Levels)

COLLEGE OF BUSINESS EDUCATION

ICT DEPARTMENT

CURRICULUM FOR LEVEL 4-8

2011

1

Page 2: New Ict Curriculum (All Levels)

BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT)

NTA LEVEL 4

2

Page 3: New Ict Curriculum (All Levels)

CURRICULUM INFORMATION REPORT FOR BASIC TECHNICIAN CERTIFICATE IN INFORMATION AND COMMUNICATION TECHNOLOGY (BTCIT)

1.0 BACKGROUND INFORMATION 4

2.0 MODULE CODING 5

3.0 GRADING SYSTEM 6

4.0 AWARDS 6

5.0 AWARDS CLASSIFICATION 7

6.0 SUMMARY FRAMEWORK 7

7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUE AND ASSESSMENT CRITERIA 9

8.0 PROGRAM STRUCTURE 9

9.0 NACTE STANDARDS AND RELATED OUTCOMES 11

10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS 14

11.0 BENCHMARKING OF ASSESSMENT CRITERIA 22

12.0 MODULES DESCRIPTION 28

BTCIT 411 PC Fundamentals 28

BTCIT 412 Introduction to Computer Networking 29

BTCIT 413 Introduction to Communication Skills 30

BTCIT 414 Basic Mathematics 31

BTCIT 415 Office Automation 32

BTCIT 421 Introduction to Programming 34

3

Page 4: New Ict Curriculum (All Levels)

BTCIT 422 Introduction to Entrepreneurship 36

BTCIT 423 Web Design Basics 37

BTCIT 424 Introduction to Computer Maintenance 38

BTCIT 425 Basic Database 39

4

Page 5: New Ict Curriculum (All Levels)

1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competence modular curricula is to comply with the Nation’s Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.

Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.

The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.

The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that “given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn” CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization.

The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year.

5

Page 6: New Ict Curriculum (All Levels)

The level has a minimum number of 120 credits as prescribed by NACTE

1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competence modular curricula is to comply with the Nation’s Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative and flexible work force that will be responsive to the social needs.

Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.

The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.

The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that “given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn” CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 4 for the INFORMATION AND COMMUNICATION TECHNOLOGY specialization.

6

Page 7: New Ict Curriculum (All Levels)

The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated qualification and this accounts for 34 weeks for a year.

The level has a minimum number of 120 credits as prescribed by NACTE

0

2.0 MODULE CODINGThe coding of modules follows logical sequence as in the following example for BTCIT 411

BTCIT = Stands for Basic Technician Certificate in Information Technology

4 = The first digit for the NTA level, in this case Basic Certificate which is level Four.

1 = The second digit stands for semester, i.e for semester one

1 = The last digit stands for the order of the module in the semester. Module are arranged serially the highest number, depending upon the number for modules in the semester.

7

Page 8: New Ict Curriculum (All Levels)

3.0 GRADING SYSTEMThe grading of assessment results in conformity with the NACTE grading system as follows.

4.0 AWARDSThe awards shall be made to students who satisfy the following conditions.

(a) Have completed modules for the award.(b) Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass.(c) GPA shall be computed from cumulative scores earned by students using NACTE guideline.

8

NTA Level 4

Grade Definition Score

A Excellence 80-100

B Good 65-79

C Average 50-64

F Failure 0-49

I Incomplete

Page 9: New Ict Curriculum (All Levels)

5.0 AWARDS CLASSIFICATION:

6.0 SUMMARY FRAMEWORK

9

Awards Classification for NTA Level 4

Class of Award Cumulative GPA

First Class 3.5 to 4.0

Second 3.0 to 3.4

Pass 2.0 to 2.9

Page 10: New Ict Curriculum (All Levels)

4.1 QUALIFICATION BASIC TECHNICIAN CERTIFICATE IN ICT

4.2 PURPOSE OF QUALIFICATION This qualification is intended for persons who will assist in performing routine operational activities with IT equipment and accessories: troubleshoot computer hardware and configure basis network; Install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers; under close supervision. Furthermore more they will assist IT users and solve their own day-to-day IT related challenges.

4.3 NATIONAL TECHNICAL AWARD 4

4.4 COMPETENCE LEVEL DESCRIPTOR The holder of this qualification will assist in performing routine operational activities in IT troubleshoot computer hardware and configure basic network; install computer software; design the web; optimise office procedures; prepare simple programs; maintain computers.

4.5 MINIMUM OVERALL CREDITS 120

4.6 MINIMUM CREDIT AT THIS LEVEL 120

4.7 MINIMUM ENTRY QUALIFICATIONS Form four with at least three passes including mathematics

4.8 DATE OF DEVELOPMENT June 2011

10

Page 11: New Ict Curriculum (All Levels)

7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA

S/N PRINCIPAL LEARNING OUTCOMES CREDIT VALUES ASSESSMENT CRITERIA

PLO 1 Trouble shoot computer hardware and configure basis network

24 1.1 Computer hardware is properly trouble shot, and network properly configured.

PLO 2 Install computer hardware and Software and maintain computers

12 2.1 Computer hardware and software are properly installed

2.2 Computers are properly maintained

PLO 3 Design the web and implement relational database

24 3.1 The web is correctly designed

3.2 The web is clearly coded, evaluated and maintained

3.3 Relational database is properly implemented

PLO 4 Optimise Office Procedures 12 4.1 Ms word, excel are properly entered and formatted

4.2 Ms Power Point is properly applied

PLO 5 Prepare and test simple programs 12 5.1 Simple programs are properly prepared and tested by applying basic VB concepts.

PLO 6 Communicate efficiently and effectively at place of work and apply mathematical

36 6.1 Principles of communication are properly applied

6.2 Entrepreneurship principles are properly applied

Total credit 120

8.0 PROGRAM STRUCTURE SEMESTER I

S/N CODE NAME OF MODULE CREDITS11

Page 12: New Ict Curriculum (All Levels)

1. BTCIT 411 PC Fundamentals 12

2. BTCIT 412 Introduction to Computer Networking 12

3. BTCIT 413 Introduction to Communication 12

4. BTCIT 414 Basic Mathematics 12

5. BTCIT 415 Office Automation 12

TOTAL CREDITS FOR NTA LEVEL 4 SEMESTER II 60

SEMESTER II

S/N CODE NAME OF MODULE CREDITS

1. BTCIT 421 Introduction to Programming 12

2. BTCIT 422 Introduction to Entrepreneurship 12

3. BTCIT 423 Web Design Basics 12

4. BTCIT 424 Introduction to Computer Maintenance 12

5. BTCIT 425 Basic Database 12

TOTAL CREDITS FOR NTA LEVEL 4 SEMESTER II 60

12

Page 13: New Ict Curriculum (All Levels)

9.0 NACTE STANDARDS AND RELATED OUTCOMESPRINCIPAL LEARNING OUTCOMES

ENABLING OUTCOMES SUB-ENABLING OUTCOMES

PLO 1 Troubleshoot computer hardware and configure basic network

1.1 Troubleshoot computer hardware 1.1.1 Detect hardware faults

1.1.2 Correct and report faults

1.2 Configure basic network 1.2.1 Track network resources

1.2.2 Add hardware to existing network

PLO 2 Install computer hardware and software, and maintain computers

2.1 Install computer hardware 2.1.1 Identify different parts of hardware

2.1.2 Describe the functions of different parts of computer software

2.1.3 Connect various parts of computer hardware.

2.2 Install computer software 2.2.1 Describe different types of software

2.2.2 Install computer software

2.3 Maintain computers 2.3.1 Make back-ups

2.3.2 Clean hardware

2.3.3 Defragment files

2.3.4 Protect surging and viruses

PLO 3 Design the web, describe database concepts and implement the relational database design.

3.1 Describe the web 3.1.1 Describe the web and related basic terms

3.1.2 Identify the characteristics and parts of the web.

13

Page 14: New Ict Curriculum (All Levels)

3.2 Identify basic concept of the web 3.2.1 Identify the requirements for design and contents of the web

3.2.2 Identify the classes and types of the web

3.3 Design the web 3.3.1 Plan and design the web

3.3.2 Code the web

3.3.3 Evaluate and maintain the web

3.4 Describe database concepts, Applications, data models, schemas and instances

3.4.1 Describe basic database concepts and applications

3.4.2 Describe data models and schemas

3.5 Describe storage organizations concepts and identify database languages and interfaces.

3.5.1 Describe storage organization concepts.

3.5.2 Identify database, languages and identify interfaces.

3.6 Implement the relational database design and data 3.6.1 Implement relational database design

3.6.2 Implement data modelling using ER models

4.1.1 Describe word processing and a word processor

4.1.2 Start ms word4.1.3 Enter and format text4.2.1 Describe spread sheets4.1.2 Start ms excel4.3.3 Enter and format a spread sheet

14

Page 15: New Ict Curriculum (All Levels)

4.3.4 Apply formulae and functions4.3.1 Describe power point4.3.2 Start ms power point4.3.3 Enter and format slides5.1.1 Describe the structure of VB5.1.2 Apply basic concepts of VB5.1.3 Describe the code writing structures5.2.1 Identify various variables5.2.2 Identify constants5.2.3 Identify various data types5.3.1 Apply functions5.3.2 Apply sub-functions5.4.1 Describing objects5.4.2 Work with objects5.4.3 Create objects5.4.4 Relate objects to each other6.1.1 Apply communication concepts, processes

and skills6.1.2 Take and make notes6.1.3 Make oral presentations6.1.4 Apply reading and writing skills6.2.1 Solve simple operations6.2.2 Work out ratios and conversion expressions6.2.3 Solve fractions and algebraic expressions6.2.4 Apply Business mathematics in real world6.3.1 Describe entrepreneurship6.3.2 Describe basic entrepreneurship issues

15

Page 16: New Ict Curriculum (All Levels)

10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKSUB-ENABLING OUTCOME RELATED TASKS ASSESS MENT CRITERIA ASSESSMENT METHODS ASSESSMENT

INSTRUMENTS

1.1.1 Detect hardware faults Describe hardware fault List possible sources of hardware

faults Describe methods of detecting faults

Hardware faults are correctly detected

Class assignments and exercises

Questions and solutions

1.1.2 Correct and report hardware faults

List different ways of correcting faults

Describe contents of hardware fault Report hardware faults

Faults are correctly corrected and reported

Class assignments and exercises

Questions and solutions

1.2.1 Track network resources and add hardware to existing network

Describe network resources List network resources Add required hardware to the

network

Network resources are correctly described

Class assignments and exercises

Questions and solutions

2.1.1 Identify different parts of hardware

Identify different parts of hardware Describe input devices Describe the CPU Describe Output devices Describe External storage devices Describe Communication devices

Different parts of hardware are clearly identified

Class assignments and exercises

Questions and solutions

2.1.2 Describe the functions of different parts of computer hardware

List functions of Input devices List functions of the CPU List functions of External storage

devices List functions of Communication

devices

The functions of different parts of computer hardware are clearly described

Class assignments and exercises

Questions and solutions

2.1.3 Connect various parts of computer hardware

Identify various parts of hardware Connect together power supply,

CPU, screen, keyboard and mouse Test the system

Various parts computer hardware are correctly connected

Class assignments and exercises.

Questions and solutions

16

Page 17: New Ict Curriculum (All Levels)

2.2.1 Describe different type of software

Describe software Describe system software Describe application software Identify major classes of application

software Explain advantages and

disadvantages of the two types of application software.

Different types of software are clearly described

Class assignments and exercises

Questions and solutions

2.2.2 Install computer software

Explain the preconditions of installing software

Installs software Customize software installation

package Configure software restrictions Enforce properties

Computer software is properly installed

Class assignments and exercises

Questions and solutions

2.3.1 Make back-ups Identify reasons for making back-ups Identify what is to be backed up Explain storage media to be applied Describe back methods (Manual

versus Automatic)

Back-up are properly made Class assignments and exercises

Questions and solutions

2.3.2 Clean hardware Identify various hardware that need cleaning

Identify tools needed for hardware cleaning

Clean mouse Clean keyboard Clean Screen

Hardware are properly cleaned

Class assignments and exercises

Questions and solutions

2.3.3 Defragment files Describe Fragment and Defragmentation

Identify types of causes of fragmentation

Preventing and eliminating fragmentation

Files are correctly defragmented

Class assignments and exercises

Questions and solutions

17

Page 18: New Ict Curriculum (All Levels)

2.3.4

Protect surging and viruses

Describe surging Protect surging Describe viruses Protect viruses

Surging viruses are securely protected

Class assignments and exercises

Questions and solutions

3.1.1

Describe the web and related basis terms

Describe we List types of the web Describe the web terms

The web and related basic terms are clearly described

Class assignments and exercises

Questions and solutions

3.1.2

Identify the characteristics and parts of the web

Identify the characteristics of the web

Identify the parts of the web Describe the contents of the web

page

The characteristics and parts of the web are clearly identified

Class assignments and exercises

Questions and solutions

3.2.1

Identify requirement for design and contents of the web

Identify the requirement for design List contents of the web Describe the contents of the web

page

Requirement for the design and contents of the web are clearly identified

Class assignments and exercises

Questions and solutions

3.2.2

Identify the classes and types of the web

Describe the class of the web site Describe the types of the web site Identify the restrictions in web

design

The classes and types of the web are clearly described.

Class assignments and exercises

Questions and solutions

3.3.1

Plan and design the web Plan the web Design the web Review the design web

The web properly planned and designed

Class assignments and exercises

Questions and solutions

3.3.2

Code the web Code the web program Test the web Review the web

The web is correctly coded Class assignments and exercises

Questions and solutions.

3.3.3

Evaluate and maintain the web

Evaluate the web Monitor the web Maintain the web

The web is properly evaluated and maintained

Class assignments and exercises

Questions and solutions

3.4.1

Apply Database concepts and application

Describe Management Information System

Identify the advantages of Management Information System

Database concepts and applications are correctly applied

Class assignments and exercises

Questions and solutions

18

Page 19: New Ict Curriculum (All Levels)

3.4.2

Apply data models and schemas

List data models Describe data models Describe schemas

Data models and data schemas are correctly described

Class assignments and exercises

Questions and solutions.

3.5.1 Apply and implement storage organisation concept

Describe data flow diagrams Implement data storage structure Evaluated storage structures

Data storage organisation concepts are properly applied

Class assignments and exercises

Questions and solutions.

3.5.2 Identify database language and interfaces

Identify database language and interfaces

Describe database language Describe the interfaces

Database language and interfaces are clearly identified

Class assignments and exercises

Questions and solutions.

3.6.1 Implement relational database design

Describe the design process Identify the steps of the database

design process Describe the steps of the design

process

Relational database is properly designed

Class assignments and exercises

Questions and solutions.

3.6.2 Implement data modelling using ER models

Describe Entity Relationship Describe attributes Implement Relationships

Data modelling is properly implemented using ER model

Class assignments and exercises

Questions and solutions.

4.1.1 Describe word processing and a word processor

Describe the word processor Describe word processing Identify the features of a word

processor

Word processing and processor are clearly described

Class assignments and exercises

Questions and solutions.

4.1.2 Start ms word Start Ms word Load documents Close Ms word

Ms word is properly started Class assignments and exercises

Questions and solutions.

4.1.3 Enter and format text Enter text Format text Save the document

Text is properly entered and formatted

Class assignments and exercises

Questions and solutions

19

Page 20: New Ict Curriculum (All Levels)

4.2.1 Describe Ms excel Describe a spread sheet List the features of a speared sheet List advantages of excel

Ms excel is clearly described

Class assignments and exercises

Questions and solutions

4.2.2 Start ms excel Start Ms Excel Load Ms excel documents Close the spread sheet

Ms excel is properly started Class assignments and exercises

Questions and solutions

4.2.3 Enter and format a spread sheet

Enter data Format the spread sheet Save the spread sheet

Ms excel is properly entered and formatted

Class assignments and exercises

Questions and solutions

4.2.4 Apply formulae, and function

Apply formulae Apply functions Apply charts

Formulae and functions are properly applied

Class assignments and exercises

Questions and solutions

4.3.1 Describe power point Describe power point Identify various aspects of power

point Exit Ms Power Point

Ms Power point is clearly described

Class assignments and exercises

Questions and solutions

4.3.2 Start ms power point Start Ms power point Load power point documents List advantages of Power point

Ms Power point is properly started.

Class assignments and exercises

Questions and solutions

4.3.3 Enter and format slides Enter slides Add and delete slides Format slides

Slides are properly entered and formatted

Class assignments and exercises

Questions and solutions

5.1.1 Describe the structure of VB

Explain basic of VB List basic terminologies of VB Explain basic terminologies in VB

The structure of VB is clearly described

Class assignments and exercises

Questions and solutions.

5.1.2 Apply basic concepts of VB

Identify the structure of VB Star VB Configure environment options Identify code modules

Basic concepts of VB are properly applied

Class assignments and exercises

Questions and solutions.

20

Page 21: New Ict Curriculum (All Levels)

Apply the code editor5.1.3 Describe the code writing

structures Apply decision structures (If… Then,

If….Then Else, Select Case) Apply Loop structures (Do… Loop Apply Loop structure (For…Next, For

each ..Next)

The code writing structures are clearly described

Class assignments and exercises

Questions and solutions

5.2.1 Identify various variables Identify various variables Describe various variables Apply various variables

Various variables are clearly identified

Class assignments and exercises

Questions and solutions

5.2.2 Identify constants Identify various constants Describe various constants Apply various constants

Constants are clearly identified

Class assignments and exercises

Questions and solutions

5.2.3 Identify various data types

Identify data types Describe various data types Apply various data types

Various data types are clearly identified

Class assignments and exercises

Questions and solutions

5.3.1 Apply functions Describe a function Create a sub-function Passing data to a function

Functions are properly applied

Class assignments and exercises

Questions and solutions

5.3.2 Apply sub-functions Describe a sub-function Create a sub-function Passing data to a sub-function

Sub-function are properly applied

Class assignments and exercises

Questions and solutions

5.4.1 Describe objects Describe objects Identify the source of Objects Differentiate between Objects and

Classes

Objects are clearly described

Class assignments and exercises

Questions and solutions

5.4.2 Work with objects Controlling Objects with their Properties

Setting property values Apply Methods in Codes

Objects are properly worked with

Class assignments and exercises

Questions and solutions

21

Page 22: New Ict Curriculum (All Levels)

5.4.3 Create objects Apply object variables Declare object variables Assign object variables List types of objects Apply forms as objects Pass objects to procedures

Objects are properly created

Class assignments and exercises

Questions and solutions

5.4.4 Relate objects to each other

Describe Object Hierarchies Use a collection of Objects Make Objects communicate

Objects are properly related to each other

Class assignments and exercises

Questions and solutions

6.1.1 Apply communication concepts, process and skills

Identify correct tenses Write grammatical correct

sentences Identify the voices (passive/active)

Communication concepts, process and skills are properly applied

Class assignments and exercises

Questions and solutions

6.1.2 Take and make notes Write simple sentences Copy different passages Summarise simple passages

Notes are properly taken and made

Class assignments and exercises

Questions and solutions

6.1.3 Make oral presentations Read passage Respond to questions and answers

verbally Makes short presentations

Oral presentations are properly made

Class assignments and exercises

Questions and solutions

6.1.4 Apply reading and writing skills

Read selected passages Write letters Prepare e-mails

Reading and writing skills are properly applied

Class assignments and exercises

Questions and solutions

6.2.1 Solve simple operations Perform fundamental arithmetic operations

Calculate fractions and mixed numbers

Calculate percentages

Simple operations are correctly solved

Class assignments and exercises

Questions and solutions

6.2.2 Work out ratio and conversion problems

Calculate ratios Calculate proportions Calculate unit analysis

Ratios and conversions are accurately worked out

Class assignments and exercises

Questions and solutions

6.2.3 Solve fractions and algebraic expressions

Calculate fractions Calculate algebraic expressions

Fractions and algebraic expressions are correctly

Class assignments Questions and

22

Page 23: New Ict Curriculum (All Levels)

Apply fractions and algebraic expressions to business problems

solved and exercises solutions

6.2.4 Apply business mathematics in real world problems

Apply business maths in calculating partnership profits

Apply business mathematics in calculating discount, commission simple or compound interest

Business mathematics is properly applied in real world problems

Class assignments and exercises

Questions and solutions

6.3.1 Describe entrepreneurship

Describe entrepreneurship Describe enterprise Describe an entrepreneur

Entrepreneurship is clearly described

Class assignments and exercises

Questions and solutions

6.3.2 Describe basic entrepreneurship issues

Describe entrepreneurial traits Describe entrepreneurial attitudes Describe entrepreneurial

characteristics

Basic entrepreneurship issues are clearly described

Class assignments and exercises

Questions and solutions

6.3.3 Describe the role of entrepreneurship in Tanzania

Identify the roles of entrepreneurship in Tanzania

Identify the importance of entrepreneurship.

Identify problems facing entrepreneurship

The role entrepreneurship Tanzania is clearly described

Class assignments and exercises

Questions and solutions

6.3.4 Run and operate a micro business

Start a micro business Run a micro business Evaluate the micro business

Micro business is properly run and operated

Class assignments and exercises

Questions and solutions

6.3.5 Describe risks rewards and key personal entrepreneurship competences

Identify entrepreneurship risks Identify entrepreneurship rewards Identify key personal competencies

Risks, rewards and key personnel entrepreneurship competencies are clearly described

Class assignments and exercises

Questions and solutions

23

Page 24: New Ict Curriculum (All Levels)

11.0 BENCHMARKING OF ASSESSMENT CRITERIANO. ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT

1.1.1 Hardware faults are correctly detected

Describes hardware faults Describe hardware faults and lists possible sources of hardware faults

Describe hardware faults, lists possible sources of hardware faults and describes methods of detecting faults.

1.1.2 Faults are correctly corrected and reported

Lists different ways of correcting faults

List different ways of correcting faults and describes hardware faults

List different ways of correcting faults, describe hardware faults and reports hardware faults

1.2.1 Network resources are correctly tracked

Describes network resources Describes and lists network resources

Describe, list network resources and adds required hardware to the network

2.1.1 Different parts of hardware are clearly identified

Identifies different parts of hardware

Identifies different parts of hardware, describes the CPU, Input devices and output devices

Identifies different parts of hardware, the CPU, input devices and output device external storage and communication devices.

2.1.2 The functions of different parts of computer hardware are clearly described

List functions of input devices and the CPU

List functions of input devices, the CPU and output devices

List functions of input devices, the CPU, Output devices, external storage units and the communication devices

2.1.3 Various parts of computer hardware are correctly connected

Identifies various parts of hardware

Identifies various parts of hardware and connects together hardware parts

Identify various parts of hardware application software and explains advantages and disadvantages of application software.

2.2.1 Different types of software are Describes Software and system Describes Software and System Describes software, system

24

Page 25: New Ict Curriculum (All Levels)

clearly described software software and application’s software

software, application software and explains advantages and disadvantages of application software

2.2.2 Computer software is properly installed

Explains preconditions of installing software and installs software

Explains preconditions of installing software installs software, customise software installations, and configure software restrictions

Explains preconditions of installing software, installs software, customises software installations, configures software restrictions and enforces properties

2.3.1 Back-up are properly made Identifies reasons for making back-ups

Identifies reasons for making back-ups and explains storage media to be applied

Identifies reasons for making back-ups, explains storage media to be applied and describe back up methods

2.3.2 Hardware are properly cleaned Identifies hardware to be cleaned

Identifies hardware to be cleaned and tools to be used

Identifies hardware to be cleaned and tools to be used and cleans all hardware parts.

2.3.3 Files are correctly defragmented

Describes fragmentation and defragmentation

Described fragmentation and defragmentation and identifies types and causes of fragmentation

Describes, fragmentation and defragmentation and identifies types and causes of fragmentation, and prevents and eliminates fragmentation

2.3.4 Surging and viruses are securely protected

Describe and protects surging Describes, protects surging and describes viruses

Describes, protects surging and describes viruses and protects viruses.

3.1.1 The web and related basic terms are clearly described

Describe the web Describe the web and lists types of the web.

Describes the web, parts of the web and describes characteristics

25

Page 26: New Ict Curriculum (All Levels)

of the web

3.1.2 Characteristics and parts of the web are clearly identified and described.

Identifies characteristics of the web

Identifies characteristics of the web and parts of the web

Identifies characteristics of the web, parts of the web and describes characteristics of the web.

3.2.1 Requirements for the design and contents of the web are Clearly listed

Identifies requirements for the design

Identifies requirements for the design and lists contents of the web page

Identifies requirement for design and lists contents of the web page and describes identifies requirements for the design and lists contents of the web page.

3.2.2 Classes and types of the wed are clearly described

Describes classes of the wed Describes classes of the wed and types of the web

Describes classes of the wed, types of the web and identifies the restrictions of the web design.

3.3.1 The web is properly planned and designed

Plans the web Plans and design the web Plans and design the web and reviews the designed web.

3.3.2 The web is correctly coded Codes the web Codes the web and tests the web

Codes, tests the web and reviews the web

3.3.3 The web properly evaluated and maintained

Evaluates the web Evaluates and monitors the web

Evaluates, monitors the web and maintains the web.

3.4.1 Apply Database concepts and applications

Describes database Describes database, Management Information System

Describe database, Management Information System and identifies advantages of a Management Information System

3.4.2 Apply data models and schemas

List Data models Lists Data models and describes data models

Lists Data models, describes data models and describes schemas

26

Page 27: New Ict Curriculum (All Levels)

3.5.1 Apply and implement storage organisation concepts.

Describes Data flow diagrams properly

Describes Data flow diagrams and implements data storage structures properly.

Describes Data flow diagrams, implements and evaluate data storage structures properly.

3.5.2 Identify database languages and interfaces

Identifies database language and interfaces

Identifies database language and interfaces and describes database languages

Identifies database language and interfaces, and describes database languages and interfaces.

3.6.1 Implement relational database design

Describes the design process Describes the design process and identifies the steps of the database design process

Describe the design process, identifies steps of the design process describes the steps of the design process properly.

3.6.2 Implement data modelling using ER models

Describes entity relationship properly

Describes entity relationship and attributes properly

Describes entity relationship, attributes and implements relationship properly.

4.1.1 Word processing and processor clearly

Describes Word processing Describes Word processing and word processor

Describe Word processing and word processor and identifies features of a word processor.

4.1.2 Ms word is properly started Starts Ms word Starts and loads Ms word documents

Starts, load and exists Ms word

4.1.3 Text is entered and formatted Enters text Enters and formats text Enters and formats text and save Ms word documents.

4.2.1 Ms excel is clearly described Describes Ms Excel Describes and lists features of Ms excel

Describes, lists features and advantages of excel

4.2.2 Ms excel is properly started Starts Ms excel Starts Ms excel and loads Ms excel documents

Starts, loads Ms excel documents and exists Ms excel.

4.2.3 A spread sheet is properly Enters data into Ms excel Enters and formats data Enters and formats data and save

27

Page 28: New Ict Curriculum (All Levels)

entered and formatted Ms excel documents.

4.2.4 Formulae and functions are properly applied

Applies formulae Applies formulae and functions Applies formulae, functions and charts.

4.3.1 Ms Power point is clearly described

Describes Ms power point Describes Ms power point and identifies various aspects of power point.

Describe Ms power point, identifies various aspects of power point and exits power point.

4.3.2 Ms Power point is properly started

Starts Ms Power point is Starts Ms Power point, loads Ms power point

Starts Ms Power point, loads Ms power point and lists advantages of power point

4.3.3 Slides are properly entered and formatted

Enters slides Enters, add and deletes slides Enters, add and deletes and formats slides

5.1.1 The structure of VB is clearly described

Explains the basics of VB Explains the basics of VB and lists terminologies of VB

Explains the basics of VB, lists and explain terminologies of VB

5.1.2 Basic concepts of VB are properly applied

Identifies basic concepts of VB Identifies basic concepts of VB, start and configure environment options of VB

Identifies basic concepts of VB, start configure environment options of VB, identifies code modules, and applies the code editor.

5.1.3 The code writing structures are clearly applied

Applies the code writing structures (If… then, If…Then…Else, Select case)

Applies the code writing structures (If… then, If…Then Else, Select case) and loop structure (Do… Loop)

Applies the code writing structures (If…then, If…then…Else, Select case) and loop structures (Do…Loop, For…Next, For each…Next).

5.2.1 Various variables are clearly identified

Identifies various variables Identifies and describes various variables

Identifies, describes and applies various variables.

5.2.2 Constants are clearly identified Identifies constants Identifies and describes Identifies, describes and applies

28

Page 29: New Ict Curriculum (All Levels)

constants constant

5.2.3 Various data types are clearly identified

Identifies various data types Identifies and describes various data types correctly

Identifies, describes and applies various data types correctly.

5.3.1 Functions are properly applied Describes functions correctly Describes and creates functions correctly

Describes, creates and passes data to Sub-functions correctly.

5.3.2 Sub-functions are properly applied

Describes functions correctly Describes and creates Sub-functions correctly

Describes, creates and passes data to Sub-functions correctly.

5.4.1 Objects are clearly described Described Objects clearly Describes Objects and identifies sources of objects clearly

Describes Objects, identifies sources of objects and differentiates objects and classes clearly.

5.4.2 Objects are properly worked with

Controls objects and their properties properly

Controls objects and their properties properly, and sets property values

Controls objects and their properties properly and sets properly and values and applies methods in codes.

5.4.3 Objects are properly created Applies objects variables and declares object variables

Applies objects variables and declares object variables and lists types of objects correctly

Applies objects variables, declares object variables, lists types of objects, apply forms as objects and passes objects to procedures correctly.

5.4.4 Objects are properly related to each other

Describes objects hierarchies correctly

Describes objects’ hierarchies correctly and uses a collection of objects correctly

Describes objects’ hierarchies correctly, uses a collection of objects and makes objects communicate correctly

6.1.1 Communication concepts, processes and skills are

Identifies correct tenses Identifies correct tenses and writes correct grammatical

Identifies, correct tenses and writes correct grammatical

29

Page 30: New Ict Curriculum (All Levels)

properly applied sentences sentences and identifies voices (passive/active)

6.1.2 Notes is properly taken and made

Writes simple sentences correctly

Writes simple sentences correctly and copies different passages

Writes simple sentences correctly, copies different passage and summarises simple passages.

6.1.3 Oral presentations are properly made

Reads passages correctly Reads passages correctly and responds to questions and answers orally

Reads passages correctly, responds to questions and answers orally, and makes short presentations correctly.

6.1.4 Reading and writing skills are properly applied

Reads selected passages correctly

Reads selected passages and writes letters correctly

Reads selected passages, writes letters and prepares e-mails correctly.

6.2.1 Simple operations are correctly solved

Performs fundamental arithmetic operations

Performs fundamental arithmetic operations and calculates fractions and mixed numbers correctly

Performs fundamental arithmetic operations, calculates fractions and mixed numbers correctly and calculates percentages.

6.2.2. Ratios and conversions and problems are accurately worked out

Calculate ratios correctly Calculates ratios and proportions correctly

Calculates ratio, proportions and unit analysis correctly

6.2.3 Fractions and algebraic expressions are correctly solved

Calculates fractions correctly Calculates fractions and algebraic expressions correctly

Calculates fractions and algebraic expressions and applies functions and algebraic expressions to business problems correctly.

6.2.4 Business mathematics is properly applied in real world problems

Calculates business profits correctly

Calculates business profits and applies ratios in calculating partnership profits correctly

Calculates fractions and algebraic expressions and applies ratios in calculating partnership profits,

30

Page 31: New Ict Curriculum (All Levels)

discounts, commission and simple/compound inters correctly.

6.3.1 Entrepreneurship is clearly described

Describe entrepreneur correctly

Describe entrepreneur and enterprise correctly

Describe entrepreneur, enterprise and entrepreneurship correctly.

6.3.2 Basic entrepreneurship issues are clearly described

Describe entrepreneurship traits correctly

Describe entrepreneurship traits and attitudes correctly

Describe entrepreneurship traits and attitudes correctly and describe entrepreneurial characteristics.

6.3.3 The role of entrepreneurship in Tanzania is clearly described

Describes the roles of entrepreneurship in Tanzania

Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship

Describes the roles of entrepreneurship in Tanzania and identifies the importance of entrepreneurship and identifies the problems facing entrepreneurship

6.3.4 Micro business is properly run and operated

Starts a micro business Starts and run a micro business Start, run and evaluates a micro business

6.3.5 Risks, rewards and key personnel entrepreneurship competencies are clearly described

Identifies entrepreneurship risks.

Identifies entrepreneurship risks and rewards correctly.

Identifies entrepreneurship risks, reward and key personal competencies correctly.

31

Page 32: New Ict Curriculum (All Levels)

CODE : BTCIT 412

NAME : Introduction to Computer Networking

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

1.2.1 Track network resources1.2.2 Add hardware to existing network

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Christo J.P. Moschovitis, History of the Internet: a chronology, 2009, Prentice Hall2. Michael A. Banks, On the way to the web. 2008, A press3. Plattner B, Computer Networks, 2008, Prentice Hall4. Stallings W, Wireless Communication and Networks, 2008, Prentice Hall5. Tanenbaum A.S, Computer Networks, 2005, Prentice Hall

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60%

32

Page 33: New Ict Curriculum (All Levels)

CODE : BTCIT 413

NAME : Introduction to Communication Skills

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

6.1.1. Apply communication concepts, processes and skills6.1.2. Take and make notes6.1.3. Make oral presentations6.1.4. Apply reading and writing skills work

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Davis M, Communication Skills, 2008, New Herbinger Publications, USA2. James C, Mc Coskey, Richmond P, An Introduction to Communication in the classroom: the role of

the communication in Teaching and Training, 2008, Alley and Baco.3. Mahundu C M A, A Manual on Communication Skills – Toward improving Communication Skills in

English Language, 2008, Benedict Fathers, Ndanda, Tanzania.4. Pual P and Korthali J S, Essentials of Business Communication, 2009, Sultan Chand and Sons5. Shumbusho, Mwaijande, Business Communication Skills Hand book, 2003, Mzumbe University.

INTEGRATED METHOD OF ASSESSMENT

33

Page 34: New Ict Curriculum (All Levels)

Continuous assessment 40%

End of semester examination 60%

34

Page 35: New Ict Curriculum (All Levels)

CODE : BTCIT 414

NAME : Basic Mathematics

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

6.2.1 Solve simple operations6.2.2 Work out ratios and conversion problems6.2.3 Solve fractions and algebraic expressions6.2.4 Apply Business mathematics in real world

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES

1. Haemstock, H, Elements of Business Mathematics, 2008, Harrp2. Hughe, R J and Richard, D, Business Maths Essentials, 2008, Irwin Inc3. Mc Keague, C P, Pre Algebra, 2009, Brooke Cole Publishing Company4. Streete, R J, Basic Mathematics Skills with Geometry, 2007, McGraw Hill5. Willace, M, Pills, C, Mathematics for Business, 2008, Gage Education Publish Ltd.

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60%

35

Page 36: New Ict Curriculum (All Levels)

CODE : BTCIT 415

NAME : office Automation

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

4.1.1 Describe word processing and a word processor4.1.2 Start Ms word4.1.3 Enter and format text4.2.1 Describe spread sheets4.2.2 Start Ms excel4.2.3 Enter and format a spread sheet4.2.4 Apply formulae and functions4.3.1 Describe power point4.3.2 Start Ms power point4.3.3 Enter and format slides

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES : 1. Birton P, Introduction to Computers, 2009

2. Cox J. Lambert J, Frye C, Microsoft Office Professional 2010 Step, 2010, Microsoft press3. Doyle S, Understanding information and Communication technology, 2009, Delta Place

Thornes4. McManus S, Microsoft Office for the Older and Wiser: GetUp and Run with Office 2010,

2010 John Wiley.5. Shelly/Cashman/Vermaat, Introduction, Concepts and Techniques, 2008, Microsoft Office

36

Page 37: New Ict Curriculum (All Levels)

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60%

CODE : BTCIT 422

NAME : Introduction to Entrepreneurship

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

6.3.1 Describe entrepreneurship6.3.2 Describe basic entrepreneurship6.3.3 Describe the role of entrepreneurship Tanzania6.3.4 Start and run micro business6.3.5 Describe risk, rewards and key personal entrepreneurship competencies6.2.4 Apply Business mathematics in real world

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES : 1. Backet M, Small Business-Guide to starting your Business, 2008, Macmillan

37

Page 38: New Ict Curriculum (All Levels)

2. Burns P, Entrepreneurship and small Business, 2009, Palgrave3. Owen J, How to Sell, 2011, Prentice Hall4. Robson C, Confession of an Entrepreneur, 2010, Prentice Hall5. William S, Financial Times Guide to Business Plan Start up, 2011, Prentice Hall

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60%

CODE : BTCIT 423

NAME : Web design Basics

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

38

Page 39: New Ict Curriculum (All Levels)

3.1.1 Describe the web and related basic terms3.1.2 Identify the characteristics and parts of the web3.2.1 Identify the requirements for design and contents of the web3.2.2 Identify the classes and types of the web3.3.1 Plan and design the web3.3.2 Code the web3.3.3 Evaluate and maintain the web

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES : 1. Fisel C, Freelance Design in Practice, 2009, Wiley

2. Hardy J A, Carneiro C Jr, Beginning Rails 2: Freom Novice to Professionals, 2009, Wioley

3. Marks T, Good Design: Deconstruction Form and What Makes Design Work, 2009 Wiley

4. Toague J C, Speaking in Styles: Fundamentals of CSS foe Web Designers, 2009, Wiley

5. Wiedemann J, Web Design Navigation, 2009, Wiley

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60%

39

Page 40: New Ict Curriculum (All Levels)

CODE : BTCIT 424

NAME : Introduction to Computer Maintenance

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

2.3.1 Make back-ups2.3.2 Clean hardware2.3.3 Defragment files2.3.4 Protect surging and viruses

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES : 1. Ballew J, Computer problems solved for the over 50’s in Simple Steps, 2011, HP Indigo Digital Press

2. Ballew J, Computer Basics, 2010, HP Indigo Digital Press3. Beales R P, PC Systems, Installation and Maintenance, 2020, Prentice Hall4. Johnson S, Brilliant Office 2010, 2010, Prentice Hall5. Resonthan J, PC Repair and Maintenance, 2010, Media Publications

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60% 40

Page 41: New Ict Curriculum (All Levels)

CODE : BTCIT 425

NAME : Basic Database

NUMBER OF CREDITS : 12

SUB-ENABLING OUTCOMES

7.1.1 Describe basic database concepts and applications7.1.2 Describe data models and schemas7.2.1 Describe storage organisation concepts7.2.2 Identify database languages and interfaces7.3.1 Implement relational database design7.3.2 Implement data modelling using ER models

TEACHING AIDS : Chalk board, flip chart stand, overhead projectors and computer

METHODS OF INSTRUCTION : This module will be conducted through various methods such as lectures demonstrations, discussions, Industrial and group work, study visits to industrial and commercial institutions

REFERENCES : 1. Desai B P, An Introduction to Database Systems, 2008, West Publication Company

2. Group I, Introduction to Database management System, 2008, McGraw Hill

3. Henry F, Silberschatz, Database system Concepts, 2009, McGraw Hill

4. IT Education Solutions Limited, Introduction to Database Systems, Pearson Education India

5. Ullman J D, Principles of Database and knowledge Base Systems, 2009, Computer Systems Press

41

Page 42: New Ict Curriculum (All Levels)

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment 40%

End of semester examination 60%

42

Page 43: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competent modular curricular is to comply with the Nation’s Vision and mission, which

requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible

work force that will be responsive to the Social needs.

Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of

that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge.

Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in

a situation with discipline-transcending new and unknown problems. The foregoing are the problems that the College of Business

Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to

apply knowledge and skills.

The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that

given “Appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn”.

CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. maintain

computers, process files, manage computer networks, apply mathematics in solving computer problems, develop website, develop

database. etc). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 5 for INFORMATON AND COMMUNICATION TECHNOLOGY

specialization.

The qualification comprises of a number of modules, each module will be covered in one semester. For this course, there are 15

weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are

allocated in each semester and accounts for 34 weeks for a year.

This qualification has 120 credits which is the minimum prescribed by NACTE.43

Page 44: New Ict Curriculum (All Levels)

2.0 MODULE CODING

The coding of modules follows logical sequence as in the following example for TCIT 511.

TCIT = Stands for Technician Certificate in Information Technology

5 = The first digit stands for the NTA level, in this case Technician Certificate which is level five.

1 = The second digit stands for semester, i.e. for semester one.

1 = The last digit stands for the order of the module in the semester. Modules are arranged serially

from 1 to the highest number, upon the number of modules in the semester

44

Page 45: New Ict Curriculum (All Levels)

3.0 GRADING OF ASSESSMENT RESULTS

The grading of assessment results is in conformity with the NACTE grading system as follows.

NTA Level 5

Grade Definition Score

A Excellent 80 ─ 100

B Good 65 ─ 79

C Average 50 ─ 64

D Poor 40 ─ 49

F Failure 00 ─ 39

I Incomplete

4.0 AWARDS

The award shall be made to students who satisfy the following conditions.

Have completed modules for the award.

Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass.

GPA shall be computed from cumulative scores earned by students using NACTE guidelines.

45

Page 46: New Ict Curriculum (All Levels)

5.0 AWARDS CLASSIFICATION:

Awards Classification for NTA level 5

Class of Awards Cumulative GPA

First Class 3.5 to 4.0

Second Class 3.0 to 3.4

Pass 2.0 to 2.9

46

Page 47: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

6.0 SUMMARY FRAMEWORK

QUALIFICATION TECHNICIAN CERTIFICATE IN INFORMATION & COMMUNICATION

TECHNOLOGY

PURPOSE OF QUALIFICATION This qualification is intended for persons who will perform some non-routine

activities: develop database systems, design and analyze systems, prepare simple

computer programs, connect peripherals, ports and network hardware

communication systems, and apply office automation software, under less

supervision.

NTA LEVEL 5

COMPETENCE LEVEL

DESCRIPTOR

The holder of the qualification will apply skills and knowledge in a range of ICT

activities some of which are non-routine of developing database systems, designing

and analyzing systems, preparing simple computer programs, connecting

peripherals, ports and network hardware communication systems, applying office

automation software, and assuming some operational responsibilities.

CREDITS AT THIS LEVEL 120

CUMULATIVE CREDITS AT

THIS LEVEL

0

MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL 0

47

Page 48: New Ict Curriculum (All Levels)

DATE THE QUALIFICATION

STANDARD LAST REVIEWED

New

ENTRANCE

REQUIREMENTS

BTCIT level 4, or Form six with one principal pass either in mathematics or physics.

48

Page 49: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND

COMMUNICATION TECHNOLOGY

7.0 PRINCIPAL LEARNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIA

S/N PRINCIPAL LEARNING OUTCOMES CREDIT VALUES

ASSESSMENT CRITERIA

PLO 1 Communicate effectively and efficiently at the place of work and apply Computing mathematics skills in solving business problems.

24

1.1. Communication at the place of work is effectively done.

1.2 Computing mathematics skills are properly applied on solving business problems.

POL 2 Apply system design and maintenance technology in database system development, web design, and analysis and design. 48

2.1 System design technology is

Properly applied.

2.2 Computer maintenance

Technology is properly applied.

2.3 Database system development

is properly applied

2.4 Web is properly designed.

PLO 3 Prepare simple computer programmes using programming languages

12 3.1 Simple computer programs are properly prepared using computer languages.

PLO 4 Connect peripherals and ports to computer network hardware communication system and apply office automation software.

4.1 Computer peripherals and ports are correctly connected to the network hardware communication system.

49

Page 50: New Ict Curriculum (All Levels)

24 4.2 Office automation software is properly applied.

PLO 5 Apply professional ethical security principles in computer use.

12

5.1 Computer professional ethical security principles are properly applied.

PLO 6 Apply knowledge, skills and techniques of all modules learned in the course in a real life situation. -

6.1 Knowledge, skills and techniques of

all modules learned in the course are properly applied in a real life situation.

120

50

Page 51: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND

COMMUNICATION TECHNOLOGY

8.0 PROGRAM STRUCRTURESEMESTER I

S/NO CODE NAME OF MODULE CREDITS

1 TCIT 511 Communication Skills 12

2 TCIT 512 Computing Mathematics 12

3 TCIT 513 Database System Development 12

4 TCIT 514 Computer Maintenance 12

5 TCIT 515 Programming 12

TOTAL CREDITS SEMESTER I 60

SEMESTER II

1 TCIT 521 Advanced Office Automation 12

2 TCIT 522 Web Design 12

3 TCIT 523 Networking 12

4 TCIT 524 Professional Ethics and Security in Computer use 12

5 TCIT 525 System Analysis and Design 12

6 TCIT 526 Practical Project --

TOTAL CREDITS SEMESTER II 60

GRAND TOTAL CREDITS FOR NTA LEVEL 5 120

51

Page 52: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND

COMMUNICATION TECHNOLOGY

9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES :

PRINCIPAL OUTCOMES ENABLING OUTCOMES SUB-ENABLING OUTCOMES

1. Communicate effectively

and efficiently at the place of

work and apply Computing

mathematics skills in solving

business problems.

1.1 Apply

mathematical

Concepts in ICT.

1.1.1 Apply mathematical concepts in

calculation and preparation of

database

1.1.2 Solve basic problems relating to ICTusing mathematical principles

1.2 Apply basic

communication skills.

1.2.1 Apply basic writing skills.

1.2.2 Apply principles and theories involving

business correspondences.

1.2.3 Apply employment communication.

1.2.4 Prepare simple research proposal and

write effective memos, paper

presentations and other business

presentations.

52

Page 53: New Ict Curriculum (All Levels)

2. Apply system design

and maintenance technology in

database system development,

web design, and system

analysis and design

2.1 Detect and correct

Computer faults.

2.1.1 Identify conditions of faults.

2.1.2 Correct computer faults

2.1.3 Analyze the conditions of computer

systems.

2.2 Improve image and

other features in

the website.

2.2.1 Diagnose problems

2.2.2 Design web site that is easy and

effective to use.

2.2.3 Maintain a website.

2.3 Prepare database

systems,

2.3.1 Design data models

2.3.2 Install and test database system

2.3.3 Update existing database.

2.4 Collect information,

analyze and evaluate

existing system.

2.4.1 Prepare system models

2.4.2 Document system problems and

resolution for future reference.

53

Page 54: New Ict Curriculum (All Levels)

3. Prepare simple

computer programs

using programming

languages

3.1. Prepare new

application

programs from

beginning to end.

3.1.1 Create codes that meet system

standards.

3.1.2 Maintain system application

3.1.3 Innovate data visualization

techniques.

4. Connect peripherals

and ports to

computer network

hardware

communication

system and apply

office automation

software

4.1 Apply software for

database and office

automation

4.1.1 Describe types of computer software

4.1.2 Apply file processes

4.1.3 Apply data traffic flow and

coordination

4.1.4 Apply communication equipment

and systems communication

channels

4.2 Build simple network. 4.2.1 Identify tools for building network

4.2.2 Connect workstation

4.2.3 Configure network

4.2.4 Test communication between

workstations

4.3. Create queries and

generate simple

reports

4.3.1 Work with queries in database

4.3.2 Create queries in design view

4.3.3 Prepare simple reports

4.3.4 Save and print simple reports

54

Page 55: New Ict Curriculum (All Levels)

4.4 Administer user

Accounts

4.4.1 Maintain user accounts

4.4.2 Delete/Update user accounts

4.4.3 Assign access right (e.g.

Guest, Administrator, Students)

5. Apply professional

ethical and security

principles in

computer use.

5.1. Maintain

computer systems

5.1.1 Explain computer crime (e.g. Hacking,

cracking)

5.1.2 Solve computer virus problems.

5.1.3. Update/Install antivirus packages

5.1.4 Apply authentication methodologies in

Computer use.

5.2 Apply computer ethical

principles.

5.2.1 Maintain access right in computer

use.

5.2.2 Maintain information privacy and

accuracy

5.2.3 Detect/prevent unauthorized users.

(e.g. intruders)

6.Apply knowledge, skills and techniques of all modules learned in the course in a real life situation.

6.1 Maintain computer

network systems

6.1.1 Connect, Configure, run networked

computers.

6.1.2 Analyze network systems

55

Page 56: New Ict Curriculum (All Levels)

6.2 Make operational

Services

6.2.1 Maintain computer hardware

6.2.2 Connect computer hardware

6.2.3 Update computer software (e.g.

operating systems)

6.2.4 Manage computer networking

6.3 Analyze computer system

communication

6.3.1 Communicate effectively with

organizational Stakeholders (e.g.

INTRANET and EXTRANET)

6.3.2. Apply computing mathematics in

solving computer problems

56

Page 57: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND

COMMUNICATION TECHNOLOGY

10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS

SUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT CRITERIA

ASSESSMENT METHODS

ASSESSMENT INSTRUMENTS

1.1.1 Apply mathematical concepts in calculation and preparation of database.

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems).

Explain sets and relations.

Explain basic number theoretical functions.(e.g the MODE function, GCD, and LCM)

Mathematical concepts in calculation and preparation of database are properly applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

1.1.2 Solve basic problems relating to ICT using mathematical principles

Evaluate basic counting techniques and discrete probability

Explain important

Basic problems relating to ICT are accurately solved using mathematical

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

57

Page 58: New Ict Curriculum (All Levels)

algorithms of graph theory.

Explain Boolean logic and techniques of mathematical proofs.

principles

1.2.1 Apply basic writing skills Apply grammar Construct

sentences Write small texts

Basic writing skills are properly applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

1.2.2 Apply principles and theories involving business correspondence

Write business letters

Write E-mail Write simple

reports Write sales

letters

Principles and theories involving business correspondence are appropriately applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

1.2.3 Apply employment communication

Write employment application letters

Write CV’s Participate in

employment interviews

Search for jobs

Employment communication is properly applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

1.2.4 Prepare simple research proposal and write effective memos, paper presentations

Prepare simple research proposal

Write effective

Simple research proposal and effective memos,

Discussion Presentation Tests and

Quiz

Whiteboard Markerpen Blackboard Chalk

58

Page 59: New Ict Curriculum (All Levels)

and other business presentations.

memo’s Prepare paper

and other business presentations

paper presentation and other business presentations are properly prepared

Assignment Projector Laptop checklist

2.1.1 Identify conditions of faults Define faults Mention

condition of faults

Identify different types of faults

Conditions of faults are correctly identified

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

2.1.2 Correct computer faults Mention types of instrument used

Explain steps of correcting faults

Fix the faults

computer faults are properly

corrected

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

2.1.3 Analyze the conditions of computer systems

Define the computer system

Identify types of computer system

Explain parts of computer system

The conditions of computer systems are clearly analyzed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

2.2.1 Diagnose problems Define problems Describe the

process of fixing problems

Fix problems

Problems are correctly diagnosed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

59

Page 60: New Ict Curriculum (All Levels)

2.2.2 Design website that is easy and effective to use

Define website Explain types of

websites Prepare a simple

website

Website that is easy and effective to use is correctly designed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop Checklist

2.2.3 Maintain a website Run website Update website Secure website

Website is properly maintained

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

2.3.1 Design data models Describe data models

Explain types of data models

Give ways of designing data models

Data models are correctly designed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

2.3.2 Install and test database system.

Explain database system

Describe ways of installing and testing database system

Install and run database system

Database system is properly installed and tested

Discussion Presentation Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

2.3.3 Update existing database Describe the features of databases

Explain methods of updating databases

Apply the methods to update

Existing database is properly updated

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

60

Page 61: New Ict Curriculum (All Levels)

databases2.4.1 Prepare system models Define system

models Identify the types

of system models

Describe methods of preparing system models

Apply the methods to prepare system models

System models are correctly prepared

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

2.4.2 Document system problems and resolutions for future reference.

Explain system problems

Describe resolutions of system problems

Describe methods of system documentation

System problems and resolutions are correctly documented for future reference

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

3.1.1 Create codes that meet system standard

Define codes Explain types of

codes Describe

methods of creating codes using programming languages (e.g Access,VB,Java, C++)

Apply methods of creating codes

Codes that meet system standards are properly prepared

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

3.1.2 Maintain system application Define system System Discussion Whiteboard

61

Page 62: New Ict Curriculum (All Levels)

application Update new

features Troubleshoot

system application.

application is properly maintained

Presentation Tests and

Quiz Assignment

Marker pen Blackboard Chalk Projector Laptop checklist

3.1.3 Innovate data visualization techniques

Define data visualization

Apply data visualization techniques

Apply data visualization techniques

Data visualization techniques are appropriately innovated

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.1.1 Describe types of computer software

Define computer software

Identify types of computer software

Identify the use of each computer software

Types of computer software are clearly described

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.1.2 Apply file processes Define computer file

Identify functions of computer files

Describe operational functions of computer file

Apply processes to prepare computer files

File processes are properly applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.1.3 Apply data traffic flow and coordination

Define data flow Identify parts of

data flow Prepare data

Data traffic flow and coordination are properly

Discussion Presentation Tests and

Quiz

Whiteboard Marker pen Blackboard Chalk

62

Page 63: New Ict Curriculum (All Levels)

flow hardware communication

Test dataflow hardware communication

applied Assignment Projector Laptop checklist

4.1.4 Apply communication equipment and systems communication channels

Define of communication channels

Describe communication equipment(e.g. Access point, network routers,hubs,switchers and servers)

Identify types of communication channels and equipment

Prepare communication channels

Communication equipment and systems communication channels are properly applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.2.1 Identify tools for building network

Describe network tools

Prepare tool kit(e.g. Tester, ripping tool, Combination pliers)

Prepare trunking

Tools for building network are correctly identified

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.2.2 Connect workstations Define workstation/nodes

Describe types of workstations

Workstations are properly connected

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector

63

Page 64: New Ict Curriculum (All Levels)

Identify types of topologies(e.g. Star,Bus,Ring)

Prepare and Test UTP cables

Connect different work stations

Laptop checklist

4.2.3 Configure Network Define network configuration

Describe the use of ping command

Troubleshoot network

Network is properly configured

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.2.4 Test communication between workstations

Define computer communication

Describe processes of testing communication between workstations

Use the ping command to check if your TCP/IP software is correctly configured.

Communications between workstations is correctly tested

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.3.1 Work with queries in database Define queries in database

Describe function of queries in database

Identify types of objects in database

Queries are properly worked with

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

64

Page 65: New Ict Curriculum (All Levels)

4.3.2 Create queries in design view Define queries in design view

Describe data types entered in design view

Identify data types

Queries in design view are properly created.

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.3.3 Prepare simple reports in database

Define report object in database

Describe functions of reports in database

Prepare simple report from the database system

Create interface between table, query and report.

Simple reports in database are correctly prepared

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.3.4 Save and print simple reports Produce files and save the report

Produce folder and save the file into folder

Produce hardcopy of the report by printing the report

Simple reports are correctly saved and printed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.4.1 Maintain user accounts Define user account

Describe the functions of user account

Prepare user account

User accounts are properly maintained

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

4.4.2 Delete/Update user account Describe the User accounts are Discussion Whiteboard

65

Page 66: New Ict Curriculum (All Levels)

process of deleting user accounts

Describe the process of updating user accounts

Apply the process for deleting user account

Apply the process for updating user account

correctly Deleted or Updated

Presentation Tests and

Quiz Assignment

Marker pen Blackboard Chalk Projector Laptop checklist

4.4.3 Assign access right(e.g Guest,Adminstrator,Students)

Define access right

Describe the function of access right

Maintain access right

Access rights are properly assigned

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Marker pen Blackboard Chalk Projector Laptop checklist

5.1.1 Explain computer crime(e.g Hacking and Cracking)

Define computer crime

Describe types of computer crime(e.g Hacking and Cracking)

Describe ways of protecting computer from crime

Computer crime is clearly explained

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

5.1.2 Solve Computer virus problems Define computer viruses

Describe types of computer viruses

Computer virus problems are properly solved

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector

66

Page 67: New Ict Curriculum (All Levels)

Describe the effect of computer viruses

Describe ways of dealing with computer viruses

Laptop checklist

5.1.3 Install/Update antivirus packages

Define antivirus packages

Define types of antivirus

Describe ways of installing/updating computer antivirus

Antivirus packages are correctly installed and updated

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

5.1.4 Apply authentication methodologies in computer use

Define the term authentication

Identify types of authentication

Explain the authentication methodologies.(e.g Domain name, passwording, access right)

Authetification methodologies are properly applied

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

5.2.1 Maintain access right in computer use

Assign the access code to access the server

Create password and IP addresses

Protect password

Access right in computer use is properly maintained

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

5.2.2 Maintain information privacy and accuracy

Define information privacy

Define

Information privacy and accuracy is

Discussion Presentation Tests and

Quiz

Whiteboard Marker pen Blackboard Chalk

67

Page 68: New Ict Curriculum (All Levels)

information accuracy

Describe the function of information privacy

Describe the use of information privacy

appropriately maintained

Assignment Projector Laptop checklist

5.2.3 Detect/Prevent unauthorized users(e.g intruders)

Define unauthorized user

Describe the types of unauthorized users

Describe the ways of preventing computer intruders

Unauthorized users are properly detected and prevented

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

6.1.1 Connect,Configure,Run networked computers

Collect components

Organize equipment and tools

Configure and run computer network

Networked computers are correctly connected and configured

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

6.1.2 Analyse network systems Manage computer networks

Monitor computer users

Provide IP address to users

Network systems are correctly analysed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

6.2.1 Maintain Computer hardwares Keep computer Computer Discussion Whiteboard

68

Page 69: New Ict Curriculum (All Levels)

hardware Store computer

hardware Organize

computer hardware

hardwares are properly maintained

Presentation Tests and

Quiz Assignment

Markerpen Blackboard Chalk Projector Laptop checklist

6.2.2 Connect computer hardwares Connect all hardwares to obtain computer systems

Test the system and install operating systems

Computer hardwares are correctly connected

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

6.2.3 Update computer software Install/Reinstall the operating system.

Install application software.

Run other application software

Computer software is properly updated

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

6.2.4 Manage computer networking Control the server

Manage other networked computers

Provide access rights to nodes/workstations

Describe the usage of networked computers

Computer networking is properly managed

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

6.3.1 Communicate effectively with organizational stakeholder

Organize the servers

Organisational stakeholders are

Discussion Presentation

Whiteboard Markerpen

69

Page 70: New Ict Curriculum (All Levels)

Provide closed loop with all nodes

Organize different computers in other organizarions

effectivelly communicated with

Tests and Quiz

Assignment

Blackboard Chalk Projector Laptop checklist

6.3.2 Apply Computing mathematics in solving computer problems

Collect different equipments and tools

Apply mathematical rules in solving different computer problems

Computing mathematics is accurately applied in solving computer problems

Discussion Presentation Tests and

Quiz Assignment

Whiteboard Markerpen Blackboard Chalk Projector Laptop checklist

70

Page 71: New Ict Curriculum (All Levels)

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

11.0 BENCHMARKING OF ASSESSMENT CRITERIA

S/NO ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT

1.1.1 Mathematical concepts in calculation and preparation of database are properly applied.

Converts various base number system

Converts various base number sytems and explains sets and relations

Converts various base number systems, explain sets and relations and basic number theoretical

71

Page 72: New Ict Curriculum (All Levels)

functions

1.1.2 Basic problems relating to ICT are accurately solved using mathematical principles

Evaluates basic counting techniques and discrete probability

Evaluates basic counting techniques , and explains important algorithms of graph theory

Evaluates basic counting techniques , discrete probability and explains important algorithms of graph theory, Boolean logic and techniques of mathematical proof .

1.2.1 Basic writing skills are properly applied

Applies grammar Applies grammar and construct sentences

Applies grammar , construct sentences and writes small texts

1.2.2 Principles and theories involving business correspondence are appropriately applied.

Writes business letter and e-mails correctly

Write business letter, e-mails and simple reports

Writes business letter,e-mails,simple report and sales letter correctly

1.2.3 Employment communication is properly applied

Writes employment letters and CV’s

Writes employment letters, CV’s and participates in employment interviews

Writes employment letters, CV’s ,participate in employment interviews and search for jobs

1.2.4 Simple research proposal effective memos, paper presentations and other business presentations are properly prepared

Prepares simple research proposal

Prepares simple research proposal and write effective memo

Prepares simple research proposals , writes effective memos ,paper and other business presentations

2.1.1 Conditions of faults are correctly identified

Defines faults Defines faults and mentions conditions of faults

Define faults, mentions conditions of faults and identifies different types of faults.

2.1.2 Computer faults are properly Mentions types of instrument Mentions types of Mention types of

72

Page 73: New Ict Curriculum (All Levels)

corrected used instrument used and explain steps of correcting faults

instrument used, explain steps of correcting faults,and fixes the faults

2.1.3 The conditions of computer systems are clearly analysed.

Defines computer systems Defines computer system and identify types of computer systems

Defines computer systems ,identify types of computer systems and explains parts of computer systems

2.2.1 Problems correctly diagnosed Defines problems Defines problem and describes the process of fixing problems

Define problem , describe the process of fixing problems and fix problems

2.2.2 Website that is easy and effective to use is correctly designed

Explain website Explains website and types of websites

Explain website ,types of websites and prepare simple

2.2.3 Website is properly maintained Run website Run and update website Run, update and secure website

2.3.1 Data models are correctly designed

Describes data models Describes data models and explain types of data models.

Describes data models, explain types of data models and give ways of designing data models .

2.3.2 Database system is properly installed and tested

Explains database system Explains database system and describe ways of installing and testing database system

Explains database system ,describe ways of installing and testing database system, and install and run database system

2.3.3 Existing database is properly updated

Describes features of database Describes features and explain methods of

Describes features , explain methods of

73

Page 74: New Ict Curriculum (All Levels)

updating database updating database and apply methods to update database

2.4.1 System models are correctly prepared

Defines and identify types of system models

Defines, identify and describe methods of preparing system models

Defines, identify, describe methods of preparing system models and apply the methods to prepare system models

2.4.2 System problems and resolutions are correctly documented for future reference

Explains system problems Explains system problems and describe resolutions of system problems

Explains system problems ,describe resolutions of system problems and methods of system documentation

3.1.1 Codes that meet system standards are properly prepared

Defines codes and explain types of codes

Defines codes, explain types of codes and describe the methods of creating codes using programming languages

Defines codes, explain types of codes , describe the methods of creating codes using programming languages and apply methods to create codes that meet system standard

3.1.2 System application is properly maintained

Defines system application Defines system application and update new features

Defines system application, update new features and troubleshoot system application .

3.1.3 Data visualization techniques are appropriately innovated

Defines data visualization properly

Defines data visualization and apply data visualization techniques properly.

Defines data visualization, apply data visualization techniques and apply data visualization techniques properly.

74

Page 75: New Ict Curriculum (All Levels)

4.1.1 Types of computer software are clearly described

Defines computer software Defines computer software and identify types of computer software ,

Defines computer software, identify types of computer software and the use of each software ,

4.1.2 File processes are properly applied

Defines computer file and identify functions of computer file m

Defines computer file, identify functions of computer files and describe operational functions of computer files ,

Defines computer file, identify functions of computer file, describe operational functions of computer file and apply process to prepare computer files.

4.1.3 Data traffic flow and coordination are properly applied

Defines and identify parts of data flow.

Defines , identify parts of data flow and prepare dataflow hardware communication-

Defines , identify parts of data flow and prepare and test dataflow hardware communication

4.1.4 Communication equipment and systems communication channels are properly applied

Defines communication channels and describe communication equipment

Defines communication channels, describe communication equipment and identify types of communication channels and equipment.

Defines communication channels, describe communication equipment, identify types of communication channels and equipment and communication channels.

4.2.1 Tools for building network are correctly identified

Describes network tools. Describes network tools and prepare tool kit.

Describes network tools and prepare tool kit and trunking.

4.2.2 Workstations are properly connected

Defines workstation/node and describe types of workstations.

Defines workstation/node, describe types of workstation, identify

Defines workstation/node, describe types of workstation, identify types of topologies and prepare

75

Page 76: New Ict Curriculum (All Levels)

types of topologies and prepare and test UTP cables.

and test UTP cables and connect different workstations.

4.2.3 Network is properly configured Defines network configuration. Defines network configuration and describe the use of ping command.

Defines computer communication and describe the processes of testing communication between workstations use of ping command and troubleshoot network.

4.2.4 Communication between workstations is correctly tested

Defines computer communication.

Defines computer communication and describe the processes of testing communication between workstations

Defines computer communication and use ping command to check if your TCP/IP software . configured and some more examples

4.3.1 Quarries in database are properly worked

Defines quarries in database. Defines quarries and describe functions of quarries in database properly

Defines quarries , describe functions of quarries in database and identify types of object in database properly

4.3.2 Quarries in design view are properly created

Defines quarries in design view. Defines quarries in design view and describe data type entered in design view.

Defines quarries in design view, describe data type entered in design view and identify data types.

4.3.3 Simple reports in database are correctly prepared

Defines report object and describe functions of report in database.

Defines report object, describe functions of report in and prepare simple report in

Defines report object, describe functions of report in, prepare simple report in database and create

76

Page 77: New Ict Curriculum (All Levels)

database. interface between table, query and report in database.

4.3.4 Simple reports are correctly saved and printed

Produce and save file. Produce and save file, produce folder and save files into folder.

Produce and save file, produce folder and save files into folder and print.

4.4.1 User accounts are properly maintained

Defines user accounts. Defines user account and describe functions of user accounts.

Defines user account, describe functions of user accounts and prepare user accounts.

4.4.2 User accounts are correctly deleted or updated

Describes the process of deleting user account .

Describes the process of deleting or updating user account .

Apply the process of deleting or updating user account.

4.4.3 Access rights are properly assigned

Defines access right properly Defines access right and describe the functions of access right .

Defines access right, describe the functions of access right and maintain access right .

5.1.1 Computer crime is clearly explained

Defines computer crime . Defines computer crime and describe types of computer crime .

Defines computer crime ,describe types of computer crime and describe ways of protecting computer from crime .

5.1.2 Computer virus problems are properly solved

Defines computer viruses and describe types of computer viruses .

Defines computer viruses and describe types and effect of computer viruses

Defines computer viruses, describe types and effect of computer viruses ,and describe ways of dealing with computer viruses m

77

Page 78: New Ict Curriculum (All Levels)

5.1.3 Antivirus packages are correctly installed and updated

Defines antivirus packages m Defines antivirus and types of antivirus

Defines antivirus and types of antivirus, describe ways of installing/updating antivirus ,

5.1.4 Authentification methodologies are properly applied

Defines the term authentification ,

Defines the term authentification and identify types of authentification

Defines the term authentification ,identify types of authentification and explain authentification methodologies and give some examples ,

5.2.1 Access rights in computer use is properly maintained

Assigns access code to access the server ,

Assigns access code to access the server correctly and create password and IP addresses,

Assigns access code to access the server correctly and create password and IP addresses protect password ,

5.2.2 Informarion privacy and accuracy is approprietly maintained

Defines information privacy and accuracy ,

Defines information privacy and accuracy and describe the functions of information accuracy ,

Defines information privacy and accuracy and describe the functions of information accuracy and privacy ,

5.2.3 Unauthorized users are properly detected and prevented

Defines unauthorized user , Defines unauthorized user and describe types of unauthorized users ,

Defines unauthorized user, describe types of unauthorized users and describe ways of preventing computer from unauthorized users ,

6,1,1 Networked computers are correctly connected and configured

Collects computer components, Collects computer components and organize equipments and

Collects computer components and organize equipments and tools,

78

Page 79: New Ict Curriculum (All Levels)

tools adding more examples.

6.1.2 Network systems are correct analyzed practically

Manages computer network Manages computer network and monitor computer users.

Manages computer network, monitor computer and provide IP address tousers,

6.2.1 Computer hardware are properly maintained

Organizes computer hardware Organizes computer hardware and connect all the hardware to obtain computer system.

Organizes computer hardware and connect all the hardware to obtain computer system and adding more examples.

6.2.2 Computer hardware is correctly connected

Connects all the hardwares to obtain computer system.

Connects all the hardware to obtain computer system. and testing the system and install operating system.

Connects all the hardware to obtain computer system. and testing the system and install operating system and adding more examples

6.2.3 Computer software are properly updated

Install/Reinstall the operating system

Install/Reinstall the operating system and install application software

Install/Reinstall the operating system , install application software and run other application software

6.2.4 Computer networking are properly managed

Control the server and manage other networked computers

Control the server ,manage other networked computers and provide access right to nodes/workstations

Control the server ,manage other networked computers , provide access right to nodes/workstations and describe the usage of networked computers

6.3.1 Communication with stakeholders is effectively done

Organizes the servers Organizes the servers and provide closed loop

Organizes the servers , provide closed loop with all

79

Page 80: New Ict Curriculum (All Levels)

with all nodes nodes and organize different computers in other organizations

6.3.2 Computing mathematics is accurately applied in solving computer problems.

Collects different equipment and tools

Collects different equipment and tools ,apply mathematical rules in solving different computer problems

Collects different equipment and tools, apply mathematical rules in solving different computer problems and adding more examples.

TECHNICIAN CERTIFICATE (NTA LEVEL 5) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY

12.0 MODULES DESCRIPTION

CODE:TCIT 511

NAME; COMMUNICATION SKILLS

NUMEBER OF CREDITS: 12

80

Page 81: New Ict Curriculum (All Levels)

SUB-ENABLING OUTCOMES:

1.2.1 Apply basic writing skills

1.2.2 Apply principles and theories involving business correspondence

1.2.3 Apply employment communication

1.2.4 Prepare simple research proposal and write effective memos, paper presentations and other business

Presentations.

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Brownlea A. (2008) a pilot study of patient views on the communication skills of general Practitioners 1st Edition Royal Autralia college of general Practitioners.

2 Mckay M. et al (1995).The communication skills book New Harbinger Publication, Oakland.

3 Roebuck D. (2007) Improving Business Communication skills 5th Edition Prentice Hall, New Delh.

4 Siriha A. K. (2007) Business communication skills Vrinda Publications (P) Ltd.

5 Thill V. J. (2004) Business Communication activebook version 2.0, Peason prentice Hall, New Delh.

81

Page 82: New Ict Curriculum (All Levels)

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 512

NAME; COMPUTING MATHEMATICS

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

1.11 Apply mathematical concepts calculation and preparation of databases1.12 Solve basic problems relating to ICT using mathematical principles

TEACHING AIDS

Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist

82

Page 83: New Ict Curriculum (All Levels)

METHODS OF INSTRUCTION

This modules will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and group work, and study visit.

REFERENCES;

1 Cormen T. H. (2003) Introduction to Algorithms 4th Edition, McGrawHill Book company USA.2 Goos G. and Hartmans J. (1988) Mathematical foundations of computer science 3rd Edition springer verlag Berin Heideberg Germany,

3 Gopi E. S. (2009) Algorithms collection for digital signal processing applications using matlab 1st Edition , AA Dordrecht the Netherlands

4 Jantke K. P. and Bibel W. (1986) Mathematical Methods of specification and synthesis of soft ware 2nd Edition springer Verlag Berin Heideberg Germany,

5 Sterling I. M. (2010) Algebra for dummies 2nd Edition , Wiley Publishing Inc. 111 Riverst. Hoboken. NJ.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 513

NAME; DATABASE SYSTEM DEVELOPMENT

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

2.3.1 Design data models2.3.2 Install and test database system2.3.3 Update existing database2.3.4 Work with quarries in database2.3.5 Create quarries in design view2.3.6 Prepare simple reports2.3.7 Save and print simple reports

83

Page 84: New Ict Curriculum (All Levels)

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Gary B,Et al (2007) ,Microsoft office Access 2007,Introductory Concept and Techniques,2nd Ed,Cengage Learning,Canada2 Pratt P. J. (2007) concepts of Database 6th Edition, Cengage Learning EMEA. 3 Pratt P. J. and Last M. Z (2008) A guide to SQL, 8th Edition, Cengage Learning Canada.4 Rob P. et al (2009) Database systems design, implementation and management, 5th Edition Cengage, Learning EMEA.5 Rose M. L. (2007) Developing database enable web applications 1st Edition Regis University Denver

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 514

NAME; COMPUTER MAINTENANCE

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

84

Page 85: New Ict Curriculum (All Levels)

2.1.1 Identify conditions of faults2.1.2 Correct computer faults2.1.3 Analyse the conditions of computer systems2.1.4 Diagnose problems

TOPICS

• Define faults• Mention condition of faults

• Identify different types of faults

• Mention types of instrument used

• Explain steps of correcting faults

• Fix the faults

• Define the computer system

• Identify types of computer system

• Explain parts of computer system

• Define problems

• Describe the process of fixing problems

• Fix problems

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

85

Page 86: New Ict Curriculum (All Levels)

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES

1 Albin S. T. The art of software architecture, design methods and techniques, vol. 4 Willey and sons Inc.2 Bass L. et al (2007) Software architecture in practice, 2nd Edition, Pearson Education Inc 75 Arlington street Boston, AM3 Bosch J. (2009) Design and use of system of software architecture , adopting and evolving a product line, 2nd Edition Addison

Wesley, NJ.4 Hohmann L. (2004) Beyond software architecture Addison-Wesley Professional. 5 Rood S.C (2008) Computer Hardware Maintenance; An IS/IT Managers Guide.Butterworth-Heinmann.UK

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 515

NAME; PROGRAMMING

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

86

Page 87: New Ict Curriculum (All Levels)

3.1.1 Create codes that meet system standards3.1.2 Maintain system application3.1.3 Innovate data visualization techniques

TOPICS

• Define codes

• Explain types of codes

• Describe methods of creating codes using programming languages (e.g Access,VB,Java, C++)

• Apply methods of creating codes

• Define system application

• Update new features

• Troubleshoot system application.

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

87

Page 88: New Ict Curriculum (All Levels)

REFERENCES;

1 Knuth E. D (2006) The art of computer programming 1st Edition, courier Corporation plant Massachusetts2 Nell B. et al (1995) Pascal plus data structures, algorithms and advanced Programming 4th Edition, D. C. Heath and company

125 spring street, Lexington M. A.3 Oualline S. (2003) Practical C++ Programming 2nd Edition O’Reailly media Inc, 1005 Gravenstein Highway North ,

Sebastopol4 Sannella D. (1994) programming languages and system Esop 94 5th Edtion, Springer- Verlag Berlin Heidelberrg. German.5 Xie D. and Liberty I. (2008) Programming C# 3.0 5th Edition O’ Reilly media Inc, 1005 Gravenstein Highway North

Sebastopol.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 521

NAME; ADVANCED OFFICE AUTOMATION

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

4.1.1 Describe types of computer software4.1.2 Apply file processes4.1.3 Apply data traffic flow and coordination4.1.4 Apply communication equipment and system communication channels

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist88

Page 89: New Ict Curriculum (All Levels)

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Dorner J.(2002) Writing for the Internet 1st Edition Oxford University Press. UK2 Granor E, T and Martin D. () Microsoft office automation with Visual FoxPro, Hentzenwerke Publishing 980 East Circle Drive

USA3 Soffer P and Proper E(2011) Information Systems Evolution:Case forum 2010,Springer publisher.UK4 Waterhouse S. (1983) Office automation and word Processing Fundamentals Herpercollins5 Webster T, (1984) office automation and word processing Buyers Guide, McGraw-Hill higher Education.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 522

NAME; WEB DESIGN

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

2.2.1 Diagnose problems2.2.2 Design website that is easy and effective to use2.2.3 Maintain a website

TOPICS

• Define website

• Explain types of websites89

Page 90: New Ict Curriculum (All Levels)

• Prepare a simple website

• Run website

• Update website

• Secure website

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion,Industrial and groupwork, and study visit.

REFERENCES;

1 Kalbach J. (2007) Designing web navigation, 1st Edition. O Relly Media inc. 1005 Gravenstein Highway North, Sebastopol.2 Ossowski C. (2004) the effect of changing a static website to a dynamic format 1st Edition state University of New York

Institution of Technology at Utica/Rome.3 Robbins N. J. (2006) Web design in a nutshell A desktop quick Reference, 3rd Edition O’Relly media inc. 1005,Gravenstain

Highway North, Sebastopoll.4 Shelly G. B. et al (1994) Microsoft Visual Basic 3.0 for Windows Double Diamond Edition, Thompson course Technology.5 Zeldman J. and Marcotte E. (2010) Designing with Web standards 3rd Edition New Riders, 1249 Eight street Berkeey

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

90

Page 91: New Ict Curriculum (All Levels)

CODE:TCIT 523

NAME; NETWORKING

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

4.2.1 Identify tools for building network4.2.2 Connect workstations4.2.3 Configure network

91

Page 92: New Ict Curriculum (All Levels)

4.2.4 Test communication between workstations4.2.5 Apply communication equipment and systems communication channels

TOPICS

• Define of communication channels

• Describe communication equipment(e.g. Access point, network routers,hubs,switchers and

servers)

• Identify types of communication channels and equipment

• Prepare communication channels

• Describe network tools

• Prepare tool kit(e.g. Tester, ripping tool, Combination pliers)

• Prepare trunking

• Define workstation/nodes

• Describe types of workstations

• Identify types of topologies(e.g. Star,Bus,Ring)

• Prepare and Test UTP cables

• Connect different work stations

• Define network configuration

• Describe the use of ping command

• Troubleshoot network

• Define computer communication

92

Page 93: New Ict Curriculum (All Levels)

• Describe processes of testing communication between workstations

• Use the ping command to check if your TCP/IP software is correctly configured.

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion ,Industrial and groupwork, and study visit.

REFERENCES;

1 Barken L(2009) How secure is your wireless network your Wi-FLAN,2nd Edition prentince Hall professional Techniques Reference Upper Saddle River NJ

2 Comer D,E (2008) Computer system architecture 3rd Edition ,Prentice –Hall of India, New Delh.3 Khan J and Khwanja A(2008) Building Secure Wireless network with 802.11,Addison wesley,Canada4 Mathew J. (2005) Computer Networks, Internet protocols in actionaddition5 Sankar N(2009) building secure Computer network and Hardware concepts,2nd Edition Idea Inc (IGI)

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

93

Page 94: New Ict Curriculum (All Levels)

CODE:TCIT 524

NAME; PROFESSIONAL ETHICS AND SECURITY IN COMPUTER USE

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

5.1.1 Explain computer crime5.1.2 Solve computer virus problems5.1.3 Update/Install antivirus packages5.1.4 Apply authentication methodologies in computer use5.2.1 Maintain access right in computer use5.2.2 Maintain information privacy and accuracy5.2.3 Detect/prevent unauthorized users

TEACHING AIDS

Whiteboard, Markerpen, Blackboard, Chalk, Projector, Laptop, checklist

94

Page 95: New Ict Curriculum (All Levels)

METHODS OF INSTRUCTION

This module will be conducted through various methods such as, Lecturers, Demonstrations, Discussion, Industrial and groupwork, and study visit.

REFERENCES;

1 Flagan M, et al (2008) Embodying Value in Technology theory and practice , Cambridge University press Uk2 Gornak K. (1996) the computer resolution and the problem of global ethics opragen publication,Uk.3 Gorniak K. (2007) ICT globalization and the pursuit of happiness , press Tokyo .4 Jacob M.B (2009) Computer Ethics:Intergrating across the Curriculum.1st ed,Jones&Bartlett Publishers,Massachussets.USA5 Johnson D. and Nissenbaum H. (1995) computing ethics and social values, Englewood Cliffs, NJ Prentice- Hall New Delh

India.

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

CODE:TCIT 525

NAME; SYSTEM ANALYSIS AND DESIGN

NUMBER OF CREDITS: 12

SUB-ENABLING OUTCOMES:

2.4.1 Prepare system models2.4.2 Document system problems and resolution for future reference

TEACHING AIDS

Whiteboard, Marker pen, Blackboard, Chalk, Projector, Laptop, checklist

METHODS OF INSTRUCTION

95

Page 96: New Ict Curriculum (All Levels)

This module will be conducted through various methods such as, Lecturers, Demonstrations, Role play, Discussion, Industrial and group work, and study visit.

REFERENCES;

1 Berente N and Lyytinet K (2008)Iteration in System Analysis and Design: Cognitive Processes and Presentational artifacts,Case Western Reserve University.USA

2 Chiang R et al (2009) System Analysis and ddesign:Technoques,methodologies,Approaches and Architecture,!st ed,M.E Sharpe Academic Publisher, London

3 MacCraker D,D(2009) A Maverick to system analysis and design, New York north Holland4 Morris M. (2003) computer System architecture 3rd Edition, Prentice Hall of India , New Delhi.5 Jeffrey L, W and Lonnie B, D (2007) system analysis and Design McGraw Hill/Irwin

INTEGRATED METHOD OF ASSESSMENT;

Continuous assessment ─ 40% End of semester examination ─ 60%

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY

1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competent modular curricular is to comply with the Nation’s Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs.

Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills.

96

Page 97: New Ict Curriculum (All Levels)

The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that” given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn”. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 6 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization.

The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.

This qualification has 120 credits which is the minimum prescribed by NACTE.

2.0 MODULE CODING

The coding of modules follows logical sequence as in the following example for ODIT 614.

ODIT = Stands for Ordinary Diploma in Information and Communications Technology

6 = The first digit stands for the NTA level, in this case Ordinary Diploma which is level six.

1 = The second digit stands for semester, i.e. for semester one.

1 = The last digit stands for the order of the module in the semester. Modules are arranged serially from 1 to the highest number, upon the number of modules in the semester.

97

Page 98: New Ict Curriculum (All Levels)

3.0 GRADING OF ASSESSMENT RESULTS The grading of assessment results is in conformity with the NACTE grading system as follows.

NTA Level 6

Grade Definition Score

A Excellent 75 ─ 100

B+ Very Good 65 ─ 74

C Good 55 ─ 64

D Average 40 ─ 54

F Failure 00 ─ 39

I Incomplete

4.0 AWARDS

The award shall be made to students who satisfy the following conditions.

Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.

5.0 AWARDS CLASSIFICATION:

Awards Classification for NTA level 6

98

Page 99: New Ict Curriculum (All Levels)

Class of Awards Cumulative GPA

First Class 4.4 to 5.0

Upper Second Class 3.5 to 4.3

Lower Second Class 2.7 to 3.4

Pass 2.0 to 2.6

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION

TECHNOLOGY (ODIT)

6.0 SUMMARY FRAMEWORK

QUALIFICATION ORDINARY DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY (ODIT)

PURPOSE OF

QUALIFICATION

This qualification is intended for persons who will be able to develop and test

programs, program web based applications, manage information systems resources,

plan and manage networks, develop business plans focusing on entrepreneurship

99

Page 100: New Ict Curriculum (All Levels)

and perform audit assignments, analyze how computer components work and

communicate under less supervision.

NTA LEVEL 6

COMPETENCE

LEVEL DESCRIPTOR

The holder of this qualification will be able to apply skills and knowledge to develop

and test programs, program web based applications, manage information systems

resources, plan and manage networks, develop business plans focusing on

entrepreneurship and perform audit assignments, analyze how computer

components work and communicate in a broad range of ICT work activities, most of

which are non-routine and be able to assume operational and some managerial

responsibilities.

CREDITS AT THIS

LEVEL 120

CUMULATIVE

CREDITS AT THIS

LEVEL 240

MAXIMUM NUMBER

OF CREDITS THAT

COULD BE

CONSIDERED FROM 100

Page 101: New Ict Curriculum (All Levels)

LOWEST LEVEL 30

DATE

QUALIFICATION

STANDARD LAST

RVIEWED

NEW

ENTRANCE

REQUIREMENTS

TCIT Level 5

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION

TECHNOLOGY (ODIT)

7.0 PRINCIPAL LEARNING OUTCOMES AND CREDIT VALUES SUMMARY

S/NO PRINCIPAL LEARNING OUTCOMES CREDIT

VALUES

ASSESSMENT CRITERIA

1 Develop, test, debug and run programs using object 15 1.1 Programs using object

101

Page 102: New Ict Curriculum (All Levels)

oriented programming language, C++. oriented programming

language C++ are properly

developed, tested,

debugged, and run.

2 Design and develop database driven Web

Applications

15 2.1 Database driven web

applications are properly

designed and developed

3 Manage Information System Resources in an

organization, evaluate a range of information

systems solutions and examine the social and legal

impacts of developing and implementing information

systems and the role played by Information Systems

(IS) professionals in addressing such issues.

30 3.1 Information systems

resources in an organization

and a range of information

systems solutions are well

managed and evaluated.

3.2 Social and legal impacts

of developing and

implementing information

systems and the role played

by information systems (IS)

professional in addressing

such issues are well

examined.

4 Plan, administer, troubleshoot and manage computer 15 Computer networks and

102

Page 103: New Ict Curriculum (All Levels)

Networks and network equipment. network equipment are

properly planned,

administered, and

troubleshot.

5 Analyze the working of computer components and

their communication to each other.

15 The working of computer

components and their

communication to each

other are well analyzed

6 Apply information systems assurance in developing

business plans focusing on entrepreneurship and

perform audit assignments.

30 6.1 Information systems

assurance in developing

business plans focusing on

entrepreneurship is well

applied

6.2 Audit assignments are

well performed.

TOTAL CREDITS 120

ORDINARY DIPLOMA (NTA LEVEL 6) PROGRAMME IN INFORMATION AND COMMUNICATION

TECHNOLOGY

8.0 PROGRAM STRUCTURE

103

Page 104: New Ict Curriculum (All Levels)

SEMESTER I

S/NO CODE NAME OF MODULE CREIDT

1 ODIT 611 Computer Architecture 15

2 ODIT 612 Programming in C++ 15

3 ODIT 613 Business Information Systems 15

4 ODIT 614 Entrepreneurship 15

TOTAL CREDITS FOR SEMESTER I 15

SEMESTER II

S/NO CODE NAME OF MODULE CREIDT

1 ODIT 621 Information systems assurance 15

2 ODIT 622 Database driven website design 15

3 ODIT 623 Fundamentals of network administration 15

4 ODIT 624 Project development 15

TOTAL CREDITS FOR SEMESTER I 15

GRAND TOTAL CREDITS FOR NTA LEVEL 6 120

104

Page 105: New Ict Curriculum (All Levels)

9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES

PRINCIPAL

OUTCOMES (NACTE

Standards)

ENABLING OUTCOMES (As Identified

and formulated by Curriculum

Developers)

SUB-ENABLING OUTCOMES

1. Develop, test ,debug

and run programs

using object oriented

programming language,

C++

1.1 Apply Basic principles of C++

program

1.1.1 Describe Structure of a

program

1.1.2 Declare Variables and

Data types.

1.1.3 Apply Constants

1.1.4 Assign Operators in C++

programs

1.1.5 Declare Basic Input/

Output

1.2 Apply Control Structures 1.2.1 Apply Control Structures

in a C++ program

1.2.2 Declare different types of

C++ programs

1.3 Identify different data types 1.3.1 Declare arrays in C++

program

1.3.2 Declare character

105

Page 106: New Ict Curriculum (All Levels)

sequences in c++ program

1.3.3 Declare pointers in C++

program

1.3.4 Allocate dynamic memory in

C++ program

1.3.5 Declare data structures in

C++ program

1.4 Apply Object Oriented Programming

techniques

1.4.1 Declare Classes in C++

program

1.4.2 Declare Friendship and

inheritance

1.4.3 Apply Polymorphism in C+

+ program

1.4.4 Pass message in C++

program

106

Page 107: New Ict Curriculum (All Levels)

2. Design and develop

database driven Web

Applications

2.1 Set up and use a web server 2.1.1 Download and save Apache, PHP,

Mysql or Wamp/ Xamp

2.1.2 Install Apache,PHP, Mysql or Wamp

/ Xamp

2.1.3 Use the web server

2.2 Construct file and directory

handling in PHP

2.2.1 Read and write files

2.2.2 Manipulate API files

2.2.3 Upload and exit file

2.3 Write and test PHP program

and

2.3.1 Apply PHP syntax

2.3.2 Declare variables

107

Page 108: New Ict Curriculum (All Levels)

Connect it to the database 2.3.3 Declare arrays

2.3.4 Declare functions

2.3.5 Declare classes and objects

2.3.6 Declare string operations in PHP

2.4 Develop dynamic interactive

website

2.4.1 Declare website structure

2.4.2 Prepare graphic resources

2.4.3 Design templates, upload

templates and resources

2.4.4 Create all modules and add to

templates

2.4.5 Create pages and forms

3. Manage Information

System Resources in an

3.1 Evaluate the roles of various

types of management information

3.1.1 Discuss the relationship between

the business organization ,processes,

108

Page 109: New Ict Curriculum (All Levels)

organization,

evaluate a range of

information systems solutions

and examine the social and

legal impacts of developing

and implementing

information systems and the

role played by Information

Systems (IS) professionals in

addressing such issues.

systems in business organisations.

.

functions and the associated supporting

management information systems.

3.1.2 Explain appropriate management

information systems for the

range of business functions and

organizational levels.

3.2 Asses the emerging business

technologies,environments and

practices, and their impact on

management information systems.

3.2.1 Assess the impact of new

technology on business processes

and associated management information

systems.

3.2.2 Explain the emerging business

technologies environments and practices

of management information systems.

3.3 Discuss the relationship

between the decision making

process, the organizational

hierarchy and the supporting

management information systems.

3.3.1 Discuss the managerial decision

making process in business.

3.3.2 Explain the relationship between

decision making and management

information systems at different levels of

109

Page 110: New Ict Curriculum (All Levels)

the organization.

3.3.3 Evaluate the importance of

collaborative decision making

environments and review group

management information systems.

3.3.4 Apply the concepts and knowledge

in the management information systems

context.

3.4 Develop awareness of the key

role of management information

systems in facilitating competitive

advantage in business.

3.4.1 Explain the key requirement of

competitive advantage.

3.4.2 Explain competitive advantage in

business

3.4.3 Relate information systems to

business competitive advantages

3.5 Apply Knowledge of security

and control aspects of

management

information systems.

3.5.1 Discuss the risk, security and

control issues associated with

management information systems.

3.5.2 Discuss the control measures for

the risks associated with managing 110

Page 111: New Ict Curriculum (All Levels)

information systems.

3.6 Apply professional approach

to relating management

information

systems to business environments

3.6.1 Review the range of professional issues, which are associated

with business activities and management information systems.

3.6.2 Evaluate business activities that needs information systems support for better performance

4.Plan,

administer ,troubleshoot and

Manage computer Networks

and network equipment

4.1. Describe network hardware

and

software tools

4.1.1 Configure Network Adapter,

Modem

4.1.2 Set Repeater and Bridge

4.1.3 Set Hub and Switch

4.1.4 Connect Wireless Access Point

4.1.5 Configure Router

4.2 Configure network 4.2.1 Configure Address Resolution

111

Page 112: New Ict Curriculum (All Levels)

resources Protocol (ARP)

4.2.2 Configure Internet Control

Message Protocol (ICMP)

4.2.3 Configure BootStrap

Protocal(BOOTP )

4.2.4 Configure(Dynamic Host Control

Protocal) DHCP

4.2.5 Configure Domain Name

System( DNS)

4.2.6 configure Lightweight Directory

Access Protocol ( LDAP)

4.3 Manage network resources 4.3.1 Troubleshoot problems with

computer systems

4.3.2 Assist users to resolve problems

with equipment and data

4.3.3 Plan, design, acquire new or

upgraded hardware and software

4.3.4 Install LAN/WAN and maintain

112

Page 113: New Ict Curriculum (All Levels)

Computer

4.3.5 Apply ISO management model

5. Analyze the working of

computer components and

their communication to each

other

5.1 Describe the Central

Processing Unit (CPU)

5.1.1 Explain the role of CPU

5.1.2 Describe the component parts of

CPU

5.1.3 Describe purpose of instruction

pointer

5.1.4 Describe steps of processing an

instruction

5.2 Describe computer storage

capacities and memory devices

5.2.1 Explain the purpose of memory

cell

5.2.2 Apply RAM and ROM

5.2.3 Identify different types of ROM

5.2.4 Describe storage capacities

113

Page 114: New Ict Curriculum (All Levels)

5.2.5 Differentiate between internal

and external buses

5.3 Describe computer peripherals

devices

5.3.1 Identify different Character

recognition devices

5.3.2 Explain the role of barcodes

5.3.3 Identify different types of Tapes

5.3.4 Identify different types of

magnetic disks

5.3.5 Assess hard disk performance

6. Apply information systems

assurance in develop business

plan focusing on

entrepreneurship and perform

audit assignments

6.1 Apply Auditing standards,

procedures and guideline of auditing

Information Systems Audit

assignments

6.1.1Audit Information Systems

according to required procedures

6.1.2 Conduct an information systems

Risk Assessment and arrange

sequence of functions

6.1.3 Perform audit assignment

114

Page 115: New Ict Curriculum (All Levels)

6.2 Assess effectiveness and

efficiency of, Information Technology

Governance, and Information System

Life Cycle Management in supporting

business operations and continuity.

6.2.1Assess Information Technology

Governance

6.2.2 Assess adherence of Information

Systems development life cycle

management

6.2.3 Conduct Tests to check Business

continuity Management

6.2.4 Conduct test to check

effectiveness of Disaster recovery

planning

6.3 Relate concepts of security in

ensuring information assets of the

business organizations are protected

6.3.1 Ensure Security of Information

assets

6.3.2 Conduct test Security of

procedures and components

6.4 Analyze how information

systems affect/effect the concepts of

entrepreneurship in business

organization

6.4.1 Describe objectives of

entrepreneurship

6.4.2 Analyze entrepreneurship in

115

Page 116: New Ict Curriculum (All Levels)

business organization

6.4.3 Discuss the importance of

information system in

entrepreneurship

6.4.4 Discuss the role of

entrepreneurship concepts in

developing business

10.0 ASSESSMENT CRITERIA, METHODS, INSTRUMENTS AND RELATED TASKS

SUB ENABLING

OUTCOME

RELATED TASK ASSESMENT

CRITERIA

ASSESMENT

METHOD

ASSESMENT

INSTRUMENT

S

1.1.1 Describe

Structure of

a program

Declare comments in a C++

program eg; // my first program

in C++

Declare a library function

#include <iostream>

Declare and use namespace std;

Declare the main function ;int

main ()

Structure of a

program is

clearly

described

Exercise,

assignment

Questions

and model

answer.

116

Page 117: New Ict Curriculum (All Levels)

Declare a display function; cout

<< "Hello World!"

1.1.2 Declare

Variables and

Data types.

Identify reserved key words

Describe and declare integers,

boolean, float, character, double

Initialize variables

Variables and

Data types

are correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.1.3 Apply

Constants in C++

program

Identify and declare literals,

integer numbers, float pointers

constants.

Constants are

properly

applied

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.1.4 Assign

Operators in C++

program

Identify different types of

operators; assignment,

arithmetic, compound, increase

and decrease, relational and

equity, logic, conditional,

comma, bitwise, sizeoff,

precedence operators.

Operators in

C++ program

are properly

assigned. Assignments

and class in

demonstration

s

Written

assignments,

model

answer

117

Page 118: New Ict Curriculum (All Levels)

Assign different types of

operators; assignment,

arithmetic, compound, increase

and decrease, relational and

equity, logic, conditional,

comma, bitwise, sizeoff ,

precedence operators.

1.1.5 Declare

Basic Input/

Output in C++

program

Identify and Declare Standard

Output (cout)

Identify Standard Input (cin).

Declare Standard Input (cin)

Basic Input/

Output are

correctly

declared Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.2.1 Apply

Control Structures

in a C++ program

Declare conditional structures

(if…..else), iteration structure

( loops: while, do…while, for…

loop),jump statements, continue

and go to statements.

Apply conditional structures

(if…..else), iteration structure

Control

structures in

C++ program

are properly

applied and

used

Assignments

and class in

demonstration

Written

assignments,

model

118

Page 119: New Ict Curriculum (All Levels)

( loops: while, do…while, for…

loop),jump statements, continue

and go to statements.

s answer

1.2.2 Declare

different

types of C+

+ Functions

Identify and declare different

types of functions: exit, selective

switch, void, passing arguments,

overloaded, inline, recursivity.

Different types

of C++

program are

correctly

declared.

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.3.1 Declare

Arrays

Initialize arrays

Describe multi-dimension arrays

Pass parameters

Access values of an array

Arrays in C++

program are

correctly

declared Assignments

and class in

demonstration

s

Written

assignments,

model

answer

119

Page 120: New Ict Curriculum (All Levels)

1.3.2 Declare

Character

Sequences

Initialize null-terminated

character sequence

Apply null-terminated character

sequence

Character

sequence are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.3.3 Declare

Pointers

Apply reference operator

Apply deference operators

Apply variables of pointer types

Initialize pointers; arithmetic,

void, pointer to pointer, pointer

to function and nully-pointers

Pointers are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.3.4 Allocate

Dynamic Memory

Apply operators new and new[]

Apply operators delete and

delete[]

Apply memory in ANSI-C

Dynamic

memory in C+

+ program are

properly

allocated

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.3.5 Declare

Data Structures

Apply structure_name,

object_name.

Apply pointer to pointer

Apply nesting structure

Apply other data types( typedef)

Data

structures in

C++ program

are correctly

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

120

Page 121: New Ict Curriculum (All Levels)

declared

1.4.1 Declare

Classes

Apply class_name

Apply object_name

Specify private, public/protected

class

Apply class functions:

constructors and

destructors ,overloading and

default

Classes in C++

program are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.4.2 Declare

Friendship

and

inheritance

Apply friend functions

Apply friend class

Apply inheritance between

classes

Apply multiple inheritance.

Friendship and

inheritance are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.4.3 Apply

Polymorphis

m

Declare pointers to base class

Declare virtual members and

abstract base

Polymorphism

in C++

program are

properly

applied

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

1.4.4 Pass

message in

C++

declare message

find object(s) to pass message

find a function to be invoked

Message in C+

+ program is

correctly

Assignments

and class in

demonstration

Written

assignments,

model

121

Page 122: New Ict Curriculum (All Levels)

program passed s answer

2.1.1 Download

and save Apache,

PHP, Mysql or

Wamp/ Xamp

connect to the internet

Download PHP for free :

http://www.php.net/downloads.p

hp

Download MySQL for free :

http://www.mysql.com/download

s/

Download Apache for free :

http://httpd.apache.org/downloa

d.cgi

Apache, PHP,

Mysql or

Wamp/ Xamp

are properly

downloaded

and saved in a

computer

Demonstratio

n and

observation

Written

materials and

list of links

for

downloading

2.1.2 install

Apache,PHP,

Mysql or Wamp /

Xamp

open the Apache/php/mysql

install file you downloaded,

click yes and ok and next and so

forth until you reach the “Server

Information” screen, then

Choose the complete installation

button

Apache, PHP,

Mysql or

Wamp/ Xamp

are properly

installed

Demonstratio

n and

observation

Written

materials.

2.1.3 Use the web

server

install the web server software

on the computer.

assign a domain name.

The web

server is

properly used

Assignments

and class in

demonstration

Written

assignments,

model

122

Page 123: New Ict Curriculum (All Levels)

install antivirus software s answer

2.2.1 Read and

write files

apply PHP-file open: write

apply file fwrite function

apply file-write:overwrite

function

Files are read

and written

properly

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.2.2 Manipulate

API file

view and modify file attributes

read and list directory contents,

alter file permissions,

retrieve file contents into a

variety of native data structures,

search for files based on specific

patterns.

API files are

properly

manipulated

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.2.3 Upload and

exit file

create table upload

upload the data/files

apply fclose() function

Files are

uploaded and

exit

successfully

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

123

Page 124: New Ict Curriculum (All Levels)

2.3.1 Apply PHP

syntax

apply PHP scripting block

apply PHP output text: echo,

print

apply HTML tags

PHP syntax is

properly

appliedAssignments

and class in

demonstration

s

Written

assignments,

model

answer

2.3.2 Declare

variables

identify the variable name and

value

apply $ to each variable name

declare $var_name = value;

apply Predefined variables

apply Variable scope

Apply Variables from outside

PHP

Variables are

properly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.3.3 Declare

arrays

identify different types of arrays;

Numeric array , Associative

array, Multidimensional array

initialize array

apply array declaration

Arrays are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.3.4 Declare

functions

identify built-in functions and

user defined functions

apply the PHP syntax for

functions:

Functions are

correctly

declared

Assignments

and class in

demonstration

Written

assignments,

model

124

Page 125: New Ict Curriculum (All Levels)

function functionName()

{

code to be executed;

}

apply function calling

User-defined functions

Apply Function arguments

Apply Returning values

Apply Variable functions

s answer

2.3.5 Declare

classes and

objects

Autoload Objects

Apply Constructors and

Destructors

Apply Visibility

Apply Scope Resolution Operator

(::)

Apply Static Keyword

Apply Object Constants

Apply Object Abstraction

Apply Object Interfaces

Apply Overloading

Apply Object Iteration

Apply Patterns

Classes and

Objects are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

125

Page 126: New Ict Curriculum (All Levels)

Apply Magic Methods

Apply Final Keyword

Apply Object cloning

Apply Comparing objects

Apply Reflection

2.3.6 Declare

string operations

in PHP

Apply string concatenation

Apply strlen() function

Apply strps() function

Identify different

operators :arithmetic,

assignment, comparison, and

logic operators

Apply different

operators :arithmetic,

assignment, comparison, and

logic operators

Strings

operations in

PHP are

correctly

declared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.4.1 Declare

website structure

Prepare homepage( index page)

Prepare main section ( site

Web site

structure is

Assignments

and class in

Written

assignments,

126

Page 127: New Ict Curriculum (All Levels)

index)

Prepare subsection( content)

Link between sections.

correctly

declared

demonstration

s

model

answer

2.4.2 Prepare

graphic resources

Explain graphics

Differentiate graphics

Find graphics

Graphic

resources are

properly

prepared

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.4.3 Design

templates, upload

templates and

resources

Explain template

Differentiate templates

Locate template resources

Templates are

properly

designed and

template

resources are

correctly

uploaded

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.4.4 Create all

modules and add

to templates

Define modules

Differentiate modules

Attach modules

All modules

are correctly

created and

added to

templates

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

2.4.5 Create Define form Pages and Assignments Written

127

Page 128: New Ict Curriculum (All Levels)

pages and form Find contents

Explain HTML Tags

forms are

correctly

created

and class in

demonstration

s

assignments,

model

answer

3.1.1 Discuss the

relationship

between the

business

organization,

processes ,functio

ns, and the

associated

supporting

management

information

systems.

Apply the Business Organization and

Supporting Management Information

Systems by:

Identify Systems and Systems

Thinking.

Outline Information systems in

modern organizations.

Discuss Types and

characteristics of systems.

Describe Business processes and

information systems.

Describe Customer Relationship

Management (CRM) and SCM.

Discuss Collaborative commerce.

Discuss Enterprise systems.

Outline Organizations and

information systems.

Discuss Organizations,

procedures, politics and culture.

The

relationship

between the

business

organization ,p

rocesses

functions, and

the associated

supporting

management

information

systems are

thoroughly

discussed

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

128

Page 129: New Ict Curriculum (All Levels)

Discuss Organizational

structures and environments.

Discuss the changing role of

information systems in

organizations.

Discuss Economic and

behavioral effects of information

systems on

organizations.

3.1.2 Explain

appropriate

management

information

systems for the

range of business

functions and

organizational

levels.

Discus Types of Management

Information Systems by analyzing the

types of management information

systems by level and function:

operational level

knowledge level

management level

strategic level.

Appropriate

management

information

systems for

the range of

business

functions and

organizational

levels are

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

129

Page 130: New Ict Curriculum (All Levels)

clearly

explained

3.2.1 Assess the

impact of new

technology on

business

processes

and associated

management

information

systems.

Discus E-commerce, e-business

and information systems.

Discus Internet technology and

the digital firm.

Discus New business models.

Discus Categories of e-

commerce.

Analyse Customer-centred

retailing.

The impact of

new

technology on

business

processes and

associated

management

information

systems is

correctly

assessed.

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

3.2.2 Explain the

emerging

business

technologies

environments and

practices of

management

information

Discus Business-to-Business

(B2B).

Discus E-business and the digital

firm.

Discus Challenges and

opportunities of e-commerce.

The emerging

business

technologies

environments

and practices

of

management

information

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

130

Page 131: New Ict Curriculum (All Levels)

systems systems are

clearly

explained

3.3.1 Discuss the

managerial

decision making

process in

business.

Discuss how to Manage the

organization.

Discuss Models and roles of

management.

Discuss Management decision

making.

Discuss Process, stages and

models of decision making.

Discuss Information systems and

business strategy.

Discuss Strategic information

systems.

Discuss the value chain model.

Discuss Firm and industry level

strategy and information

systems.

The

Managerial

decision

making

process in

business is

thoroughly

discussed.

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

131

Page 132: New Ict Curriculum (All Levels)

3.3.2 Explain the

relationship

between decision

making and

management

information

systems at

different levels of

the organization.

Discuss the Decision Making and

Management Information

Systems at Different Levels in

the Organization: Decision

Support Systems (DSS),Types of

DSS, Components of a DSS,DSS

applications, Modeling, planning

and control, Executive support

systems (ESS),Role, benefits and

success factors of ESS.

The

relationship

between

decision

making and

management

information

systems is

clearly

explained at

different levels

of an

organization

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

3.3.3 Evaluate the

importance of

collaborative

decision making

environments and

review group

management

information

Discuss the Collaborative Decision

Making Processes: Collaborative

working, Group Decision Support

Systems (GDSS), Factors for success in

enhanced collaborative decision

making.

The

importance of

collaborative

decision

making

environments

is correctly

evaluated and

review group

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

132

Page 133: New Ict Curriculum (All Levels)

systems. management

information

Systems is

correctly

evaluated

3.3.4 Apply

concepts and

knowledge

management in

the management

information

systems context.

Discuss Knowledge and

knowledge management.

Discuss Systems and

infrastructure for knowledge

management.

Discuss Information and

knowledge work systems.

Discuss Enterprise knowledge

environments.

Discus Business intelligence and

enterprise reporting and

analysis.

The concepts

and knowledge

management

are properly

applied in the

management

information

systems

context .

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

3.4.1 Explain the

key requirement

of competitive

Discuss the Competitive

Advantage as a Driver for

Management Information

The key

requirements

of competitive

Assignments

and class in

demonstration

Written

assignments,

model

133

Page 134: New Ict Curriculum (All Levels)

advantage . Systems: Information systems

for competitive advantage, SCM

and ERP, Organizational design,

Business value of

information ,Managing change

and implementation.

advantage are

clearly

explained

s answer

3.5.1 Discuss the

risk, security and

control issues

associated with

management

information

systems.

Discus Systems integrity and risk

assessment.

Discuss Information systems

security and control.

Discuss Systems vulnerability

and abuse.

Discuss Systems quality

problems.

Discuss Control environments.

Discuss Internet security

challenges.

Discuss Ensuring systems

quality.

Discus Disaster recovery and

business continuity planning.

The risk,

security and

control issues

associated

with

management

information

systems are

thoroughly

discussed.

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

3.5.2 Discuss the

control measures

Discuss risk control measures

Discuss information systems

The control

measures for

Assignments Model

134

Page 135: New Ict Curriculum (All Levels)

for the risks

associated with

managing

information

systems.

vulnerability control

Discuss information system

security control

the risks

associated

with managing

information

systems are

thoroughly

discussed

answers

3.6.1 Review the

range of

professional

issues, which are

associated

with business

activities and

management

information

systems.

Discuss Privacy and how this is

managed.

Discuss Intellectual property

issues.

Discus Codes of conduct and

professional practice.

The range of

professional

issues, which

are associated

with business

activities and

management

information

systems are

correctly

reviewed

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

3.6.2 Evaluate

business activities

that needs

information

Discuss business activities

Discuss information systems

Relate business activities to the

information systems supporting

The business

activities that

needs

information

assignments Model

answers

135

Page 136: New Ict Curriculum (All Levels)

systems support

for better

performance

them

Discuss organizational

performance

systems

support for

better

performance

are

correctively

evaluated

4.1.1 Configure

Network Adapter

and Modem

Identify Compatible modem,

Ethernet card, sound card or

other PCI card.

Cross-point (Philips) Screwdriver

suitable for your PC case.

Use Fixing screw (usually comes

with the case).

Use Anti-Static Wrist-strap (if

available)

Locate the PCI slots

Network

Adapter and

Modem are

correctly

configured

Assignments

and class in

demonstration

s

Written

assignments,

model

answer

4.1.2 Set up

Repeaters and

Bridges

Enter global configuration mode.

Enter interface configuration mode for

the radio interface

Create the SSID that the repeater uses to

Repeaters and

bridges are

correctly set

Assignments

and class in

demonstration

Written

assignments,

model

136

Page 137: New Ict Curriculum (All Levels)

associate to a root access point

Designate the SSID as an infrastructure

SSID

Exit SSID configuration mode and return

to radio interface configuration mode

Set the access point's role in the wireless

LAN to repeater.

Return to privileged EXEC mode.

up s answer

4.1.3 Set up Hub

and Switch

Find the WAN or uplink port of

the Ethernet hub.

Connect an Ethernet cable from

the WAN port of the hub to

either the Ethernet port of the

internet modem or, if expanding

a network, to an empty LAN port

on the existing network’s router,

switch or hub.

Plug an Ethernet cable into one

of the LAN ports on the Ethernet

hub and connect the other end

of cable to the computer

Hubs and

switches are

correctly

set up

Demonstratio

n and

observation

Written

materials.

137

Page 138: New Ict Curriculum (All Levels)

Power up the Ethernet hub and

the computers or other devices

attached to it.

Configure the network settings

on each connected computer.

Verify that all computers can

access the network and the

Internet if connected

4.1.4 Connect

Wireless Access

Point and

configure

Find the IP addresses of

your existing gateway/router and

clients

Connect to your router

administration interface to find

the DHCP range

Connect a computer to

the wireless router/AP

Configure the wireless router /

AP

Test admin page is reachable

and secure the AP

Test the AP wireless connection

Wireless

Access Point is

correctly

connected and

configured

Demonstratio

n and

observation

Written

materials.

4.1.5 configure IDENTIFY different modes; user Router is Demonstratio Written

138

Page 139: New Ict Curriculum (All Levels)

Router EXEC ,privileged EXEC, global

config ,interface config, setup

Enter the model ;user ,privileged

EXEC

Enter the configuration mode

Configure the IP address

Configure the routing protocol

Open shortest path first (OSPF)

Create the IGRP Routing Process

Enable and configure BGP

Routing

correctly

configured

n and

observation

materials.

4.2.1 Configure

ARP

Define a Static ARP Cache Entry,

Enable Proxy ARP,

Configure DAGR,

Configure ARP purge-delay

Configure ARP timeout

ARP is

correctly

configured

Demonstratio

n and

observation

Written

materials.

4.2.2 Configure

ICMP

Allow ping ICMP Echo-Request

outbound and Echo-Reply

messages inbound.

ICMP is

correctly

configured

Demonstratio

n and

observation

Written

materials.

139

Page 140: New Ict Curriculum (All Levels)

Allow traceroute TTL-Exceeded

and Port-Unreachable messages

inbound.

Allow path MTU ICMP

Fragmentation-DF-Set messages

inbound.

Block other types of ICMP traffic

4.2.3 Configure

BOOTP

Chose and Decide the values

that you want in the BOOTP

packet reply fields:

Choose and Decide the list of

options and their values that you

want returned to the BOOTP

client

Set values in the policy you

want associated with the BOOTP

request:

Enable the associated scope or

scopes for BOOTP processing.

Enable dynamic BOOTP

processing if you want to have

this scope provide an address for

any BOOTP client that requests

BOOTP is

correctly

configured

Demonstratio

n and

observation

Written

materials.

140

Page 141: New Ict Curriculum (All Levels)

one

4.2.4 Configure

DHCP

Configure a database agent and

disable conflict loggins

Exclude IP addresses

Configure a DHCP address pool

DHCP is

correctly

configured

Demonstratio

n and

observation

Written

materials.

4.2.5 Configure

DNS

Choose a Domain name

Enable The Boot File

Start the named Daemon

Test the DNS Configuration

DNS is

correctly

configured

Demonstratio

n and

observation

Written

materials.

4.2.6 Configure

LDAP

Locate the LDAP configuration

files

add the appropriate files to your

server configuration

Restart the server

Edit the containers.ldif file in

order to include the correct LDAP

suffix for your directory

Use the ldapadd command to

add the containers. Use a bind

DN that has the appropriate

permissions.

LDAP is

correctly

configured

Demonstratio

n and

observation

Written

materials.

4.3.1 Verify connections

Ensure compatibilities of added

Problems with

computer

Demonstratio

n and

Written

141

Page 142: New Ict Curriculum (All Levels)

Troubleshoot

problems with

computer systems

devices in a network

Verify functionalities of network

devices

Verify correct protocols are

installed in a computer

Ensure the firewall ports are

open

Use troubleshooting tools: ping,

ifconfig ,arp, snoop,

ndd,netstat, traceroute

systems are

properly

troubleshot.

observation materials.

4.3.2 Assist users

to resolve

problems with

equipment and

data

Set up the same IP scheme (e.g.

192.168.0.x).

Make sure you have the same

Subnet Mask, Gateway, and DNS

IP addresses

Make sure you can ping the

other computers by IP ADDRESS

and name

Make sure you have the same

workgroup name (watch for

trailing spaces)

With Windows2000, XP and

Vista, make sure you have the

Users are

assisted to

resolve

problems with

equipment and

data

satisfactorily

Demonstratio

n and

observation

Written

materials.

142

Page 143: New Ict Curriculum (All Levels)

same username and password

as the person logging onto the

other computers. The default

setting for all but the Home

Versions is to require a password

for network access

Remove any unnecessary

firewalls, protocols or other

configurations the complicate

the troubleshooting process. You

can add them back in later after

you get things working.

4.3.3 Plan,

design, acquire

new or upgraded

hardware and

software

Identify different versions of

software to be used in upgrading

the network

Identify different hardware to be

used in the upgrading

Plan and design the network

New upgraded

hardware and

software are

properly

planned,

designed and

acquired.

Exercise,

assignment

Questions

and model

answer.

4.3.4 Install

LAN/WAN and

Choose LAN/WAN design

considerations

LAN/WAN is

correctly

Demonstratio

n and

Written

143

Page 144: New Ict Curriculum (All Levels)

maintain

Computer

Identify hub, switch, repeater,

router to be used

Identify cables: UTP/STP ,Coax,

macro wave

Identify IP address, subnet mask,

default gateway, DHCP, proxy

server

Design a switched LAN

installed and

computer

properly

maintained

observation materials.

4.3.5 Apply ISO

management

model

Describe application layer

Describe presentation layer

Describe session layer

Describe transport layer

Describe network layer

Describe data link layer

Describe physical layer

ISO

management

model is

properly

applied

Exercise,

assignment

Questions

and model

answer.

5.1.1 Explain the

role of CPU

Describe the functions of CPU

Describe different types of

processors

The role of

CPU is clearly

explained

Exercise,

assignment

Questions

and model

answer.

5.1.2 Describe

the component

parts of CPU

Identify control unit

Identify ALU

Identify RAM

The CPU

components

are clearly

Exercise,

assignment

Questions

and model

144

Page 145: New Ict Curriculum (All Levels)

Identify registers described answer.

5.1.3 Describe

purpose of

instruction pointer

Identify how the computer is in

instruction instruction sequence

The purpose of

instruction

pointer is

clearly

described

Exercise,

assignment

Questions

and model

answer.

5.1.4 Describe

steps in

processing an

instruction

Identify and describe instruction

fetch

Identify and describe instruction

decode

Identify and describe instruction

execution

Identify and describe

instruction/data storage

Steps of

processing an

instruction are

clearly

described

Exercise,

assignment

Questions

and model

answer.

5.2.1 explain the

purpose of

memory cell

Identify cache memory

Identify flash BIOS memory

Describe memory address

The purpose of

memory cell is

clearly

described.

Exercise,

assignment

Questions

and model

answer.

5.2.2 apply RAM Describe the functions and uses RAM and ROM Exercise, Questions 145

Page 146: New Ict Curriculum (All Levels)

and ROM of RAM

Describe the functions and use

of ROM

are properly

applied.

assignment and model

answer.

5.2.3 Identify

different types of

ROM

Describe Mask-Programmed

ROM (MROM)

Describe Programmable ROM

(PROM)

Describe Erasable-

Programmable ROM (EPROM).

Describe Electrically Erasable

PROM (EEPROM)

Different types

of ROM are

correctly

identified.

Exercise,

assignment

Questions

and model

answer.

5.2.4 Describe

storage capacities

Analyse the storage capacity of

bit

Analyse the storage capacity of

byte

Analyse the storage capacity of

word

Analyse the storage capacity of

kilobyte(KB)

Analyse the storage capacity of

Storage

capacities are

clearly

described

Exercise,

assignment

Questions

and model

answer.

146

Page 147: New Ict Curriculum (All Levels)

megabyte (MB)

Analyse the storage capacity of

gigabyte (GB)

Analyse the storage capacity of

terabyte (TB)

5.2.5 differentiate

internal and

external buses

Describe internal/external

parallel bus

Describe internal/external serial

bus

Describe self-repaired internal

bus

Describe: PCI,PCI-

EXPRESS,AGP,USB,FIREWIRE

PS/2

Internal and

external buses

are clearly

differentiated

Exercise,

assignment

Questions

and model

answer.

5.3.1 Identify

different

Character

recognition

devices

Describe the OCR

Describe the MCR

Describe the MICR

Different

character

recognition

devices are

correctly

identified.

Exercise,

assignment

Questions

and model

answer.

5.3.2 Explain the discus different barcode symbols

discuss different scanning

The role of bar

code reader is

Exercise, Questions

and model

147

Page 148: New Ict Curriculum (All Levels)

role of barcodes devices

Discuss the functions of barcode

readers

clearly

explained.

assignment answer.

5.3.3 Identify

different types of

magnetic Tapes

Describe open pool tape

Describe cassette tapes

Describe tape cartridges

Different types

of magnet

tapes are

clearly

identified

Exercise,

assignment

Questions

and model

answer.

5.3.4 Identify

different types of

magnetic disks

Describe hard disk

Describe floppy disks

Different types

of magnetic

disks are

correctly

identified

Exercise,

assignment

Questions

and model

answer.

5.3.5 Asses hard

disk performance

Explain latency

Explain seek time

Explain transfer rates

Hard disk

performance is

correctly

assessed.

Exercise,

assignment

Questions

and model

answer.

6.1.1Audit

Information

Systems

according to

required

Explain different categories of

Audit assignment

Obtaining and recording an

understanding of the audit

Information

systems are

properly

audited

according to

Exercise,

assignment

Questions

and model

answer.

148

Page 149: New Ict Curriculum (All Levels)

procedures area/subject

Explain sources of information

for tests.

required

procedures.

6.1.2 Conduct

information

systems Risk

Assessment and

arrange sequence

of functions

Perform Compliance test

Perform Substantive test

Develop Audit plan according to

risk level

Gather and assess Evidence

Produce report

Present report to Communicate

results

Risk

assessment for

information

systems is

properly

conducted and

sequence of

functions

properly

arranged.

Exercise,

assignment

Questions

and model

answer.

6.1.3 Perform

audit assignment

Produce detailed audit plan

Preliminary review of the audit

area/subject

Evaluating the audit area/subject

Reporting (communicating

results)

Audit

assignments

are correctly

performed

Exercise,

assignment

Questions

and model

answer.

6.2.1Assess Explain existing standards for Information Exercise, Questions 149

Page 150: New Ict Curriculum (All Levels)

Information

Technology

Governance

effective Information Technology

Governance

Evaluate sufficiency of

Information systems policy and

Procedures

Evaluate adherence of the

procedures to the to regulatory

standards

Assess effectiveness of available

resources to satisfy required

obligations.

Technology

Governance is

correctly

assessed

assignment and model

answer.

6.2.2 Assess

adherence of

Information

Systems

development life

cycle

management

Evaluate procedures for

Information Systems Life Cycle

Management

Explain procedures for

Explain procedures for systems

testing

Evaluate sufficiency of real life

test to the standard test

procedure

Adherence of

Information

Systems

development

life cycle

management

is correctly

assessed.

Exercise,

assignment

Questions

and model

answer.

150

Page 151: New Ict Curriculum (All Levels)

6.2.3 Conduct

Tests to check

Business

continuity

Management

Explain components of business

continuity plan

Develop a business continuity

plan

Explain decision criteria of levels

of risk for business continuity.

Test business continuity plan

Business

continuity

Management

tests are

properly

conducted

Exercise,

assignment

Questions

and model

answer.

6.2.4 Conduct

test to check

effectiveness of

Disaster recovery

planning

Explain components of Disaster

recovery plan

Evaluate roles of key players of

disaster recovery plan

Explain recovery strategy

Test practical disaster recovery

plan

Test to check

effectiveness

of disaster

recovery

planning is

properly

conducted

Exercise,

assignment

Questions

and model

answer.

6.3.1Ensure

Security of

Information

assets

Explain concepts of

Confidentiality, Integrity, and

Availability

Assess different categories of

physical and logical access

controls.

Security of

information

assets is

correctly

assessed

Exercise,

assignment

Questions

and model

answer.

151

Page 152: New Ict Curriculum (All Levels)

Explain Public Key

Infrastructures and applicability

to information assets protection

6.3.2 Conduct test

of Security

procedures and

components

Develop procedures for

classifying information assets

Test controls to evaluate

sufficiency of security of real

business case

Test on

Security

procedures

and

components

are properly

conducted.

Exercise,

assignment

Questions

and model

answer.

6.4.1 Describe

objectives of

entrepreneurship

Explain background to

entrepreneurship

Define entrepreneurship

Objectives of

entrepreneurs

hip are

properly

described

Assignment,

class

exercises

Model

answers,

checklist

6.4.2 Analyze

entrepreneurship

in business

organization

List categories of businesses

Mention characteristics of

entrepreneurship

Entrepreneurs

hip in business

organization is

properly

analyzed

Assignment,

class

exercises

Model

answers,

checklist

6.4.3 Discuss the Define information system The Assignment, Model 152

Page 153: New Ict Curriculum (All Levels)

importance of

information

system in

entrepreneurship

Assess relationship between

information systems and the

activities of the business

importance of

information

system in

entrepreneurs

hip is properly

discussed

class

exercises

answers,

checklist

6.4.4 Discuss the

role of

entrepreneurship

concepts in

developing

business

Describe entrepreneurship

concepts

Discuss different types of

businesses

Identify sources of business

finance

The role of

entrepreneurs

hip concepts in

developing

business is

properly

discussed

Assignment,

class

exercises

Model

answers,

checklist

153

Page 154: New Ict Curriculum (All Levels)

11.0 BENCHMARKING OF ASSESMENT CRITERIA

ASSESMENT CRITERIA SATISFACTORY GOOD EXCELLENT

1.1.1 Structure of a program is

clearly described.

Declares comments in a C++

program , library function

and use namespace std;

Declares comments in a

C++ program ,library

function and gives

example #include

<iostream>,declares

and uses namespace

std;and declares the

main function ;int main

()

Declares comments, library

function #include <iostream> in a

C++ program declares and uses

namespace std;main function ;int

main (), and displays function;

cout << "Hello World!"

1.1.2 Variables and data types

are correctly declared

Identifies reserved key

words, describes and

declares integers.

Identifies reserved key

words, Describe and

declare integers,

Boolean, float,

character, double.

Identifies reserved key words,

describes and declare integers,

boolean, float, character, double,

and initializes variables

1.1.3 Constants are correctly

identified and declared

Identifies and declare

literals

Identifies and declare

literals, integer

Identifies and declare literals,

integer numbers, float pointers

154

Page 155: New Ict Curriculum (All Levels)

numbers. constants.

1.1.4 Operators in C++ program

are correctly assigned.

Identifies different types of

operators; e.g. assignment,

arithmetic, compound,

increase and decrease.

Identifies different types

of operators;

assignment, arithmetic,

compound, increase and

decrease, relational and

equity, logic,

conditional, comma,

bitwise, sizeoff, and

precedence operators.

Identifies different types of

operators; assignment, arithmetic,

compound, increase and

decrease, relational and equity,

logic, conditional, comma, bitwise,

sizeoff, precedence operators.

Assign different types of

operators; assignment,

arithmetic, compound,

increase and decrease,

relational and equity, logic,

conditional, comma, bitwise,

sizeoff, and precedence

operators.

1.1.5 Basic Input/ Output are

correctly identified and

declared

Identifies Standard Output

(cout).

Identifies Standard

Output (cout) and

Standard Input (cin).

Identifies and declares Standard

Output (cout), identifies and

declares Standard input (cin).

155

Page 156: New Ict Curriculum (All Levels)

1.2.1 Control structures in C++

program are properly

applied and used

Declares some conditional

structures (if…..else),

iteration structure ( loops:

while, do…while, for…loop.

Declares more

conditional structures

(if…..else), iteration

structure (loops: while,

do…while, for…loop),

jump statements,

continue and go to

statements.

Declares wide range of conditional

structures (if…..else), iteration

structure (loops: while, do…while,

for…loop), jump statements,

continue and go to statements,

and applies conditional structures

(if…..else), iteration structure

(loops: while, do…while, for…

loop), jump statements, continue

and go to statements.

1.2.2 Different types of C++

program are correctly

declared.

Identifies some types of

functions: exit, selective

switch, void.

Identifies more different

types of functions: exit,

selective switch, void,

passing arguments,

overloaded, inline,

recursivity.

Identifies and declares more

different types of functions: exit,

selective switch, void, passing

arguments, overloaded, inline,

recursivity.

1.3.1 Arrays in C++ program

are properly declared

Initializes arrays and

describes multi-dimension

arrays

Initializes arrays,

describes multi-

dimension arrays, and

passes parameters

Initializes arrays, describes multi-

dimension arrays, Pass

parameters and

156

Page 157: New Ict Curriculum (All Levels)

Accesses values of an array

1.3.2 Character sequences are

correctly declared

Initializes null-terminated

character sequence

Initializes null-

terminated character

sequences, and applies

null-terminated

character sequence

Initialize null-terminated

character sequence thoroughly,

and Applies null-terminated

character sequence very correctly

1.3.3 Pointers are correctly

declared

Applies reference operator,

and deference operators

Applies reference

operator, and deference

operators and variables

of pointer types

Applies: reference operator,

deference operators, variables of

pointer types and initializes

pointers; arithmetic, void, pointer

to pointer, pointer to function

and nully-pointers

1.3.4 Dynamic memory in C++

program are properly

allocated

Applies operators new and

new[]

Applies operators

new and new[],

and

operators delete,

and delete[]

Applies operators new and new[],

operators delete, and delete[],

and also memory in ANSI-C

1.3.5 Data structures in C++

program are correctly

Applies structure_name,

object_name, and pointer to

Applies structure_name,

object_name, pointer to

Applies structure_name,

object_name, pointer to pointer, 157

Page 158: New Ict Curriculum (All Levels)

declared pointer pointer and also nesting

structure

nesting structure also

Applies other data types(

typedef)

1.4.1 Classes in C++ program

are correctly declared

Applies class_name,

object_name, and specifies

private class

Applies class_name,

object_name, and

specifies private,

public/protected classes

Applies class_name, object_name,

Specifies private, public/protected

class and also class functions:

constructors and destructors

, overloading and default.

1.4.2 Friendship and inheritance

are correctly declared

Applies friend functions, and

friend class

Applies friend functions,

friend class, and

inheritance between

classes

Applies friend functions, friend

class, inheritance between

classes, and also applies multiple

inheritance.

1.4.3 Polymorphism in C++

program are correctly

applied

Declares pointers to base

class

Declares pointers to

base class, virtual

members

Declare pointers to base class,

virtual members and also abstract

base

1.4.4 Message in C++ program

are correctly passed

declares message declares message, and

finds object(s) to pass

declares message, finds object(s)

to pass message, and finds a

158

Page 159: New Ict Curriculum (All Levels)

method function to be invoked

2.1.1 Apache, PHP, Mysql or

Wamp/ Xamp are properly

downloaded and saved in

a computer

Connects to the internet,

downloads PHP for free :

http://www.php.net/downloa

ds.php

Connects to the internet,

downloads PHP for free :

http://www.php.net/dow

nloads.php, MySQL for

free :

http://www.mysql.com/d

ownloads/

Connects to the internet

downloads PHP for free :

http://www.php.net/downloads.ph

p ,

Downloads MySQL for free :

http://www.mysql.com/downloads

/ , and

Downloads Apache for free :

http://httpd.apache.org/download.

cgi

2.1.2 Apache, PHP, Mysql or

Wamp/ Xamp are properly

installed

opens the Apache/php/mysql

installs file downloaded,

opens the

Apache/php/mysql

installs file downloaded,

reaches the “Server

Information” screen

during downloading

opens the Apache/php/mysql and

installs the file downloaded,

reaches the “Server Information”

screen, then

chooses the complete installation

button.

159

Page 160: New Ict Curriculum (All Levels)

2.1.3 The web server is properly

used

Installs the web server

software on the computer.

installs the web server

software on the

computer, and assigns a

domain name.

installs the web server software

on the computer, assigns a

domain name and also

installs antivirus software

2.2.1 Files are read and written

properly

applies PHP-file open: write,

file fwrite function

applies PHP-file open:

write, file fwrite

function, file-

write:overwrite function

applies PHP-file open: write, file

fwrite function, file-

write:overwrite function and also

applies the above in reading

too

2.2.2 API files are properly

manipulated

views and modifies file

attributes, reads and lists

directory contents,

views and modifies file

attributes, reads and

lists directory contents,

alters file permissions,

views and modifies file attributes,

reads and lists directory contents,

alters file permissions, retrieves

file contents into a variety of

native data structures, searches

for files based on specific

patterns.

160

Page 161: New Ict Curriculum (All Levels)

2.2.3 Files are uploaded and

exited successfully

creates table upload creates table upload,

uploads the data/files

creates table upload, uploads the

data/files, and applies fclose()

function

2.3.1 PHP syntax is properly

applied

applies general PHP scripting

block

applies PHP scripting

block, applies PHP

output text: e.g. echo

Applies PHP scripting block, PHP

output text: .e.g. echo,

print, HTML tags

2.3.2 Variables are properly

declared

identifies the variable name

and value, applies $ to each

variable name, declares

$var_name = value;

identifies the variable

name and value, applies

$ to each variable name,

declares $var_name =

value; and applies

Predefined variables

identifies the variable name and

value, applies $ to each variable

name, declares $var_name =

value; applies predefined

variables, applies Variable scope,

and applies variables from outside

PHP

2.3.3 Arrays are correctly

declared

identifies different types of

arrays; Numeric array ,

Associative array,

identifies different types

of arrays; Numeric

array , Associative

array, Multidimensional

identifies different types of arrays;

Numeric array , associative array,

multidimensional array, initializes

array and also applies array 161

Page 162: New Ict Curriculum (All Levels)

Multidimensional array array

initializes array,

declaration

2.3.4 Functions are correctly

declared

identifies built-in functions

and user defined functions,

applies the PHP syntax for

functions:

function functionName()

{

code to be executed;

}

identifies built-in

functions and user

defined functions,

applies the PHP syntax

for functions:

function functionName()

{

code to be executed;

},

applies function calling,

User-defined functions

identifies built-in functions and

user defined functions, applies the

PHP syntax for functions:

function functionName()

{

code to be executed;

},

applies function calling, User-

defined functions, Applies

Function arguments, Applies

Returning values, Applies Variable

functions.

2.3.5 Classes and objects are Auto loads Objects, Applies Autoload Objects, Autoload Objects, Applies

162

Page 163: New Ict Curriculum (All Levels)

correctly declared the following Constructors

and Destructors, Applies

Visibility, Scope Resolution

Operator (::), Static Keyword,

Comparing objects and

Reflection

Applies: Constructors

and Destructors,

Visibility, Scope

Resolution Operator (::),

Static Keyword, Object

Constants, Applies

Object Abstraction,

Object Interfaces,

Overloading, Object

Iteration, and applies

Patterns.

Constructors and Destructors,

Visibility, Scope Resolution

Operator (::), Static Keyword,

Object Constants, Object

Abstraction, Object Interfaces,

Overloading, Object Iteration,

Patterns, Magic Methods, Final

Keyword, Object cloning,

Comparing objects and Reflection

2.3.6 Strings operations in PHP

are correctly declared

Applies: string

concatenation, strlen()

function, strps() function

Applies:

string concatenation,

strlen() function, strps()

function,

Identifies different

operators :arithmetic,

assignment,

comparison, and logic

Applies: string concatenation,

strlen() function, strps() function,

Identifies: different

operators :arithmetic, assignment,

comparison, and logic operators,

and also applies different

operators :arithmetic, assignment,

comparison, and logic operators

163

Page 164: New Ict Curriculum (All Levels)

operators.

2.4.1 Web site structure is

correctly declared

Prepares homepage( index

page), main section ( site

index)

Prepares

homepage( index page),

main section ( site

index), and

subsection( content)

Prepares homepage( index page),

main section ( site index),

subsection( content) and links

between sections.

2.4.2 Graphic resources are

properly prepared

Explains graphics. Explains graphics and

differentiate graphics.

Explains graphics, differentiates

graphics, and finds graphics.

2.4.3 Templates are properly

designed and template

resources are correctly

uploaded

Explains template. Explains template,

differentiate templates,

and locate template

resources.

Explains template, differentiates

templates, and locates template

resources.

2.4.4 All modules are correctly

created and added to

templates

Defines modules. Defines modules and

differentiate modules.

Define modules, differentiate

modules, and attach modules

164

Page 165: New Ict Curriculum (All Levels)

2.4.5 Pages and forms are

correctly created

Defines form. Defines form, and finds

contents.

Defines form, finds contents, and

explains HTML Tags

3.1.1 The relationship between

the business

organization ,processes

and functions and the

associated supporting

management information

systems are thoroughly

discussed

Applies the Business

Organization and Supporting

Management Information

Systems by:

Identifying Systems and

Systems Thinking, Outline

Information systems in

modern organizations,

discusses types and

characteristics of systems.

Describe: Business processes

and information systems,

Customer Relationship

Management (CRM) and

SCM.

Discusses Collaborative

Applies the Business

Organization and

Supporting Management

Information Systems by:

Identifying Systems and

Systems Thinking,

Outlining, Information

systems in modern

organizations.

Discusses types and

characteristics of

systems.

Describes business

processes and

information systems,

Customer relationship

Applies the Business Organization

and Supporting Management

Information Systems by:

Identifying Systems and Systems

Thinking, Outlining Information

systems in modern organizations,

discussing types and

characteristics of systems,

Describing business processes and

information systems, Customer

Relationship Management (CRM)

and SCM, Discussing Collaborative

commerce, Enterprise systems.

Also

Outlining Organizations and

information systems.

165

Page 166: New Ict Curriculum (All Levels)

commerce. Management (CRM) and

SCM.

Discusses: Collaborative

commerce, Enterprise

systems.

Outline Organizations

and information

systems, and

Organisations,

procedures, politics and

culture.

Discussing Organizations,

procedures, politics and culture,

Organizational structures and

environments, The changing role

of information systems in

organizations, Economic and

behavioral effects of information

systems on

organizations.

3.1.2 Appropriate management

information systems for

the range of business

functions and

organizational levels are

appropriately explained

Mentions Types of

Management Information

Systems by analyzing the

type of management

information systems by level

and function:operational and

knowledge levels

Mentions Types of

Management

Information Systems by

analyzing the types of

management

information systems by

level and function:

Discuss Types of Management

Information Systems by analyze

the types of management

information systems by level and

function:

operational level, knowledge level,

management level, strategic level.

166

Page 167: New Ict Curriculum (All Levels)

operational level,

knowledge level,

management level,

strategic level.

3.2.1 The impact of new

technology on business

processes and associated

management information

systems is correctly

assessed

Discusses E-commerce, e-

business and information

systems, Internet technology

and the digital firm, New

business models, Categories

of e-commerce.

Discusses E-commerce,

e-business and

information systems,

Internet technology and

the digital firm, New

business models,

Categories of e-

commerce, Analyse

Customer-centred

retailing, Business-to-

Business (B2B).

Discusses E-commerce, e-business

and information systems, Internet

technology and the digital firm,

New business models, Categories

of e-commerce, analyse

Customer-centred retailing,

Business-to-Business (B2B), E-

business and the digital firm,

Challenges and opportunities of e-

commerce.

3.2.2 The emerging business

technologies environments

and practices of

management information

Discusses business-to-

business (B2B) business.

Discusses business-to-

business (B2B) business,

electronic business (e-

Discusses business-to-business

(B2B) business, electronic

business (e-business) and the

digital firm, and challenges and 167

Page 168: New Ict Curriculum (All Levels)

systems are clearly

explained

business). opportunities of e-commerce.

3.3.1 Managerial decision

making processes in

business are thoroughly

discussed.

Discusses how to Manage

the organization, Models and

roles of management,

Management decision

making, Process, stages and

models of decision making.

Discusses how to

Manage the

organization, Models and

roles of management,

Management decision

making, Process, stages

and models of decision

making.

Discuss Information

systems and business

strategy, Strategic

information systems,

and the value chain

model.

Discusses how to Manage the

organization, Models and roles of

management, Management

decision making, Process, stages

and models of decision making.

Discuss Information systems and

business strategy, Strategic

information systems, the value

chain model, Firm and industry

level strategy and information

systems.

3.3.2 The relationship between Explains briefly the Decision Discusses generally the Discuss the Decision Making and

168

Page 169: New Ict Curriculum (All Levels)

decision making and

management information

systems is clearly

explained at different

levels of an organization

Making and Management

Information Systems at

Different Levels in the

Organization.

Decision Making and

Management

Information Systems at

Different Levels in the

Organization :Decision

Support Systems

(DSS),Types of DSS,

Components of a

DSS,DSS applications.

Management Information Systems

at Different Levels in the

Organization: Decision Support

Systems (DSS), Types of DSS,

Components of a DSS, DSS

applications, Modeling, planning

and control, Executive support

systems (ESS),Role, benefits and

success factors of ESS.

3.3.3 The importance of

collaborative decision

making environments and

review group management

information

Systems is correctly

evaluated

Discusses briefly the

Collaborative Decision

Making Processes:

Collaborative working, Group

Decision Support Systems

(GDSS).

Discusses the

Collaborative Decision

Making Processes:

Collaborative working,

Group Decision Support

Systems (GDSS), Factors

for success in enhanced

collaborative decision

making.

Discusses at lengthy the

Collaborative Decision Making

Processes: Collaborative working,

Group Decision Support Systems

(GDSS), Factors for success in

enhanced collaborative decision

making.

3.3.4 The concepts and

knowledge and knowledge

management are properly

applied in the

Mentions knowledge and

knowledge management

elements, Systems and

infrastructure for knowledge

Discusses Knowledge

and knowledge

management, Systems

and infrastructure for

Discusses Knowledge and

knowledge management, Systems

and infrastructure for knowledge

management, Information and

169

Page 170: New Ict Curriculum (All Levels)

management information

systems context

management. knowledge

management,

Information and

knowledge work

systems, Enterprise

knowledge

environments.

knowledge work systems,

Enterprise knowledge

environments, Business

intelligence and enterprise

reporting and analysis.

3.4.1 The key requirements of

competitive advantage are

clearly explained

Mentions the Competitive

Advantage as a Driver for

Management Information

Systems.

Mentions and explains

the Competitive

Advantage as a Driver

for Management

Information Systems:

Information systems for

competitive advantage,

SCM and ERP,

Organizational design.

Discusses the Competitive

Advantage as a Driver for

Management Information

Systems: Information systems for

competitive advantage, SCM and

ERP, Organizational design,

Business value of

information ,Managing change

and implementation.

3.5.1 The risk, security and

control issues associated

with

Mentions the following:

Systems integrity and risk

assessment, Information

systems security and control,

Mentions the following:

Systems integrity and

risk assessment,

Information systems

Discusses the following: Systems

integrity and risk assessment,

Information systems security and

control, Systems vulnerability and

170

Page 171: New Ict Curriculum (All Levels)

Management information

systems are thoroughly

discussed.

Systems vulnerability and

abuse, Systems quality

problems, Control

environments, Internet

security challenges, Ensuring

systems quality, and Disaster

recovery and business

continuity planning.

security and control,

Systems vulnerability

and abuse, Systems

quality problems,

Control environments.

abuse, Systems quality problems,

Control environments, Internet

security challenges, Ensuring

systems quality, and Disaster

recovery and business continuity

planning.

3.5.2 The control measures for

the risks associated with

managing information

systems are thoroughly

discussed

Discusses risk control

measures.

Discusses risk control

measures, and

information systems

vulnerability control.

Discusses risk control measures,

information systems vulnerability

control, and information system

security control.

3.6.1 The range of professional

issues, which are

associated

with business activities

and management

information systems are

correctly reviewed

Discusses privacy and how

this is managed.

Discusses privacy and

how this is managed,

and intellectual property

issues.

Discusses privacy and how this is

managed, Intellectual property

issues and Codes of conduct and

professional practice.

3.6.2 The business activities Discusses business activities, Discusses business Discusses business activities,

171

Page 172: New Ict Curriculum (All Levels)

that needs information

systems support for better

performance are

correctively evaluated

information systems. activities, information

systems, and relate

business activities to the

information systems

supporting them.

information systems, and relate

business activities to the

information systems supporting

them, and organizational

performance.

4.1.1 Network Adapter, Modem

are correctly configured

Identifies Compatible

modem, ethernet card,

sound card or other PCI card.

Identifies Compatible

modem, ethernet card,

sound card or other PCI

card, Cross-point

(Philips) Screwdriver

suitable for your PC

case.

Identifies Compatible modem,

ethernet card, sound card or

other PCI card, Cross-point

(Philips) Screwdriver suitable for

your PC case and Uses Fixing

screw (usually comes with the

case), Anti-Static Wrist-strap (if

available)and Locates the PCI

slots

4.1.2 Repeaters and bridges are

correctly set up

Enters global configuration

mode and interface

configuration mode for the

radio interface.

Enters global

configuration mode and

interface configuration

mode for the radio

interface. Creates the

SSID that the repeater

uses to associate to a

root access point and

Enters global configuration mode

and interface configuration mode

for the radio interface. Creates

the SSID that the repeater uses

to associate to a root access

point, designates the SSID as an

infrastructure SSID, exits SSID

configuration mode and return to

172

Page 173: New Ict Curriculum (All Levels)

Sets the access point's

role in the wireless LAN

to repeater.

radio interface configuration

mode, Sets the access point's

role in the wireless LAN to

repeater and Returns to

privileged EXEC mode.

4.1.3 Hub and switches are

correctly set up

Finds the WAN or uplink port

of the Ethernet hub and

Connects an Ethernet cable

from the WAN port of the

hub to either the Ethernet

port of the internet modem

or, if expanding a network, to

an empty LAN port on the

existing network’s router,

switch or hub.

Finds the WAN or uplink

port of the Ethernet hub

and Connects an

Ethernet cable from the

WAN port of the hub to

either the Ethernet port

of the internet modem

or, if expanding a

network, to an empty

LAN port on the existing

network’s router, switch

or hub.Plugs an Ethernet

cable into one of the

LAN ports on the

Ethernet hub and

connect the other end of

Find the WAN or uplink port of

the Ethernet hub and Connect an

Ethernet cable from the WAN port

of the hub to either the Ethernet

port of the internet modem or, if

expanding a network, to an

empty LAN port on the existing

network’s router, switch or

hub .Plugs an Ethernet cable into

one of the LAN ports on the

Ethernet hub and connect the

other end of cable to the

computer and Powers up the

Ethernet hub and the computers

or other devices attached to it.

Configures the network settings

173

Page 174: New Ict Curriculum (All Levels)

cable to the computer on each connected computer and

verifies that all computers can

access the network and the

Internet if connected.

4.1.4 Wireless Access Point is

correctly configured.

Finds the IP addresses of

your existing gateway/router

and clients and connects to

your router administration

interface to find the DHCP

range

Finds the IP addresses of

your existing

gateway/router and

clients and connects to

your router

administration interface

to find the DHCP

range,computer to the

wireless router/AP and

configures the wireless

router / AP.

Finds the IP addresses of your

existing gateway/router and

clients and connect to your router

administration interface to find

the DHCP range, computer to the

wireless router/AP. Configures the

wireless router / AP, tests admin

page is reachable and secure the

AP, tests the AP wireless

connection

4.1.5 Router is correctly Identifies different modes; Identifies different Identifies modes; user

174

Page 175: New Ict Curriculum (All Levels)

configured user EXEC ,privileged EXEC,

global config ,interface

config, setup and

Enters the

model ;user ,privileged EXEC

modes; user

EXEC ,privileged EXEC,

global config ,interface

config, setup and

Enters the

model ;user ,privileged

EXEC, the configuration

mode and also

Configures the IP

address, the routing

protocol.

EXEC ,privileged EXEC, global

config ,interface config, setup,

Enters the model ;user ,privileged

EXEC,

Identifies different modes; user

EXEC ,privileged EXEC, global

config ,interface config, setup,

Enters the model ;user ,privileged

EXEC, the configuration mode

and

Configures the IP address, the

routing protocol also

Opens shortest path first (OSPF),

Creates the IGRP Routing

Process,

Enables and configure BGP

Routing.

4.2.1 The Address Resolution

Protocol(ARP) is correctly

configured

Defines a Static ARP Cache

Entry,

Enables Proxy ARP,

Defines a Static ARP

Cache Entry,

Enables Proxy ARP,

Defines a Static ARP Cache Entry,

Enables Proxy ARP,

Configures DAGR, ARP purge-

175

Page 176: New Ict Curriculum (All Levels)

Configures DAGR, delay, ARP timeout

4.2.2 ICMP is correctly

configured

Allows ping ICMP Echo-

Request outbound and Echo-

Reply messages inbound,

traceroute TTL-Exceeded and

Port-Unreachable messages

inbound.

Allows ping ICMP Echo-

Request outbound and

Echo-Reply messages

inbound, traceroute TTL-

Exceeded and Port-

Unreachable messages

inbound, MTU ICMP

Fragmentation-DF-Set

messages inbound.

Allows ping ICMP Echo-Request

outbound and Echo-Reply

messages inbound, traceroute

TTL-Exceeded and Port-

Unreachable messages inbound,

MTU ICMP Fragmentation-DF-Set

messages inbound.

Blocks other types of ICMP traffic

4.2.3 The BOOTP is correctly

configured

Choses and Decide the

values that you want in the

BOOTP packet reply fields,

and Decide the list of options

and their values that you

want returned to the BOOTP

client

Choses and Decide the

values that you want in

the BOOTP packet reply

fields, and Decide the

list of options and their

values that you want

returned to the BOOTP

client.

Sets values in the policy

Choses and Decide the values

that you want in the BOOTP

packet reply fields, and decide

the list of options and their

values that you want returned to

the BOOTP client.

Sets values in the policy you

176

Page 177: New Ict Curriculum (All Levels)

you want associated

with the BOOTP request:

want associated with the BOOTP

request:

Enables the associated scope or

scopes for BOOTP processing,

enables dynamic BOOTP

processing if you want to have

this scope provides an address

for any BOOTP client that

requests one.

4.2.4 The Dynamic Host Control

Protocol (DHCP) is

correctly configured

Configures a database agent

and disable conflict logins

Configures a database

agent and disable

conflict logins

Excludes IP addresses

Configures a database agent and

disable conflict logins,

Excludes IP addresses,

Configures a DHCP address pool

4.2.5 Domain Name

System(DNS) is correctly

configured

Chooses a Domain name,

Enables The Boot File

Chooses a Domain

name,

Enables The Boot File,

Starts the named

Daemon.

Chooses a Domain name,

Enables The Boot File,

Starts the named Daemon and

Tests the DNS Configuration

177

Page 178: New Ict Curriculum (All Levels)

4.2.6 LDAP is correctly

configured

Locates the LDAP

configuration files, adds the

appropriate files to your

server configuration,

Restarts the server

Locates the LDAP

configuration files, adds

the appropriate files to

your server

configuration, Restarts

the server, Edits the

containers. ldif file in

order to include the

correct LDAP suffix for

your directory

Locates the LDAP configuration

files, adds the appropriate files to

your server configuration,

Restarts the server, and Edits the

containers. Uses ldif file in order

to include the correct LDAP suffix

for your directory

Uses the ldapadd command to

add the containers. Use a bind

DN that has the appropriate

permissions.

4.3.1 Different computer

systems problems are

properly troubleshot

Verifies connections, Ensures

compatibilities of added

devices in a network, and

Verifies functionalities of

network devices

Locates the LDAP

configuration files, adds

the appropriate files to

your server

configuration, Restarts

the server, Verifies

connections, Ensures

compatibilities of added

Locates the LDAP configuration

files, adds the appropriate files to

the server configuration, restarts

the server, verifies connections,

ensures compatibilities of added

devices in a network, verifies

functionalities of network devices

and correct protocols are

178

Page 179: New Ict Curriculum (All Levels)

devices in a network. installed in a computer, Ensures

the firewall ports are open

Uses troubleshooting tools: ping,

ifconfig ,arp, snoop,

ndd,netstat, traceroute

4.3.2 Equipment problems are

resolved properly and

users are able to do their

work correctly

Sets up the IP scheme is the

same, (e.g. 192.168.0.x), the

same Subnet Mask, Gateway,

and DNS IP addresses also

can ping the other

computers by IP ADDRESS

and name.

Sets up the same IP

scheme (e.g.

192.168.0.x), Subnet

Mask, Gateway, and

DNS IP addresses

Also pings the other

computers by IP

ADDRESS and name,

the same workgroup

name (watch for trailing

spaces).

Sets up the same IP scheme (e.g.

192.168.0.x).

Makes sure that there is the

same Subnet Mask, Gateway, and

DNS IP addresses, can ping the

other computers by IP ADDRESS

and name, have the same

workgroup name (watch for

trailing spaces)

With Windows2000, XP and Vista,

makes sure that have the same

username and password as the

person logging onto the other

computers. The default setting

for all but the Home Versions is

to require a password for network

179

Page 180: New Ict Curriculum (All Levels)

access

Removes any unnecessary

firewalls, protocols or other

configurations the complicate the

troubleshooting process. You can

add them back in later after you

get things working.

4.3.3 New upgraded hardware

and software are properly

planned, designed and

acquired

Identifies different versions

of software to be used in

upgrading the network

Identifies different

versions of software to

be used in upgrading the

network

Identifies different

hardware to be used in

the upgrading

Identifies different versions of

software to be used in upgrading

the network

Identifies different hardware to

be used in the upgrading

Plans and designs the network

4.3.4 LAN/WAN is correctly

installed and computer

properly maintained

Chooses LAN/WAN design

considerations.

Identifies hub, switch,

repeater, router to be used

Chooses LAN/WAN

design considerations.

Identifies hub, switch,

repeater, router to be

used and cables:

Chooses LAN/WAN design

considerations.

Identifies hub, switch, repeater,

router to be used, cables:

UTP/STP ,Coax, macro wave, IP 180

Page 181: New Ict Curriculum (All Levels)

UTP/STP ,Coax, macro

wave

address, subnet mask, default

gateway, DHCP, proxy server and

dsigns a switched LAN.

4.3.5 ISO management model is

properly applied

Describes application layer,

presentation layer and the

session layer

Describes application

layer, presentation

layer, session layer, and

network layer

Describes application layer,

presentation layer, session layer,

transport layer, network layer,

data link layer and physical layer.

5.1.1 The role of CPU is clearly

explained

Describes the functions of

CPU

Describes the functions

of CPU, different types of

processors

Describes the functions of CPU,

different types of processors and

gives examples of different

manufacturers.

5.1.2 The CPU components are

clearly described

Identifies control unit, ALU Identifies control unit,

ALU, and RAM

Identifies control unit, ALU, RAM

and registers

181

Page 182: New Ict Curriculum (All Levels)

5.1.3 The purpose of instruction

pointer is clearly described

Defines instruction cycle Identifies different types

of instruction cycle

Identifies how the computer is in

instruction sequence

5.1.4 Steps of processing an

instructions are correctly

described

Identifies and describes

instruction fetch, and

instruction decode.

Identifies and describes

instruction fetch,

instruction decodes,

Identifies and describe

instruction execution.

Identifies and describe

instruction fetch,

Identifies and describe

instruction decode,

Identifies and describe

instruction execution,

Identifies and describe

instruction/data storage.

5.2.1 The purpose of memory

cell is clearly described

Identifies cache memory Identifies cache

memory, and flash BIOS

memory

Identifies cache memory, flash

BIOS memory and

Describes memory address

5.2.2 RAM and ROM are properly

applied.

Describes the functions and

uses of RAM

Describes the functions

and uses of RAM, the

functions and use of

Describes the functions and uses

of RAM, the functions and use of

ROM and

182

Page 183: New Ict Curriculum (All Levels)

ROM States the difference between the

two.

5.2.3 Different types of ROM are

correctly identified.

Describes Mask-Programmed

ROM (MROM), Programmable

ROM (PROM)

Describes Mask-

Programmed ROM

(MROM), Programmable

ROM (PROM), Erasable-

Programmable ROM

(EPROM), Mask-

Programmed ROM

(MROM), and

Programmable ROM

(PROM).

Describes Mask-Programmed

ROM (MROM), Programmable

ROM (PROM), Erasable-

Programmable ROM (EPROM),

Electrically Erasable PROM

(EEPROM), Mask-Programmed

ROM (MROM), and programmable

ROM (PROM)

5.2.4 Storage capacities are

clearly described.

Analyses the storage

capacity of bit, the storage

capacity of byte, and the

storage capacity of word

Analyses the storage

capacity of bit, the

storage capacity of byte,

the storage capacity of

word, the storage

capacity of kilobyte(KB)

Analyses the storage capacity of

bit, the storage capacity of byte,

the storage capacity of word, the

storage capacity of kilobyte(KB),

the storage capacity of megabyte

(MB), the storage capacity of

gigabyte (GB), the storage

capacity of terabyte (TB).

5.2.5 internal and external Describes internal/external Describes Describes internal/external 183

Page 184: New Ict Curriculum (All Levels)

buses are clearly

differentiated

parallel bus, internal/external

serial bus

internal/external parallel

bus, internal/external

serial bus and self-

repaired internal bus

parallel bus, internal/external

serial bus, self-repaired internal

bus, PCI,PCI-

EXPRESS,AGP,USB,FIREWIRE,

PS/2

5.3.1 Different character

recognition devices are

correctly identified.

Describes the OCR Describes the OCR the

MCR

Describes the OCR, the MCR and

the MICR

5.3.2 The role of bar code

reader is clearly explained

discusses different barcode

symbols

discusses different

barcode symbols,

different scanning

devices

discusses different barcode

symbols, different scanning

devices, and the functions of

barcode readers

5.3.3 Different types of are

clearly identified.

Describes open pool tape Describes open pool

tape, cassette tapes

Describes open pool tape,

cassette tapes, and tape

cartridges

5.3.4 Different types of

magnetic disks are

Describes hard disk Describes hard disk, Describes hard disk, floppy disks,

differentiates with other media 184

Page 185: New Ict Curriculum (All Levels)

correctly identified. floppy disks e.g. tape drives

5.3.5 Hard disk performance is

correctly assessed.

Explains latency Explains latency, seek

time

Explains latency, seek time, and

transfer rates

6.1.1 Information systems are

properly audited according

to required procedures.

Explains different categories

of Audit assignment

Explains different

categories of Audit

assignment,

Obtains and recording

an understanding of the

audit area/subject

Explains different categories of

Audit assignment,

Obtains and recording an

understanding of the audit

area/subject,

Explains sources of information

for tests.

6.1.2 Risk assessment for

information systems is

properly conducted and

sequence of functions

properly arranged.

Performs Compliance test,

Substantive test

Performs Compliance

test, Substantive test

and

Develops Audit plan

according to risk level

Performs Compliance test,

Substantive test, and

Develops Audit plan according to

risk level,

185

Page 186: New Ict Curriculum (All Levels)

Gathers and assess Evidence,

Produces report,

Presents report to Communicate

results.

6.1.3 Audit assignments are

correctly performed

Produces detailed audit plan Produces detailed audit

plan, and prepares

Preliminary review of the

audit area/subject

Produces detailed audit plan, and

prepares preliminary review of

the audit area/subject,

Evaluates the audit area/subject,

Reports (communicating results).

6.2.1 Information Technology

Governance is correctly

assessed

Explains existing standards

for effective Information

Technology Governance,

Evaluates sufficiency of

Information systems policy

and Procedures

Explains existing

standards for effective

Information Technology

Governance,

Evaluates sufficiency of

Information systems

policy and Procedures,

Evaluates adherence of

the procedures to the to

regulatory standards

Explains existing standards for

effective Information Technology

Governance,

Evaluates sufficiency of

Information systems policy and

Procedures,

Evaluates adherence of the

procedures to the to regulatory

standards,

186

Page 187: New Ict Curriculum (All Levels)

Assesse effectiveness of available

resources to satisfy required

obligations.

6.2.2 Adherence of Information

Systems development life

cycle management is

correctly assessed.

Evaluates procedures for

Information Systems Life

Cycle Management,

Explains procedures for

Evaluates procedures for

Information Systems Life

Cycle Management,

Explains procedures for

system development,

Explains procedures for

systems testing

Evaluates procedures for

Information Systems Life Cycle

Management,

Explains procedures for system

development, procedures for

systems testing,

Evaluates sufficiency of real life

test to the standard test

procedure

6.2.3 Business continuity

management tests are

properly conducted.

Explains components of

business continuity plan,

Develops a business

continuity plan

Explains components of

business continuity plan,

Develops a business

continuity plan,

Explains decision criteria

of levels of risk for

business continuity.

Explains components of business

continuity plan,

Develops a business continuity

plan,

Explains decision criteria of levels

of risk for business continuity,

Tests business continuity plan

187

Page 188: New Ict Curriculum (All Levels)

6.2.4 Disaster recovery planning

is correctly performed

Explains components of

Disaster recovery plan

Explains components of

Disaster recovery plan,

Evaluates roles of key

players of disaster

recovery plan

Explains components of Disaster

recovery plan,

Evaluates roles of key players of

disaster recovery plan,

Explains recovery strategy, and

Tests practical disaster recovery

plan

6.3.1 Security of information

assets is correctly

assessed

Explains concepts of

Confidentiality, Integrity, and

Availability

Explains concepts of

Confidentiality, Integrity,

and Availability

Assesses different

categories of physical

and logical access

controls.

Explains concepts of

Confidentiality, Integrity, and

Availability

Assesses different categories of

physical and logical access

controls.

Explains Public Key

Infrastructures and applicability

to information assets protection

6.3.2 Security procedures and

components are correctly

Develops procedures for

classifying information

Develops procedures for

classifying information

Develops procedures for

188

Page 189: New Ict Curriculum (All Levels)

tested. assets assets,

Tests controls to

evaluate sufficiency of

security of

classifying information assets

Tests controls to evaluate

sufficiency of security of

6.4.1 Objectives of

entrepreneurship are

properly described

Explains background to

entrepreneurship

Defines

entrepreneurship

Explain

background to

entrepreneurship,

and define

entrepreneurship

Explain background to

entrepreneurship, and

define entrepreneurship by

providing relevant

examples

6.4.2 Entrepreneurship in

business organization is

properly analyzed

Lists categories of

businesses

Lists categories of

businesses, and

mentions

characteristics of

entrepreneurship

with examples

Lists categories of

businesses, and mentions

characteristics of

entrepreneurship with

correct examples according

to the context

6.4.3 The importance of

information system in

entrepreneurship is

properly discussed

Define information

system

Define information

system, and

assess relationship

between

information

systems and the

Define information system

by providing examples of

different information

systems, and assess

relationship between

information systems and 189

Page 190: New Ict Curriculum (All Levels)

activities of the

business

the activities of the

business

6.4.4 The role of

entrepreneurship concepts

in developing business is

properly discussed

Describes

entrepreneurship

concepts.

Describes

entrepreneurship

concepts, and

discusses different

types of

businesses.

Describes entrepreneurship

concepts, discusses

different types of

businesses, and identifies

sources of business finance

190

Page 191: New Ict Curriculum (All Levels)

NTA LEVEL 6

12.0 MODULES DESCRIPTION

ODIT 611: COMPUTER ARCHITECTURE NAME: COMPUTER ARCHITECTURE

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

5.1.1 Identify the role of CPU

5.1.2 Describe the component parts of CPU

5.1.3 Describe purpose of instruction pointer

5.1.4 Describe steps in processing an instruction

5.2.1 Describe the purpose of memory cell

5.2.2 Identify the use of RAM and ROM

191

Page 192: New Ict Curriculum (All Levels)

5.2.3 Identify different types of ROM

5.2.4 Describe storage capacities(bit, byte, word, KB,MB,GB,TB)

5.2.5 Identify internal and external buses

5.3.1 Identify different Character recognition devices

5.3.2 Identify the role of barcodes

5.3.3 Identify different types Tapes

5.3.4 Identify different magnetic disks

5.3.5 Describe hard disk performance

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc

METHODS OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Abd-El-Barr M., El-Rewin M, (2008), Fundamentals of Computer Organization and Architecture, Addison Wesley, McGraw-Hill Co, USA

2. Carter N. P., (2008), Schaum’s Outline of Computer architecture, 5th Edition, Prentice Hall, India3. Harris D. M., Harris S. L, (2007), Digital Design and Computer Architecture, 5th edition, Addison

Wesley, McGraw-Hill Co, USA.4. Hennesy J. L, et al, (2007), Computer Architecture- A Quantitative Approach, 4th Edition, McGraw-Hill,

USA

192

Page 193: New Ict Curriculum (All Levels)

5. Gragon H. C, (2007), Computer Architecture and Implementation, 4th edition, Prentice-Hall USA

INTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semester Examination – 60%

ODIT 612: PROGRAMMING IN C++NAME: PROGRAMMING IN C++

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

1.1.2 Describe Structure of a program

1.1.2 Declare Variables and Data types.

1.1.3 Use Constants

1.1.4 Assign Operators

1.1.5 declare Basic Input/ Output1.2.1 Use Control Structures in a program

1.2.2 Declare Functions

1.4.1 Declare Classes 1.4.2 Declare Friendship and inheritance1.4.3 apply Polymorphism1.4.4 apply message passing

TEACHING AIDS:

193

Page 194: New Ict Curriculum (All Levels)

Chalk boards, white board marker, power point, flip charts stand, pictures etc

METHODS OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Dale N. B., Weems C., (2004), Programming in C++, 4th Edition, Addison-Wesley Publishing Co. USA2. Deitel P., Deitel H. M, (2009), C++ How to Program, 7th Edition, Pearson Publishing Co. UK 3. Duffy D. J., (2006), Introduction to C++ for Financial Engineers, 4th Edition, Pearson Publishing Co. UK 4. Joyce F., (2008), Object Oriented Programming Using C++, 6th Edition, Addison Wesley Longman,

USA.5. Mike M., (2006), C++ Programming in Easy steps, 5th edition, Addison Wesley Longman, USA.

INTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semester Examination – 60%

194

Page 195: New Ict Curriculum (All Levels)

ODIT 613: BUSINESS INFORMATION SYSTEMSNAME: BUSINESS INFORMATION SYSTEMS

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

3.1.1 Discuss the relationship between the business organization, processes and functions and the associated supporting

management information systems.

3.1.2 Explain appropriate management information systems for the

range of business functions and organizational levels.

3.2.1 Explain how new technology is impacting on business processes

and associated management information systems.

3.3.1 Discuss the managerial decision making process in business.

3.3.2 Explain the relationship between decision making and management information systems at different

levels of the organization.

195

Page 196: New Ict Curriculum (All Levels)

3.3.3 Evaluate the importance of collaborative decision making environments and review group

management information

systems.

3.3.4 Explain the concepts of knowledge and knowledge management

in the management information systems context.

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc

METHODS OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Abramowic W., Fensel D., (2008), Business Information Systems, 5th Edition, Prentice Hall, Warsaw, Poland

2. Abramowic W., Mayr H. C, (2007), Technologies for Business Information Systems, 5th Edition, , Prentice- Hall, Warsaw, Poland

3. Abramowic W., Flejter D., (2009), Business Information Systems Workshops, 5th edition, Prentice-Hall, Poznan Poland

4. Curtis G., Cobham D., (2008), Business Information Systems: Analysis, Design and Practice, 5th Edition, Addison Wesley, McGraw-Hill Co. USA

5. Elliot G., (2007), Global Business Information Technology, 5th Edition, Addison Wesley, McGraw-Hill Co, USA

INTEGRATED METHOD OF ASSESMENT:

196

Page 197: New Ict Curriculum (All Levels)

Continuous Assessments - 40%

End of Semester Examination – 60%

ODIT 614: ENTREPRENEURSHIPNAME: ENTREPRENEURSHIP

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

6.4.1 Describe objectives of entrepreneurship

6.4.2 Analyze entrepreneurship in business organization

6.4.3 Discuss the importance of information system in entrepreneurship

6.4.4 Discuss the role of entrepreneurship concepts in developing business

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc.

METHODS OF INSTRUCTION:

197

Page 198: New Ict Curriculum (All Levels)

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Carson M, Buckley P. J. (2010), Entrepreneurship: Theory, Networks, History, 2nd Edition, Prentice-Hall, Poznan Poland.

2. Davidson P., (2005), Researching Entrepreneurship, 5th Edition, Addison Wesley, McGraw-Hill Co, USA3. Drucker P. F., (2009), Innovation and Entrepreneurship, 3rd Edition, Addison Wesley McGraw-Hill Co,

USA4. Kuratko D. F., Hodgetts R. M., (2008), Entrepreneurship: Theory, Process, and Practice, 4th Edition,

Prentice- Hall, Delhi.5. Wickham P. A., (2007), Strategic Entrepreneurship, Prentice-Hall, UK.

INTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semester Examination – 60%

198

Page 199: New Ict Curriculum (All Levels)

ODIT 621: INFORMATION SYSTEM ASSURANCENAME: INFORMATION SYSTEMS ASSURANCE

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

6.1.1Perform Information Systems audit according to required procedures

6.1.2 Perform information systems Risk Assessment

Arrange sequence of functions

6.1.3 perform audit assignment

6.2.1Assess Information Technology Governance

6.2.2 Assess adherence of Information Systems development life cycle management

6.2.3 Perform Tests to check Business continuity Management

6.2.4 Perform test to check effectiveness of Disaster recovery planning

199

Page 200: New Ict Curriculum (All Levels)

6.3.1 Assess Security of Information assets

6.3.2 Test Security procedures and components

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc

METHOD OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Andrew B., Kovacich G. L, (2006), Information Assurance: Security in the Information Environment, 6th Edition, Prentice Hall, Warsaw.

2. Dube D. P., Gulati V. P., (2005), Information Systems audit and Assurance, 5th Edition, Prentice Hall, New Delhi India.

3. Gelinas U. J., Dull R. B., (2009), Accounting Information Systems, 5th Edition, Addison Wesley Co., USA.

4. Qian Y., Tipper D., Krishnamurthy P., (2008), Information Assurance: Dependability and security in Networked Systems, 6th Edition, Prentice Hall, India.

5. Warketin M., Vaughn R., (2006), Enterprise Information Systems Assurance and System Security, 7th Edition, Addison Wesley, USA

INTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semister Examination – 60%

200

Page 201: New Ict Curriculum (All Levels)

ODIT 622: DATABASE DRIVEN WEBSITE DESIGNNAME: DATABASE DRIVEN WEBSITE DESIGN

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

2.1.1 download Apache, PHP, Mysql or Wamp/ Xamp

2.1.2 install download Apache,PHP, Mysql or Wamp / Xamp

2.1.3 use the server

2.2.1 reading and writing files

2.2.2 API file manipulation

2.2.3 Uploading and exit file

2.3.1 use PHP syntax

2.3.2 declare variables

201

Page 202: New Ict Curriculum (All Levels)

2.3.3 declare arrays

2.3.4 declare functions

2.3.5 declare classes and objects

2.3.6 declare string operations

2.4.1 declare site’s structure

2.4.2 prepare graphic resources

2.4.3 design templates, upload templates and resources

2.4.5 create all modules and add to templates

2.4.6 create pages and forms

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc

METHODS OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Dunlap I. H, (2006), Open Source Database Driven Web Development, 5th edition, Kauffmann, USA2. Norman M., (2007), Database Design Using MySQL for Windows, 6th edition, Prentice-Hall, California,

USA3. Oxer J., (2007), How to Build a Website and Stay Sane, 4th Edition, Prentice-Hall, USA

202

Page 203: New Ict Curriculum (All Levels)

4. Reynolds J., (2007), The Complete E-Commerce Book: Design, Build & Maintain, 6th Edition, Prentice-Hall, USA

5. Yank K., (2008), Build Your Own Database Driven Website Using PHP & MySQL, 5th Edition, Addison Wesley, USA

INTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semester Examination – 60%

ODIT 623: FUNDAMENTALS OF NETWORK ADMINSTRATION

NAME: FUNDAMENTALS OF NETWORK ADMINISTRATION

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

4.1.1 configure Network Adapter, Modem

4.1.3 set Repeater and Bridge

4.1.4 set Hub and Switch

4.1.5 connect Wireless Access Point

4.1.6 configure Router

4.2.1 configure ARP

203

Page 204: New Ict Curriculum (All Levels)

4.2.2 configure ICMP

4.2.3 configure BOOTP

4.2.4 configure DHCP

4.2.5 configure DNS

4.2.6 configure LDAP

4.3.1 Troubleshoot problems with computer systems

4.3.2 assist users to resolve problems with equipment and data

4.3.3 plan, design, acquire new or upgraded hardware and software

4.3.4 Install LAN/WAN (Cabling, Modifying, Testing), Maintaining Computer

4.3.5 Apply ISO management model

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc

METHODS OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Limoncelli T. A., et al, (2007), 8th Edition, McGraw-Hill, USA2. Maiwald E, (2006), Fundamentals of Network Security, 4th Edition, Addison Wesley Co., USA

204

Page 205: New Ict Curriculum (All Levels)

3. Skandier T., (2009), Network Administrator Street Smart: A Real World Guide to CompTIA, 6th Edition, Prentice-Hall, USA.

4. Stein L. D., (2001), Network Programming with Perl, 5th edition, Pearson Publishing Co. Ltd, UK5. Suehring S., et al, (2007), Wiley Pathways Windows Network Administration, 5th edition, Pearson

Publishing Co. Ltd, UKINTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semester Examination – 60%

ODIT 624: PROJECT DEVELOPMENT

NAME: PROJECT DEVELOPMENT

NO. OF CREDITS: 15

SUB-ENABLING OUTCOMES:

3.4.1 Explain the key requirement of competitive advantage that drives the need for management

information systems and its manifestation through processes such as Supply Chain Management

(SCM), Enterprise Resource Planning (ERP), organizational redesign and change.

3.5.1 Discuss the risk, security and control issues associated with managing

Information systems projects.

3.6.1 Review the range of professional issues, which are associated

with managing business project activities and management information systems.

205

Page 206: New Ict Curriculum (All Levels)

TEACHING AIDS:

Chalk boards, white board marker, power point, flip charts stand, pictures etc.

METHODS OF INSTRUCTION:

This module will be conducted through lecturers, demonstrations, role-plays and discussions

REFERENCES

1. Cleland D. I., Ireland L. R., (2006), Project Management: Strategic Design and implementation, 5th Edition, Pearson Publishing Co., UK.

2. Haynes M. E., (2006), Project Management: Practical Tools for Success, 5th edition, McGraw-Hill, USA3. Heerkens G. R., (2007), Project Management: 24 Steps Help You Master any Project, 4th Edition,

Pearson Publishing Co., UK.4. Kerzner H., (2009), Project Management: A Systems Approach to Planning, Scheduling, 10th edition,

McGraw-Hill, New Jersey, USA5. Lewis J. P., (2007), Fundamentals of Project Management, 3rd Edition, Prentice-Hall, California, USA

INTEGRATED METHOD OF ASSESMENT:

Continuous Assessments - 40%

End of Semester Examination – 60%

206

Page 207: New Ict Curriculum (All Levels)

1.0 BACKGROUND INFORMATIONThe philosophy behind the development of competence modular curricula is to comply with the Nation’s Vision and Mission, which require that the Nation is technologically strong. The programme is, therefore geared towards producing innovative, creative, and flexible work force that will be responsive to the social needs.

Traditionally, education has to contend with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems.

The foregoing are the problems that the College of Business Education wants to solve with a reviewed curriculum for its management programmes. In the revised curriculum students will learn to apply knowledge and skills.

The new approach is known as Competence Based Education and Training (CBET). This approach is based on the philosophy that “given appropriate instructions, time and conditions, almost all learners can and will learn most of what they are supposed to learn”. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g. create a document, enter data in a document, save a document and print a document). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 7 for the INFORAMTION AND COMMUNCITION TECHNOLOGY specialization.

207

Page 208: New Ict Curriculum (All Levels)

The qualification comprises of a number of modules, each module being covered in one semester. For this course, there are 15 weeks per semester allocated for classes and 2 weeks assigned for examinations and breaks. A total of 17 weeks per semester are allocated for this qualification and this accounts for 34 weeks for a year or 68 weeks for the whole qualification of 2 years (4 semesters)

This level has a minimum number of 240 credits as prescribed by NACTE.

208

Page 209: New Ict Curriculum (All Levels)

2.0 MODULE CODING

The coding of modules follows logical sequence as in the following example for HDIT 711.

HDIT = Stands for Higher Diploma in Technology

7 = The first digit stands for the NTA level, in this case Higher Diploma which is level Seven.

1 = The second digit stands for semester, i.e. for semester one

1 = the last digit stands for the order of the module in the semester. Modules are arranged serially the highest number, depending upon the number for modules in the semester.

209

Page 210: New Ict Curriculum (All Levels)

3.0 GRADING OF ASSESSMENT RESULTSThe grading of assessment results is in conformity with the NACTE grading system as follows.

NTA Level 7

Grade Definition Score

A Excellence 75-100

B+ Very Good 65-74

B Good 55-64

C Average 40-54

F Failure 0-39

I Incomplete

210

Page 211: New Ict Curriculum (All Levels)

4.0 AWARDSThe award shall be made to students who satisfy the following conditions.

(a) Have completed modules for the award.(b) Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass.(c) GPA shall be computed from cumulative scores earned by students using NACTE guideline

5.0 AWARDS CLASSFICATION

Awards Classification for NTA Level 7

Class of Award Cumulative GPA

First Class 4.4 to 5.0

Upper Second 3.5 to 4.3

Lower Second Class 2.7 to 3.4

Pass 2.0 to 2.6

211

Page 212: New Ict Curriculum (All Levels)

6.0 SUMMARY FRAMEWORKQUALIFICATION HIGHER DIPLOMA IN INFORMATION AND COMMUNICATION TECHNOLOGY

PURPOSE OF QUALIFICATION

This qualification is intended for persons who will configure and manage operating systems,

prepare graphical user interfaces and animations, apply knowledge, skills and principles of

accounting and JAVA to prepare and manage office automation packages, including accounting

packages, apply principles of computer network and other computing techniques to manage

organization systems and recommend appropriate measures for management decisions.

NTA LEVEL 7

COMPETENCE LEVEL DESCRIPTOR

The holder of this qualification will apply knowledge, skills and principles in a broad range of complex technical ICT activities of developing and managing operating systems, graphical interfaces, animations and office automation packages with higher degree of personal responsibility and some responsibility for the work of others.

CREDITS AT THIS LEVEL

240

CUMULATIVE CREDITS AT THIS LEVEL 360

MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL

30

DATE NEW

212

Page 213: New Ict Curriculum (All Levels)

QUALIFICATION STANDARD LAST RVIEWED

ENTRANCE REQUIREMENTS

ODIT Level 6 or Form Six with 2 Principal level Passes, with total points of not less than 4.5; one of them should be either Physics or Advanced Mathematics.

7.0 PRINCIPAL LERNING OUTCOMES, CREDIT VALUES AND ASSESSMENT CRITERIAS/NO PRINCIPAL LEARNING OUTCOME CREDIT VALUE ASSESSMENT CRITERIA

1 Configure and manage Operating System 15 1.1 Operating Systems are properly configured and managed.

2 Manage business environment performance and social well being by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication.

60 2.1Computer graphics techniques to manage business performance are properly applied

2.2Entrepreneurship skills to manage business performance are properly applied.

2.3Knowledge and skills of development studies are properly applied in business environment.

2.4Business Communication skills are properly applied for effective and efficient communication.

3 Apply Artificial Intelligence, Discrete Mathematics, Research methods and Quantitative techniques in managing

60 3.1 Artificial Intelligence skills in managing businesses are properly applied.

3.2 Discrete Mathematics and statistics knowledge is properly applied to

213

Page 214: New Ict Curriculum (All Levels)

businesses. manage businesses.

3.3 Research methods skills and techniques are properly applied.

3.4 Quantitative techniques to solve business problems are properly applied.

4 Apply Java skills and knowledge of accounting in developing and managing different application programs

45 4.1 Java skills and knowledge to develop and manage application programs are properly applied.

4.2 Principles of accounting skills to manage application program are properly applied.

4.3 Knowledge and skills of computer applications are applied to manage accounting packages

5 Manage the organization information systems

by applying skills and knowledge of computer

network and multimedia.

30 5.1 Knowledge and skills of computer network are properly applied to manage organization information systems.

5.2 Knowledge and skills of multimedia are properly applied to manage organization information systems.

6 Apply technologies of mobile computing and

explain the potential, importance and ways of

30 6.1 Knowledge and skills of mobile computing are clearly explained and properly applied to improve business

214

Page 215: New Ict Curriculum (All Levels)

utilizing them in ICT projects and working

environment.

performance.

6.2 Knowledge and skills of ICT Project management are properly applied to improve business performance.

TOTAL CREDITS FOR NTA LEVEL 7 240

8.0 PROGRAM STRUCTURE

215

Page 216: New Ict Curriculum (All Levels)

SEMESTER I

S/NO CODE NAME OF MODULE CREDIT

1 HDIT 711 Discrete Mathematics and Statistics 15

2 HDIT 712 Business Communication 15

3 HDIT 713 Computer Graphics Designing 15

4 HDIT 714 Operating Systems Configuration 15

TOTAL CREDITS FOR SEMESTER I 60

SEMESTER II

S/NO CODE NAME OF MODULE CREDIT

1 HDIT 721 Development Studies 15

2 HDIT 722 Principles of Accounting 15

3 HDIT 723 Artificial Intelligence Applications 15

4 HDIT 724 Quantitative Techniques 15

5 HDIT 725 Field Attachment

TOTAL CREDITS FOR SEMESTER I 60

SEMESTER III

S/NO CODE NAME OF MODULE CREDIT216

Page 217: New Ict Curriculum (All Levels)

1 HDIT 731 Multimedia Systems Design 15

2 HDIT 732 Programming with Java 15

3 HDIT 733 Research Methodology 15

4 HDIT 734 Computerized accounting 15

TOTAL CREDITS FOR SEMESTER III 60

SEMESTER IV

S/NO CODE NAME OF MODULE CREDIT

1 HDIT 741 Networking Management 15

2 HDIT 742 Entrepreneurship Development 15

3 HDIT 743 Mobile Computing 15

4 HDIT 744 Project Management 15

TOTAL CREDITS FOR SEMESTER IV 60

GRAND TOTAL CREDITS FOR NTA LEVEL 7 240

9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES

PRINCIPAL OUTCOMES ENABLING OUTCOMES (As Identified and SUB-ENABLING OUTCOMES

217

Page 218: New Ict Curriculum (All Levels)

(NACTE Standards) Formulated by Curriculum Developers)

1. Configure and manage Operating Systems.

1.1 Configure Operating Systems 1.1.1Install Operating Systems

1.1.2 Create users of operating systems with their rights.

1.2 Manage Operating System 1.2.1 Administer users of operating system

1.2.2 Secure Operating Systems components

1.2.3 Assess systems performance and diagnose faults

2. Manage business environment performance and social wellbeing by applying skills, knowledge of computer graphics, entrepreneurship, development studies and business communication.

2.1 Design graphical user interfaces and animations

2.1.1 Design graphics in media such as print digital or motion pictures.

2.1.2 Decorate products

2.1.3 Assemble images, motions and graphics.

2.2 Communicate effectively in business environment and apply skills of development studies.

2.2.1 Apply writing and presentation skills for effective communication

2.2.2 Make effective presentations in international business environment

2.2.3 Interrelate different development

218

Page 219: New Ict Curriculum (All Levels)

studies concepts to manage business

2.2.4 Apply techniques to manage different social development challenges

2.3 Develop entrepreneurship venture and manage them for business growth

2.3.1 Prepare business plans

2.3.2 Apply marketing skills to market products for opportunities identified.

2.3.3 Apply skills for overcoming business challenges.

3. Apply Artificial Intelligence, Discrete Mathematics, Research methods and Quantitative techniques in managing businesses.

3.1 Apply intelligent algorithms, artificial intelligence and software tools to solve business problems

3.1.1 Interrelate Intelligent Algorithms tools to business problems.

3.1.2 Apply methods for encoding knowledge in computer systems

3.2 Apply quantitative techniques calculations of real business transactions.

3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems.

3.2.2 Design quantitative models of estimation and forecasting for decision making.

3.3 Apply discrete Mathematical and Statistical techniques in computing operations.

3.3.1 Apply information technology in mathematical contexts

3.3.2 Explain the logical and systematic approach to solving problems in particular simple combinatorial

219

Page 220: New Ict Curriculum (All Levels)

problems.

3.4 Apply Research Methodology for writing the field attachment report.

3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations.

3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.

4. Apply Java skills and

knowledge of accounting in developing and managing different application programs.

4.1 Prepare application programs using Object oriented tools

4.1.1 Analyze user requirements for program development.

4.1.2 Apply skills and knowledge of designing and building application programs.

4.1.3 Test and Implement application programs

4.2Apply Principles of accounting to manage business finance

4.2.1 Prepare financial statements for business

4.2.2 Identify and describe legal aspects of company formation, shares and bonus.

4.3 Manage accounting application programs 4.3.1Monitor and evaluate designed application programs.

4.3.2 Maintain application Programs.

220

Page 221: New Ict Curriculum (All Levels)

5. Manage the organization information systems by applying skills and knowledge of computer network and multimedia.

5.1Configure the organization system

5.1.1 Design the network system for the organization.

5.1.2 Install, test and implement the computer network system

5.2Manage the organization information system

5.2.1 Deploy security mechanism5.2.2 Troubleshoot the network systems5.2.3 Evaluate and Maintain network

systems.

5.3Apply multimedia tools and techniques to develop, present and solve business problems.

5.3.1 Design appropriate multimedia systems to solve specific business problems.

5.3.2 Evaluate business problems to be solved by multimedia tools.

6. Apply technologies of mobile computing and explain the potential, importance and ways of utilizing them in ICT and projects and working environment.

6.1 Formulate requirements for a mobile computing application in a chosen

Specialized business case.

6.1.1 Design wireless systems for solving business problems.

6.1.2 Apply Wireless transmission in solving business problems.

6.1.3 Evaluate wireless transmission systems

6.2 Apply Information Communication Technology concepts to business projects in order to improve business performance

6.2.1 Assess business performance requiring ICT enhancement

6.2.2 Implement ICT concepts in solving business problems.

6.3 Apply Information Communication Technology concepts to support business at place of work.

6.3.1 Apply ICT skills to support organization applications and infrastructure.

221

Page 222: New Ict Curriculum (All Levels)

6.3.2 Maintain and evaluate system optimum performance

222

Page 223: New Ict Curriculum (All Levels)

10.0 ASSESSMENT CRITERIA AND ASSESSMENT INSTRUMENTSUB-ENABLING OUTCOMES

RELATED TASK ASSESSMENT CRITERIA

ASSESSMENT METHODS

ASSESSMENT INSTRUMENTS

1.1.1 Install Operating Systems

Set boot sequence Partition hard disk Format hard disk

Operating systems are properly installed.

Observe procedure

Practical test,

Systems logs

1.1.2 Create users of operating systems with their rights

Create a user to a specific group

Set initial password to be changed

Configure user right Test user credentials

Users of operating systems with their rights are properly created.

Login to the created account

Systems log

1.2.1 Administer users of operating systems.

Set permissions for files and application

Set login schedule Set network access

Users of operating systems are appropriately administered.

Test user privileges

Practical test

1.2.2 Secure Operating Systems components

Explain procedures for turning on firewall

Install anti-virus Authenticate users. Enforce sharing. Setup communication

security

Components of operating system are properly secured.

Login to the firewall.

Observe installed antivirus

System Logs report

1.2.3 Assess system performance and diagnose faults

Diagnose software and hardware errors.

Troubleshoot errors Report fault rectification

systematically

System performance is properly assessed and correctly diagnosed.

Problem solved Practical test

2.1.1 Design graphics Perform needs analysis Graphics in media Group Presentation,

223

Page 224: New Ict Curriculum (All Levels)

in media such as print, digital or motion pictures.

Prepare design plan. Develop the design.

such as print digital or motion pictures are properly designed.

assignment, test class test

2.1.2 Decorate products

Design colors, sounds and photo

Set appropriate styles Test the objects (color,

sound and photo)

Products are clearly decorated.

Group assignment, test

Presentation, class test

2.1.3 Assemble images, motions and graphics.

Assemble images Assemble sound and

motion pictures Integrate assembled

objects

Images, motion and graphics are properly assembled.

Group assignment

Practical test

2.2.1 Apply writing and presentation skills for effective communication.

Explain techniques for effective communication

Write a report. Make presentation in

group work.

Writing and presentation skills are properly applied for effective communication.

Group presentation

Report and tools used in Presentation

2.2.2 Make effective presentations in international business environment.

Apply tools for effective communication in International business environment

Make presentation for a real business case

Effective presentations in international business environment are properly made.

Group presentation

Report and tools used in Presentation

2.2.3 Apply techniques to manage different social

Apply tools to enhance good governance

Relate gender issues with

Techniques are properly applied to manage different

Group presentation

Report and Questions from

224

Page 225: New Ict Curriculum (All Levels)

development challenges

social development Explain development

challenges and opportunities in regional integration and trade

social development challenges.

and discussion audience

2.3.1 Prepare business plans

Initiate Entrepreneurial venture

Prepare feasible business plan

Monitor and Evaluate venture initiated

Business plans are properly prepared.

Individual/ group assignment

Report submission

2.3.2 Apply marketing skills to market products for opportunities identified.

Identify market opportunities

Explain key factors for business venture development

Give examples of creativity and innovation for product development

Marketing skills are properly applied to market products for opportunities identified.

Practical case identification

Report submission and case presentation

2.3.3 Skills are applied for overcoming business challenges

Explain sources of financing entrepreneurial venture

Explain contemporary entrepreneurship issues

Apply business networking skills to overcome business challenges

Skills for overcoming business challenges are properly applied

Case Study Report submission and case presentation

3.1.1 Interrelate Intelligent Algorithms tools to business problems.

Apply intelligent algorithms in problem solving.

Discuss strengths and limitations of various artificial intelligence and machine learning

Intelligent algorithms tools are properly interrelated to business

Real business practical case

Report submission

225

Page 226: New Ict Curriculum (All Levels)

techniques Implement Artificial

Intelligent and machine learning algorithms to solve real problems

problems.

3.1.2 Apply methods for encoding knowledge in computer systems

Distinguish between a conventional system and intelligent system

Explain Artificial Intelligence concept and its applications

Apply Artificial Intelligent techniques in solving problems of a particular domain.

Methods are properly applied for encoding knowledge in computer systems.

System coding case study

Working system design

3.2.1 Apply different Decision models and Quantitative methods in analysing and solving business problems.

Apply transportation model to solve business problems

Apply network analysis and project scheduling for resource allocation

Apply basic inventory techniques for decision making

Different decision models and quantitative methods are properly applied in analysing and solving business problems.

Case study, individual and group assignments

Report submission

3.2.2 Design quantitative models of estimation and forecasting for decision making.

Formulate Linear programming model

Apply linear programming models to solve complex business cases.

Analyze quantitative models of estimation for decision making.

Quantitative models of estimation and forecasting are properly designed for decision

Business case study

Report submission

226

Page 227: New Ict Curriculum (All Levels)

making.

3.3.1 Apply information

technology in

mathematical

context

Practise basic concepts of mathematical proof.

Solve complex ideas and relate them

Apply methods to solve a given task

Information technology is properly applied in mathematical context.

Exercises, assignments

Questions and model answers

3.3.2 Explain the logical

and systematic

approach to

solving problems

in particular

simple

combinatorial

problems.

Implement selected Artificial Intelligence and machine learning algorithms to solve real world problems

Apply different decision models and quantitative methods in analyzing and solving business problems.

Apply sensitivity analysis techniques to solve business challenges

The logical and

systematic

approach is clearly

explained in

solving problems

in particular simple

combinatorial

problems.

.

Exercises, assignments, examinations

Questions and model answers

3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in

Explain a research process

Design research with tested hypothesis using real business case

Develop research instruments for data collection.

Test research instruments

Different research methodologies, tools and techniques are properly applied in exercising critical judgment in the resolution of

Individual and group assignment

Report submission

227

Page 228: New Ict Curriculum (All Levels)

the resolution of complex problematic situations.

complex problematic situations.

3.4.2 Apply research methods and techniques in reporting and presenting the required results in agreed format.

Develop research problem and research design

Write research proposal Explain research analysis

techniques Produce research report

Research methods and techniques are properly applied in reporting and presenting the required results in agreed format.

Individual and group assignment

Report submission

4.1.1 Analyze user requirements for program development

Examine user objectives Identify user resources Identify user contents

Users’ requirements are clearly analyzed for program development.

Case study, assignment

Report and presentation

4.1.2 Apply skills and knowledge of designing and building application program

Prepare a programming environment

Plan for application program

Design an application program

Write a program(coding)

Skills and knowledge of designing and building application programs are properly applied

Case study, assignment

Report and presentation

4.1.3 Test and implement application programs

Install designed program Login data to test its

effectives Execute (compile)

Application programs are properly tested and implemented.

System coding Working system presentation

228

Page 229: New Ict Curriculum (All Levels)

program

4.2.1 Monitor and evaluate designed application program

Check for routine errors Document the errors Examine program

performance

Designed application programs are properly monitored and evaluated.

Individual case study

Case study presentation

4.2.2 Maintain application Programs.

Check required update Perform necessary

updates Report changes

performed accordingly

Application programs are properly maintained.

Guided simulation

Practical presentation

5.1.1 Design computer

network system

for an

organization.

Explain technical issues associated with virtual, switching tools for LAN and WAN internetworking.

Explain cost, merits and demerits of wide area and local area network.

Explain the role of different Layers of OSI Network model

Apply design technologies concepts to develop computer network system

Computer network system for an organization is properly designed.

Practical case Working system report submission and presentation

5.1.2 Install, test and implement computer network system

Apply hardware network connectivity system to implementation

Explain and apply software tools to

Computer network system is properly installed, tested and implemented

Practical case Working system presentation

229

Page 230: New Ict Curriculum (All Levels)

implement network system Apply tools to test

implemented network system

5.2.1 Establish security mechanism

Explain issues related to threats and vulnerabilities to computer networks

Explain the mechanism of setting and using Intrusion Detection System,firewall,data encryption algorithms, Kerberos key exchange to ensure maximum network security

Apply security mechanism and techniques to control and manage the network system security

Security mechanism is properly established.

Practical case Case presentation

5.2.2 Troubleshoot the network systems

Identify the problem by checking the settings and options.

Describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing.

Select and use diagnostic tools and equipment to identify and analyze network malfunctions

The network systems are correctly troubleshot

Practical case Presentation

Report

230

Page 231: New Ict Curriculum (All Levels)

Apply software and hardware tools to recover the problem

5.2.3 Evaluate and Maintain network systems.

Analyze current system and organization requirements to identify system upgrade requirements

Perform upgrade installation, test effectiveness and functionality of upgrade, and document results

Evaluate system performance and produce performance report

Network systems are properly evaluated and maintained

Simulation case Report submission

5.3.1 Design appropriate multimedia systems to solve specific business problem.

Describe basic concepts and domains in Multimedia

Explain the techniques used to create and combine different media types.

Implement design theories by building interactive web–based multimedia product.

Appropriate multimedia systems are properly designed to solve specific business problems.

Simulation case Report submission

5.3.2 Evaluate Assess practicability of Business problems Case study/ Report

231

Page 232: New Ict Curriculum (All Levels)

business problems to be solved by multimedia tools.

multimedia applications using contemporary hardware and software.

Assess impact of multimedia applications to enhance business process performance.

Assess implementation issues surrounding key facets of multimedia design, including interface design.

are appropriately evaluated by multimedia tools.

simulation submission

6.1.1 Design wireless systems for solving business problems.

Identify user requirements for the system development

Examine the resources for the design

Implement program for business resolution

Wireless systems are properly designed to solve business problems.

Practical case Report submission

6.1.2 Apply wireless transmission technologies in solving business problems.

Explain business processes as related to mobile computing

Explain the concept of wireless communication to support connectivity to mobile networks and wireless internet.

Apply the principles of transaction and e-commerce over wireless devices to support e-business

Wireless transmission is properly applied in solving business problems.

Practical case Report submission

6.1.3 Evaluate wireless Assess systems integrity Wireless Simulation/ case Report

232

Page 233: New Ict Curriculum (All Levels)

transmission systems

Monitor system log files Evaluate systems

availability

transmission systems are correctly evaluated

study

6.2.1 Assess performance of mobile systems developed

Integrate all required resources

Improve resource accessibility time

Report system performance

Performance of Mobile systems developed is properly assessed.

Simulation/ case study

Report

6.2.2 Assess business

performance after

mobile computing

implementation

Check business growth Check cost improvement

after implementation Check level of business

competitiveness in the global market

Business performance after mobile computing implementation is properly assessed.

Simulation Report submission

11.0 BENCHMARKING OF ASSESSMENT CRITERIAASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT

1.1.1 Operating systems properly installed.

Sets boot sequence Sets boot sequence and partition hard disk

Sets boot sequence, partitions hard disk and formats appropriately and install

233

Page 234: New Ict Curriculum (All Levels)

operating system

1.1.2 Users with their rights are properly created.

Creates a user to a specific group

Creates a user to a specific group and sets password features

Creates a user to a specific group, sets password features, configure user right and tests user credentials.

1.2.1 Uses of operating system are appropriately administered.

Sets permissions for files and application

Sets permissions for files and application login schedule

Sets permissions for files and application, schedules the logging and sets network access.

1.2.2 Components of operating system are properly secured.

Explains procedures for turning on firewall and install anti-virus

Explain procedures for turning on firewall, install anti-virus, and authenticate of users.

Explains procedures for turning on firewall, installs anti-virus, authenticate of users, enforce sharing and setup communication security.

1.2.3 System performance is properly assessed and correctly diagnosed.

Diagnoses software and hardware errors.

Diagnoses software, hardware errors and troubleshoot errors

Diagnoses software and hardware errors, troubleshoots errors, and reports fault rectification systematically

2.1.1 Graphics in media such as print digital or motion pictures are properly

Does needs analysis Performs needs analysis and prepares design plan.

Performs needs analysis, prepares design plan and develops the design.

234

Page 235: New Ict Curriculum (All Levels)

designed.

2.1.2 Products are clearly decorated.

Designs colors, sounds and photo

Designs colors, sounds and photo and sets appropriate styles

Designs colors, sounds and photo, sets appropriate styles and objects (color, sound & photo)

2.1.3 Images, motion, and graphics are properly assembled.

Assembles images Assembles images, sound and motion pictures

Assembles images, sound and motion pictures and integrates assembled objects

2.2.1 Writing and presentation skills are properly applied for effective communication.

Explains techniques for effective communication

Writes a report and explains techniques for effective communication

Explains techniques for effective communication, writes a report and makes presentation in group work.

2.2.2 Effective presentations in international business environment are

Explains quality features of international business

Explains quality features of international business and develops tools for effective communication in International business

Explains quality features of international business, develops tools for effective communication in International business environment and

235

Page 236: New Ict Curriculum (All Levels)

properly made. environment makes presentation for a real business case

2.2.3 Techniques are properly applied to manage different social development challenges.

Develop tools to enhance good governance

Develops tools to enhance good governance and relates gender issues with social development

Develops tools to enhance good governance, relates gender issues with social development and explains development challenges and opportunities in regional integration and trade

2.3.1 Business plans are properly prepared.

Initiates Entrepreneurial venture

Initiates Entrepreneurial venture and prepares feasible business plan

Initiates Entrepreneurial venture, prepares feasible business plan, monitor and evaluates venture initiated

2.3.2 Marketing skills are properly applied to market products for opportunities identified.

Identifies market opportunities

Identifies market opportunities, and explains key factors for business venture development

Identifies market opportunities, explains key factors for business venture development and gives examples of creativity and innovation for product development

2.3.3 Skills for overcoming business challenges are properly applied

Explains sources of financing entrepreneurial venture

Explains contemporary entrepreneurship issues

and explains sources of financing entrepreneurial venture

Explains sources of financing entrepreneurial venture, explains contemporary entrepreneurship issues and applies business networking skills to overcome business

236

Page 237: New Ict Curriculum (All Levels)

challenges

3.1.1 Intelligent algorithms tools are properly interrelated to business problems.

Explains strengths and limitations of various artificial intelligence and machine learning techniques

Discusses strengths and limitations of various artificial intelligence and machine learning techniques and applies intelligent algorithms in problem solving.

Discusses strengths and limitations of various artificial intelligence and machine learning techniques, applies intelligent algorithms in problem solving and implements Artificial Intelligent and machine learning algorithms to solve real problems

3.1.2 Methods are properly applied for encoding knowledge in computer systems.

Distinguish between a conventional system and intelligent system

Distinguishes between a conventional system and intelligent system, and explains Artificial Intelligence concept and its applications

Distinguishes between a conventional system and intelligent system, explains Artificial Intelligence concept and its applications, and applies Artificial Intelligent techniques in solving problems of a particular domain

3.2.1 Different decision models and quantitative methods are properly applied in

Applies transportation model to solve business problems

Applies transportation model to solve business problems, and applies network analysis and project scheduling for

Applies transportation model to solve business problems, network analysis and project scheduling for resource allocation, and basic inventory

237

Page 238: New Ict Curriculum (All Levels)

analysing and solving business problems.

resource allocation techniques for decision making

3.2.2 Quantitative models of estimation and forecasting are properly designed for decision making.

Formulates Linear programming model

Formulates Linear programming model, and applies linear programming models to solve complex business cases.

Formulates Linear programming model, applies linear programming models to solve complex business cases, and analyzes quantitative models of estimation for decision making.

3.3.1 Information technology is properly applied in mathematical context.

Practices basic concepts of mathematical proof.

Practices basic concepts of mathematical proof, and solve complex ideas and relate them

Practices basic concepts of mathematical proof, solves complex ideas and relate them, and applies methods to solve a given task

3.3.2 The logical and systematic approach is clearly explained in solving problems in particular simple combinatorial problems.

Implements selected Artificial Intelligence and machine learning algorithms to solve real world problems

Implements selected Artificial Intelligence and machine learning algorithms to solve real world problems, and applies different decision models and quantitative methods in analyzing

Implements selected Artificial Intelligence and machine learning algorithms to solve real world problems, applies different decision models and quantitative methods in analyzing and solving business problems, and applies

238

Page 239: New Ict Curriculum (All Levels)

and solving business problems.

sensitivity analysis techniques to solve business challenges

3.4.1 Different research methodologies, tools and techniques are properly applied in exercising critical judgment in the resolution of complex problematic situations.

Explains research process Explains research process, and design research with tested hypothesis using real business case, develops research instruments for data collection.

Explains research process, design research with tested hypothesis using real business case, develops research instruments for data collection, and tests research instrument

3.4.2 Research methods and techniques are properly applied in reporting and presenting the required results in agreed format.

Develops research problem and research design

Develops research problem and research design, and writes research proposal

Develops research problem and research design, write research proposal, explains research analysis techniques, and produces report

4.1.1 Users’ requirements are clearly analyzed for program development.

Examines user objectives Examines user objectives, and identify user resources

Examines user objectives, identifies user resources, and identify user contents

4.1.2 Skills and Prepares a programming Prepares a programming Prepares a programming

239

Page 240: New Ict Curriculum (All Levels)

knowledge of designing and building application programs are properly applied

environment environment, and plans for application program

environment, plans for application program, designs an application program and write a program(coding).

4.1.3 An application program is properly tested and implemented.

Installs designed program Installs designed program, login data to test its effectives

Installs designed program, login data to test its effectives and execute (compile) program

4.2.1 Designed application program is properly monitored and evaluated.

Checks for routine errors Checks for routine errors, and documents the errors

Checks for routine errors, documents the errors, and examines the program performance

4.2.2 Application programs are properly maintained.

Checks required update Checks required update and performs necessary updates

Checks required update, performs necessary updates, and reports changes performed accordingly

5.1.1 Computer network system for an organization is properly designed.

Explains technical issues associated with virtual local area networks, switching and other tools

Explains technical issues associated with virtual local area networks, switching and other tools

Explains technical issues associated with virtual local area networks, switching and other tools of, LAN and WAN

240

Page 241: New Ict Curriculum (All Levels)

of, LAN and WAN internetworking.

of, LAN and WAN internetworking, and explains cost, implementation, benefits and disadvantages of wide area and local area network.

internetworking, explains cost, implementation, benefits and disadvantages of wide area and local area network, explain the role of different Layers of OSI Network model, and applies design technologies concepts to develop computer network system

5.1.2 Computer network system is properly installed, tested and implemented.

Applies hardware network connectivity technologies to implement network system

Applies hardware network connectivity technologies to implement network system, explains and applies software tools to implement network system

Applies hardware network connectivity technologies to implement network system, explains and apply software tools to implement network system, and applies tools to test implemented network system

5.2.1 Security mechanism is properly established

Explains issues related to threats and vulnerabilities to computer networks.

Explains issues related to threats and vulnerabilities to computer networks, and explains the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms,

Explains issues related to threats and vulnerabilities to computer networks, explains the mechanism of setting and using Intrusion Detection System, firewall, data encryption algorithms, Kerberos key exchange to ensure maximum network security

241

Page 242: New Ict Curriculum (All Levels)

Kerberos key exchange to ensure maximum network security.

applies security mechanism and techniques to control and manage the security mechanism.

5.2.2 The network systems are correctly troubleshot

Identifies the problem by checking the settings and options.

Identifies the problem by checking the settings and options, and describes the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing.

Identifies the problem by checking the settings and options, describe the use of network troubleshooting prompt commands, TCP/IP protocols setting, network status and details view on internet connection and sharing, detects and use diagnostic tools and equipment to identify and analyze network malfunctions, and applies software and hardware tools to recover the problem

5.2.3 Network systems are properly Evaluated and Maintained

Analyzes current system and organization requirements to identify system upgrade requirements

Analyzes current system and organization requirements to identify system upgrade requirements, performs upgrade installation, tests effectiveness and functionality of upgrade, and documents results

Analyzes current system and organization requirements to identify system upgrade requirements, perform upgrade installation, tests effectiveness and functionality of upgrade, and document results, and evaluates system performance and produce performance report.

242

Page 243: New Ict Curriculum (All Levels)

5.3.1 Appropriate Multimedia systems are properly designed to solve specific business problems

Describes basic concepts and domains in Multimedia

Describes basic concepts and domains in Multimedia and explain the techniques used to create and combines different media types.

Describes basic concepts and domains in Multimedia, explain the techniques used to create and combines different media types, and implements design theories by building interactive web–based multimedia product.

5.3.2 Business problems are appropriately evaluated to be solved by multimedia tools

Assess practicability of multimedia applications using contemporary hardware and software.

.

Assesses practicability of multimedia applications using contemporary hardware and software, and assess impact of multimedia applications to enhance business process performance.

Assesses practicability of multimedia applications using contemporary hardware and software, asses impact of multimedia applications to enhance business process performance, and assess implementation issues surrounding key facets of multimedia design, including interface design.

6.1.1 Wireless systems are properly designed to solve business problems.

Identifies user requirements for the system development

Identifies user requirements for the system development and Examine the resources for the design.

Identifies user requirements for the system development, examines the resources for the design and implements program for business resolution

6.1.2

Wireless transmission is properly applied in solving business

Explain business processes as related to mobile computing

Explains business processes as related to mobile computing and explains the concept of

Explains business processes as related to mobile computing, explains the concept of wireless communication to

243

Page 244: New Ict Curriculum (All Levels)

problems. wireless communication to support connectivity to mobile networks and wireless internet.

support connectivity to mobile networks and wireless internet and applies the principles of transaction and e-commerce over wireless devices to support e-business

6.1.3 Wireless transmission systems are correctly evaluated

Assesses systems integrity

Assesses systems integrity and monitors system log files.

Assesses systems integrity, monitor system log files and evaluates systems availability

6.2.1 Performance of Mobile systems developed is assessed.

Integrates all required resources

Integrates all required resources and improves resource accessibility time.

Integrates all required resources, improves resource accessibility time and reports system performance

6.2.2 Business performance after mobile computing implementation assessed.

Checks business growth Checks business growth and checks cost improvement after implementation

Checks business growth, checks cost improvement after implementation and checks level of business competitiveness in the global market

12.0 MODULES DESCRIPTION

CODE : HDIT 711

NAME : DISCRETE MATHEMATICS AND STATISTICS

NO OF CREDITS : 15

244

Page 245: New Ict Curriculum (All Levels)

SUB-ENABLING OUTCOMES

3.3.1 Apply information technology in mathematical contexts

3.3.2 Explain the logical and systematic approach to solving problems in particular simple combinatorial problems.TEACHING AIDS:

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures and demonstration

REFERENCES:

1. Gossett,E(2009), Discrete Mathematics with Proof, Second Edition, John Wiley & Sons, United Kingdom2. Gupta, S.C and Kapoor, V.K (2007), Fundamentals of mathematical Statistics, 11th Edition, Sultan Chand and

Sons. India.3. Johnsonbaugh,R (2008) ,Discrete Mathematics, 8th edition, Macmillan- London4. Kenneth,H (2007) ,Discrete Mathematics and its Applications, Sixth Edition, McGraw-Hill,Asia.5. Susanna, S(2011), Discrete Mathematics with Applications, Fourth Edition, Brooks/Cole,Boston.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 712

NAME : BUSINESS COMMUNICATON

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

245

Page 246: New Ict Curriculum (All Levels)

2.2.1 Apply writing and presentation skills for effective communication

2.2.2 Make effective presentations in international business

TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, demonstration and role model

REFERENCES

1. Gilbald.(2006);MLA Handbook for writers of Research Paper Edition, Mod Lang Association of America.2. Guffey, Mary Ellen.(2006);Business Communication Process and Product 5th Edition, South-Western Los Angels.3. Madhukerr RK.(2005);Business Communication and Customer,1st ed., Vikas Publishing house, New Dethi.4. Munter,M.(2006);Guide to Managerial Communication Effective Business Writing and Speaking ,Prentice Hall New

Jersey-USA.5. Urmila,Rai S.M(2006);Business Communication: Himalaya Publishing, New,Dethi.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 713

NAME : COMPUTER GRAPHICS DESIGNING

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

2.1.1 Design graphics in media such as print digital or motion pictures.

246

Page 247: New Ict Curriculum (All Levels)

2.1.2 Decorate products

2.1.3 Assemble images, motion graphics

TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, demonstration and role model

REFERENCES

1. Asthana, R & Sinha,N (2007) Computer Graphics For Scientists And Engineers, Second Edition New Age International Publisher-USA.

2. Cunningham, S (2007); Computer Graphics: Programming in OpenGL for Visual Communication, Prentice Hall New Jersey -USA.

3. Edward, A (2008) Interactive Computer Graphics: A Top-down Approach with OpenGL, 5th Edition, Addison-Wesley,NY

4. Hill,F &Kelley, S (2006); Computer Graphics Using OpenGL, 3rd Edition, Prentice New Jersey -USA.

5. Lengye, E (2006); Mathematics for 3D Game Programming and Computer Graphics, 3rd Edition, California.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 714

NAME : OPERATING SYSTEMS CONFIGURATION

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES1.1.1Install Operating Systems1.1.2 Create users with their rights

247

Page 248: New Ict Curriculum (All Levels)

1.2.1 Administer users1.2.2 Secure Operating Systems components1.2.3 Assess systems performance and diagnose faults

TEACHING AIDSChalk board ,flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. Galvin,S( 2011) “Operating System Concepts” 8th Edition, John Wiley and Sons Cleveland, OH-USA.

2. Stallings,W ( 2009),Operating Systems: Internals and Design Principles 5th Edition, Prentice Hall, New Jersey.

3. Stallings.W (2011); Operating Systems: Internals and Design Principles 6th Edition Prentice Hall, New Jersey.

4. Tanenbaum,A &.Woodhull, A (2008) “Operating Systems Design and Implementation” Third Edition Prentice Hall, New Jersey,USA.5. Tanenbaum,A (2008) “Modern Operating Systems”, 3rd Edition, Prentice Hall Press, Atlanta-USA.

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 721

NAME : DEVELOPMENT STUDIES

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

248

Page 249: New Ict Curriculum (All Levels)

2.2.3 Interrelate different development studies concepts to manage business

2.2.4 Apply techniques to manage different social development challenges

TEACHING AIDS

Chalk board ,flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. Chambers, R. (2005); Ideas for Development, Earthscan, London.2. Crocker, D. A. (2008); Ethics of Global Development: Agency, Capability and Deliberative Democracy, Cambridge

University Press, Cambridge.3. Peet, R. with Hartwick, E. (2009) Theories of Development, Contentions, Arguments , Alternatives. Second Edition,

Guilford Press, New York and London.4. Smith, J. (2008) Social Movements for Global Democracy, John Hopkins University Press, Baltimore-USA.5. Willis, K. (2005) Theories and Practices of Development, Routledge, London and New York-USA.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 722

NAME : PRINCIPLES OF ACCOUNTING

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES249

Page 250: New Ict Curriculum (All Levels)

4.2.1 Prepare financial statements for business4.2.2 Identify and describe legal aspects of company formation, shares and bonus.TEACHING AIDS

Chalk board ,flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB

2. Jat, R.B. and Jugu, Y.A. (2008); Modern Financial Accounting: Theory and Practice. Jos: Ehindero (Nig.) Limited

3. Jugu, Y. G. (2008); Financial Accounting Synopsis 2nd Edition, Jos Ehindero Ltd (Nig.)

4. Raimes Jane,(2006);Financial Accounting Prentice Hall New Jersey-USA.

5. Wood Frank, Alan Sangster,(2005);Business Accounting 10th Edition Prentice Hall, New Jersey-USA.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 723

NAME : ARTIFICIAL INTELLIGENCE APPLICATIONS

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

3.1.1 Interrelate Intelligent Algorithms tool to business problem.250

Page 251: New Ict Curriculum (All Levels)

3.1.2 Apply methods for encoding knowledge in computer systems TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. Elaine,R &Kevin,K((2009),Artificial Intelligence (2nd ed.),McGraw Hill, NY

2. Macmillan, R(2009) Artificial Intelligence,(3rd ed.),Prentice Hall, London

3. Wesley,G(2008), Artificial Intelligence (6th ed.), Addison Wesley, NY

4. Wesley,P(2007), Artificial Intelligence(7th ed.),Addison Wesley, NY.

5. Stuart, R &Peter,N(2010), Artificial intelligence: a modern approach, (2nd Edition), Prentice Hall, USA

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 724

NAME : QUANTITATIVE TECHNIQUES

NO OF CREDITS : 15

SUB-ENABLING OUTCOME

251

Page 252: New Ict Curriculum (All Levels)

3.2.1 Apply different decision models and Quantitative methods in analysis and solving business problems.

3.2.2 Design quantitative models of estimation and forecasting for decision making. TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. Denzin NK, Lincoln YS (2009). Handbook of Qualitative Research. Sage Publications London.

2. Nkwi P, et al (2008) Field Research into Social Issues: Methodological Guidelines.

3. Osborne,J (2007),Best Practices in Quantitative Methods,

4. Pope C,& Mays N (2009) Qualitative Research in Health Care. London: BM

5. Richard. I. Levin & David. S. Rubin(2006) Statistics for Management,7th Edition ,Pearsons,New Delhi. Washington, DC.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 725

NAME : FIELD ATTACHMENT

NO OF CREDITS : 320

SUB-ENABLING OUTCOMES

252

Page 253: New Ict Curriculum (All Levels)

6.3.1 Apply ICT skills to support organization applications and infrastructure.

6.3.2 Maintain and evaluate system optimum performance

INTEGRATED METHOD OF ASSESSMENT:

Employers work certificate - 40% Report - 30% Internal supervisor assessment - 30%

CODE : HDIT 731

NAME : MULTIMEDIA SYSTEMS DESIGN

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES253

Page 254: New Ict Curriculum (All Levels)

5.3.1.Design appropriate multimedia systems to solve specific business problems.

5.3.2. Evaluate business problems to be solved by using multimedia tools

TEACHING AIDS

Chalk board ,flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. Agnew,P& Keller,P man.(2006);Distributed Multimedia: Technologies, Applications, and Opportunities in the Digital Information Industry,2nd ed, Addison Wesley,NY.

2. Banerji,A & Ghosh,A (2010) Multimedia Technologies 3rd Edition McGraw Hill, New Jersey-USA.

3. Gibbs,J& Dionysion C. (2005); Multimedia Programming 2nd Edition Addison Wesley, New Jersey-USA

4. Halsall,F (2007);Multimedia Communications: Applications, Networks, Protocols and Standards,3rd Edition ,Addison Wesley,NY-USA.

5. Jeffcott,J (2007); Multimedia In Practice :Technology and. Applications, First Edition Prentice Hall New Jersey..

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 732

NAME : PROGRAMMING WITH JAVA

NO OF CREDITS : 15

254

Page 255: New Ict Curriculum (All Levels)

SUB-ENABLING OUTCOMES

4.1.1 Analyze user requirements for program development.

4.1.2 Apply skills and knowledge of designing and building application programs.

4.1.3 Test and Implement application programs

TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration.

REFERENCES

1. Bruce Eckel(2010);Thinking in Java 4th Edition O'Reilly Cambridge-USA.

2. David Flanagan(2007) ;Java in a Nutshell ,4th Edition, : O'Reilly Cambridge-USA.

3. David Poplawski,(2009); Objects Have Class, An Introduction to Programming with Java, Fourth Edition McGraw-Hill,Columbus-USA.4. John Lewis and William Loftus(2008);Java Software Solutions, Foundations of Program Design, 2nd Edition. , Addison-Wesley,NY-USA.5. Vlada Matena, Sanjeev Krishnan.(2007);Applying Enterprise JavaBeans, Second Edition Addison Wesley NY-USA.

NTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 733

NAME : RESEARCH METHODOLOGY

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

255

Page 256: New Ict Curriculum (All Levels)

3.4.1 Apply different research methodologies, tools and techniques in exercising critical judgment and discrimination in the resolution of complex problematic situations.

3.4.2 Apply research methods techniques in reporting and presenting the required results in agreed format.TEACHING AIDS

Chalk board ,flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. Burke J, Larry C (2010);Educational Research: Quantitative, Qualitative, and Mixed Approaches2. Burton, D & Steve Bartlett(2009);Key Issues for Education Researchers,4th Edition, SAGE Publications Ltd Darville-USA. 3. Denscombe, M (2007);The good research guide: for small-scale social research projects McGraw-Hill International ,Columbus –USA.4. Gary, T (2009); How to do your research project: A guide for students in education and applied social sciences 2nd Edition, SAGE

Publications Ltd, London. 5. Ian,B (2008); Questionnaire Design: How to Plan, Structure and Write Survey Material for Effective Market Research,Kogan Page

Publishers, London.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 734

NAME : COMPUTERIZED ACCOUNTING

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

256

Page 257: New Ict Curriculum (All Levels)

4.2.1 Prepare financial statements for business

4.2.2 Identify and describe legal aspects of company formation, shares and bonus.

TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES:

1. Carol,Y & Susan,C (2007),Computer Accounting Essentials with Microsoft Office Accounting, (1st ed.),McGraw Hill,NY2. International Accounting Standard Board.(2006);International Financial Reporting Standards and International Accounting Standard (IAS):IASB.

3. Raimes J,(2006);Financial Accounting Prentice Hall New Jersey-USA.

4. Robert,H (2009),Accounting Information Systems,(3rd ed.)McGraw Hill,NY

5. Wood, F. and Alan S. (2005); Business Accounting 1 (10th ed.),Prentice Hall,London.

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%CODE : HDIT 741

NAME : NETWORKING MANAGEMENT

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

257

Page 258: New Ict Curriculum (All Levels)

5.11 Design the network system for the organization.

5.1.2 Install, test and implement the system5.2.1 Establish security mechanism5.2.2 Troubleshoot the network systems6.1.4 Evaluate and Maintain network systems.TEACHING AIDSChalk board ,flip chart, overhead projector and computer.METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration REFERENCES

1. Alexander, C (2006); Network Management Fundamentals,1st Edition,Cisco Press, Indiana-USA.2. Gerard, B (2008);Network Management 100 Success Secrets - the Complete Guide to Network Management

Software, Tools, Systems, Services and Performance Management,1st Edition, Emereo Pty Limited Brisbane Australia.

3. Joseph, D (2006); Network Troubleshooting Tools: 3rd Edition, O'Reilly Media Inc, Cambridge. 4. Neal, A (2009 );Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday Problems

2nd Edition NJ-USA.5. Udupa, D(2006); Network Management Systems Essentials,2nd Edition, McGraw-Hill, New York, NY:

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 742

NAME : ENTREPRENEURSHIP DEVELOPMENT

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES2.3.1 Prepare business plans

258

Page 259: New Ict Curriculum (All Levels)

2.3.2 Apply marketing skills to market products. 2.3.3 Apply skills for overcoming business challenges.TEACHING AIDSChalk board ,flip chart, overhead projector and computer.METHODS OF INSTRUCTION:This module will be conducted through lectures, discussion and demonstration REFERENCES

1. André van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, New York-USA.

2. Lawrence, A& Webber (2005),Business and Society 11th Edition, McGraW, Hill NJ.

3. Norman W (2009), Entrepreneurship and Local Economic Development, 11th Edition, Rowman & Littlefield Maryland-USA..

4. Randall G (2007) Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA.

5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press, Atlanta-USA

INTEGRATED METHOD OF ASSESSMENT: Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 743

NAME : MOBILE COMPUTING

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES

259

Page 260: New Ict Curriculum (All Levels)

6.1.1 Evaluate performance of mobile systems developed6.1.2 Assess business performance after mobile computing implementation

TEACHING AIDS

Chalk board ,flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES

1. André van S (2006);Empirical analysis of entrepreneurship and economic growth- Business & Economics, 1st Edition, Springer, New York-USA.

2. Lawrence,A& Weber,J (2005),Business and Society 11th Edition, Mc GraW, Hill NJ.

3. Norman W (2009), Entrepreneurship and Local Economic Development , 11th Edition, Rowman & Littlefield Maryland-USA..

4. Randall G (2007)Empirical Analysis of Entrepreneurship and Economic growth, 10th Edition ,New York-USA.

5. Westhead P (2006);Entrepreneurship Financial Times Prentice Hall Press,Atlanta-USA

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

CODE : HDIT 744

NAME : PROJECT MANAGEMENT

NO OF CREDITS : 15

SUB-ENABLING OUTCOMES260

Page 261: New Ict Curriculum (All Levels)

6.2.1 Assess business performance requiring ICT enhancement6.2.2 Implement ICT concepts in solving business problems.TEACHING AIDS

Chalk board, flip chart, overhead projector and computer.

METHODS OF INSTRUCTION:

This module will be conducted through lectures, discussion and demonstration

REFERENCES:

1. Anuj S.(2008);Enterprise Contract Management: A Practical Guide to Successfully Implementing an ECM Solution, 1st Edition, New York-USA.

2. Gerry, K and Steve R (2009); Advanced Project Portfolio Management and the PMO,2nd Edition NJ-USA.3. Howard G. (2008);Project Management for Designers and Facilities Managers, third edition, ‘Reilly Media-USA.4. Schragenheim, E, et al (2009). Supply chain management at warp speed: integrating the system from end to end,2nd

Edition Cleverand-USA.5. Sturdy, A et al (2009);Management Consultancy,1st Edition Oxford University Press-UK

INTEGRATED METHOD OF ASSESSMENT:

Continuous Assessment - 40% End of Semester Examination – 60%

BACHELOR DEGREE (NTA LEVEL 8) PROGRAMME IN INFORMATION AND COMMUNICATION TECHNOLOGY.

261

Page 262: New Ict Curriculum (All Levels)

1.0BACKGROUND INFORMATIONThe philosophy behind the development of competent modular curricular is to comply with the Nation’s Vision and Mission, which requires that the Nation is technologically strong. The programme is geared ` towards producing innovative, creative, and flexible work force that will be responsive to the Social needs.

Traditionally, education has to content with the problem that knowledge acquisition does not guarantee the successful application of that same knowledge. Yet according to Whitehead, the ultimate goal of education should be to teach students to apply knowledge. Furthermore, one is confronted with the problem that discipline-specific knowledge and skills are insufficient to respond adequately in a situation with discipline-transcending new and unknown problems. The foregoing are he problems that the College of Business Education wants to solve with the reviewed curricula for its management programs. In the revised curricula students will learn to apply knowledge and skills.

The new approach is known as competence Based Education and Training (CBET). This approach is based on the philosophy that “ given appropriate instruction, time and conditions, almost all learners can and will learn most of what they are supposed to learn”. CBET emphasis is on outcomes of learning, whereby an outcome of learning is a result of the learning process (e.g.. Prepare a trial balance, balance an account, calculate profit etc). The key features of CBET are measurable competence standards and their assessment criteria.

The present review covers NACTE Technical Award (NTA) level 8 for INFORMATON AND COMMUNICATION TECHNOLOGY specialization.

The qualification comprises of a number of modules, each module will be covered in one semester. For full time courses, there are 15 weeks per semester allocated for instructions and 2 weeks assigned for examinations. A total of 17 weeks per semester are allocated in each qualification and accounts for 34 weeks for a year.

This qualification has 120 credits which is the minimum prescribed by NACTE.

2.0MODULE CODING

The coding of modules follows logical sequence as in the following example for BDIT 811.

262

Page 263: New Ict Curriculum (All Levels)

BDIT = Stands for Bachelor Degree in Information and Communication Technology

8 = The first digit stands for the NTA level, in this case Bachelor Degree which is level eight.

1 = The second digit stands for semester, i.e. for semester one.

1 = The last digit stands for the order of the module in the semester. Modules are arranged serially from 1 to the highest number, upon the number of modules in the semester.

3.0GRADING OF ASSESSMENT RESULTS

The grading of assessment results is in conformity with the NACTE grading system as follows.

NTA Level 8

Grade Definition Score

A Excellent 75 ─ 100

B+ Very Good 65 ─ 74

C Good 55 ─ 64

D Average 40 ─ 54

F Failure 00 ─ 39

I Incomplete

4.0AWARDS

The award shall be made to students who satisfy the following conditions.263

Page 264: New Ict Curriculum (All Levels)

Have completed modules for the award. Have attained a minimum cumulative Grade Point Average (GPA) equivalent to a pass. GPA shall be computed from cumulative scores earned by students using NACTE guidelines.

5.0AWARDS CLASSIFICATION:

Awards Classification for NTA level 8

Class of Awards Cumulative GPA

First Class 4.4 to 5.0

Upper Second Class 3.5 to 4.3

Lower Second Class 2.7 to 3.4

Pass 2.0 to 2.6

6.0SUMMARY FRAMEWORK

QUALIFICATION BACHELOR DEGREE IN INFORMATION & COMMUNICATION TECHNOLOGY

264

Page 265: New Ict Curriculum (All Levels)

PURPOSE OF QUALIFICATION This qualification is intended for persons who will analyze, interpret and make decisions, design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve complex problems, apply design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets without supervision.

NTA LEVEL 8

COMPETENCE LEVEL DESCRIPTOR The holder of this qualification will apply knowledge and skills in a wide and unpredictable variety of contexts to design and manage distributed systems, use advanced techniques of web programming to develop and implement web applications, apply current software engineering techniques to devise software to solve routine problems, use design tools to create object oriented database models, participate in information system development as informed persons and have an understanding of how to inspect and protect information system assets and assume personal responsibility, responsibility for the work of others, and the responsibility in the allocation of resources, policy formulation, planning, execution and evaluation.

CREDITS AT THIS LEVEL 120

CUMULATIVE CREDITS AT

THIS LEVEL

0

265

Page 266: New Ict Curriculum (All Levels)

MAXIMUM NUMBER OF CREDITS THAT COULD BE CONSIDERED FROM LOWEST LEVEL

0

DATE THE QUALIFICATION

STANDARD LAST REVIEWED

New

ENTRANCE

REQUIREMENTS NTA LEVEL 7 in Information and Communication Technology.

7.0 PRINCIPAL LEARNING OUTCOMES AND CREDITS VALUES AND ASSESSMENT CRITERIA

266

Page 267: New Ict Curriculum (All Levels)

S/NO PRINCIPAL LEARNING OUTCOMES CREDITS VALUES

ASSESSMENT CRITERIA

1 Design and manage a distributed system that fulfills

requirements with regard to key system properties

15 Distributed systems that fulfill requirements

with regard to key system properties is clearly

designed and managed.

2 Design and manage web applications by applying current

web technologies and programming techniques.

15 Web applications that apply current web

technologies and programming techniques are

clearly designed and managed

3 Apply software engineering techniques, design tools and software development processes to develop software

30 3.1 Software development tools, models and

processes are properly applied to develop

software

3.2 Object oriented techniques are properly

applied to develop software

3.3 Object oriented analysis and design using

UML are properly applied to develop

software

3.4 Object oriented programming with JAVA is

properly applied to develop software

4 Apply management information system concepts to

manage information systems including E-business, and

develop IT projects in a contemporary business setting

45 4.1 E-business concepts are properly applied

to manage business systems

4.2 Principles of MIS are properly applied in

decision making and business needs

clearly identified

267

Page 268: New Ict Curriculum (All Levels)

4.3 IT projects are properly designed and

implemented to overcome business

challenges

5 Apply various technologies to implement appropriate

security measures within an organization

15 5.1 Various technologies and security

measures are properly applied to

implement appropriate security measures

within an organization.

TOTAL CREDITS 120

8.0 PROGRAM STRUCTURE

268

Page 269: New Ict Curriculum (All Levels)

SEMESTER I

S/NO CODE NAME OF MODULE CREDITS

1 BDIT 811 Distributed Systems management 15

2 BDIT 812 Web programming 15

3 BDIT 813 Software Engineering 15

4 BDIT 814 Object Oriented Database Management Systems 15

TOTAL CREDITS SEMESTER I 60

SEMESTER II

1 BDIT 821 E-Business Management 15

2 BDIT 822 Management of Information Systems 15

3 BDIT 823 IT Security Management 15

4 BDIT 824 Project Development 15

TOTAL CREDITS SEMESTER II 60

GRAND TOTAL CREDITS FOR NTA LEVEL 8 120

269

Page 270: New Ict Curriculum (All Levels)

9.0 NACTE STANDARDS AND RELATED ENABLING OUTCOMES:PRINCIPAL OUTCOMES ENABLING OUTCOMES SUB-ENABLING OUTCOMES

1.1. Design and manage a distributed system that fulfills requirements with regard to key system properties

1.1. Explain understand the basics of distributed systems

1.1.3 Apply the concept of distributed systems1.1.4 Identify examples of distributed systems1.1.5 Discuss the pros and cons of distributed systems

1.3 Explain system architecture and communication

1.3.1 Explain the concept of system autonomy in distributed systems1.3.2 Describe distributed computing and programming concepts1.3.3 Explain design issues with distributed systems1.3.4 Describe models of distributed systems1.3.5 Explain inter-process communication in distributed systems

1.3. Explain replication, consistency and distributed shared memory systems.

1.3.1 Explain replications and their reasons1.3.2 Apply consistency models1.3.3 Analyze distributed system implementation models

1.4 Design distributed file systems

1.4.1 Explain the concept of distributed file system1.4.2 Describe file services types in distributed systems1.4.3 Discuss and classify issues in distributed file systems

1.5 Explain fault tolerant systems

1.5.1 Describe faults, errors, and failures1.5.2 Explain failure models in distributed systems1.5.3 Apply hardware reliability models1.5.4 Apply recovery mechanisms.

2.1 Design and manage web applications by applying current web technologies and programming techniques

2.1 Design web applications 2.1.4 Apply web technology concepts in web design2.1.5 Apply web development tools in web design

2.2. Manage websites 2.2.1 Apply the concept of website management2.2.2 Apply access control mechanisms2.2.3 Manage users of websites

2.2.4 Analyze management of website contents

270

Page 271: New Ict Curriculum (All Levels)

2.2.5 Manage website updates.3.1 Apply software

engineering techniques, and design tools, and software development process to develop software

3.2. Apply different software development methodologies

5.1.5 Apply software development tools5.1.6 Apply various software development models5.1.7 Apply the steps in the requirements analysis process5.1.8 Design software information systems

5.2 Apply software engineering techniques

5.2.1 Apply object oriented techniques in software development5.2.2 Apply agile software development techniques to develop software5.2.3 Apply object oriented concepts using UML do describe software

development processes5.3 Apply the Unified

Modeling Language concept

5.3.1 Apply object oriented analysis and design with UML5.3.2 Discuss object oriented programming with JAVA

5.4 Apply the concept of object orientation

3.4.1 Describe objects and classes of software systems

3.4.2 Explain inheritance, polymorphism, and message passing3.4.3 Describe UML diagrams in software development

3.5 Explain object oriented database management systems

3.5.1 Apply the concept Object Oriented Database Management Systems3.5.2 Design Object Oriented Database Management Systems

4 Apply management information system concepts to manage information systems including E-Business and IT projects in a contemporary business setting

4.1 Assess business information needs

4.1.1 Analyze current e-business situations4.1.2 Identify Business e-application needs4.1.3 Apply various e-business application in contemporary business settings4.1.4 Discuss the advantages and disadvantages of e-business

4.2 Ability to deploy MIS solutions

4.2.1 Analyze current business situations4.2.2 Identify Business information needs4.2.3 Explain different information systems4.2.4 Apply various information systems in business

4.3 Apply MIS principles in decision making

4.3.1 Explain the principles of MIS4.3.2 Apply the MIS principles in making decisions

5 Apply various technologies to implement appropriate security

5.1 Detect security threats 5.1.1 Discuss common security threats5.1.2 Explain different types of security threats5.1.3 Assess the effects of security threats

5.2 Apply various 5.2.1 Apply various security technologies

271

Page 272: New Ict Curriculum (All Levels)

measures within an organization

technologies to implement security measures within an organization

5.2.2 Identify security resources for safeguarding of information systems

5.3 Inspect and protect information assets

5.3.1 Explain the role of data in an organization5.3.2 Describe different information assets5.3.3 Inspect information systems for security threats5.3.4 Implement mechanisms to protect information systems from security

threats

10.0 ASSESSMENT CRITEIA AND ASSESSMENT INSTRUMENTSSUB-ENABLING OUTCOMES RELATED TASK ASSESSMENT ASSESSMENT ASSESSMENT

272

Page 273: New Ict Curriculum (All Levels)

CRITERIA METHOD INSTRUMENTS

1.1.1 Apply the concept of distributed systems

Explain a distributed system Identify types of distributed

systems Discuss the features of distributed

system.

The concept of distributed system is clearly applied

Oral questioning,

group discussions,

buzz sessions

Model answers

1.1.2 Identify the types of distributed systems

Mention examples of distributed systems

Discuss types of distributed systems

Compare distributed systems with other systems

Types of distributed systems properly given

Oral questioning,

group discussions,

buzz sessions

Assignments, Test and Examinations

1.1.3 Discuss the pros and cons of distributed systems

Identify advantages of distributed systems

Identify disadvantages of distributed systems

Apply the limitations of distributed system in design process

The pros and cons of the distributed systems are thoroughly discussed

Questions

Group discussion

Check list

Model answers

1.2.1 Explain the concept of system autonomy in distributed systems

Define system autonomy Explain the concept of system

autonomy in distributed systems Explain the functions of system

autonomy

The concept of system autonomy in distributed systems is clearly explained

Group discussion

Assignments

Assignments, Test and Examinations

1.2.2 Explain distributed computing and programming concepts

Explain the concept of distributed computing

Explain the concept of programming

Describe different programming technology

Distributed computing and programming concepts are clearly explained

Assignments, and exercises

Model answers

1.2.3 Explain design issues with distributed systems

Discuss the known design issues in distributed systems

Describe the issues in distributed

Design issues with distributed systems

Demonstration Assignments.

Model answers, checklist

273

Page 274: New Ict Curriculum (All Levels)

system Explain the role of design issues in

distributed system.

clearly explained

1.2.4 Describe models of distributed systems

Apply the models of distributed systems

Describe the distributed systems resources

Apply the architectural, interactive and fault models

Models of distributed systems clearly described

Demonstration Assignments.

Demonstration, model answers

1.2.5 Explain inter-process communication in distributed systems

Define communication Explain communication in

distributed systems Describe process communications

Inter-process communication in distributed systems clearly explained

Assignments, discussion, brainstorming

Model answers

1.3.1 Explain replication and their reasons

Apply the concept of replication Discuss the reasons for replication Explain the importance of

replication concept

Replication and their reasons are clearly explained

Assignments, presentations

Model answers

Assignments.

tests

1.3.2 Apply consistency models Define models Mention common consistency

models Describe the models Describe consistency protocols

Consistency models clearly applied

Demonstrations, assignments,

discussions

model answers

1.3.3 Analyze distributed system implementation model

Explain distributed system Describe distributed model system Explain the function of distributed

model.

Distributed system implementation is clearly analyzed

Demonstration

assignment

Model answers

Examination

1.4.1 Explain the concept of distributed file system

Explain a file system Explain distribution of resources in

a system Describe files in a distributed

system

The concept of distributed file system clearly explained

Demonstrations, assignments,

Discussions

Assignments,

Test and Examinations

274

Page 275: New Ict Curriculum (All Levels)

1.4.2 Describe file service types in distributed systems

Explain a file service Mention common file service types Describe file service types in a

distributed system

File service types in distributed systems clearly described

Demonstrations, assignments,

discussions

Assignments,

Discussions

Test and Examinations

1.4.3 Discuss and classify issues in distributed file systems

Explain reasons for using distributed file systems

Discuss design issues with distributed file systems

Identify types of file system

Issues in distributed file systems thoroughly discussed

Demonstrations, assignments,

Discussions

Assignments,

Test and Examinations

1.5.1 Describe and classify faults, errors, and failures and classify faults

Explain faults , errors and failure in distributed systems

Identify faults Describe the identified faults

Faults, errors and failures are clearly described and classified

Demonstrations, assignments,

Discussions

Assignments, Test and Examinations

1.5.2 Explain failure models in distributed systems

Apply system failure concept Explain failure models in

distributed systems Describe different models applied

in distributed system

Failure models in distributed systems clearly explained

Demonstrations, assignments,

Discussions

Demonstration, case studies, test, assignments

1.5.3 Apply hardware reliability models in distributed system

Define hardware Apply hardware reliability concept Mention known hardware

reliability models

Hardware reliability models properly applied

Demonstrations, assignments,

Discussions

Demonstrations, Assignments, Test and Examinations

1.5.4 Apply recovery mechanisms in distributed system

Define recovery Explain what is a recovery

mechanism Discuss common recovery

mechanism in a distributed system

Recovery mechanisms correctly applied

Demonstrations, assignments,

Discussions

Case studies, demonstration, study tours Test and Examinations

2.1.1 Apply web technology concepts in web design

Explain the concept of computer networking

Explain the concept of resource

Web technology concepts are properly applied in

Assignments, and exercises

Model answers

275

Page 276: New Ict Curriculum (All Levels)

networking Define world wide web Describe internet facilities

web design

2.1.2 Apply web development tools in web design

Apply HTML tags Apply PHP tool Apply Knowledge of SQL basics Apply Java Scripts

Web development tools are properly applied

Assignments, practical sessions

Model answers, checklist

2.2.1 Apply the concept of website management

Discuss web hosting issues Apply website management tools Analyze content of management

issues

The concept of website management is properly applied

Assignments, Model answers

2.2.2 Apply access control mechanisms

Discuss administrative rights issues Discuss different privileges Discuss security policy issues

Access control mechanisms are properly applied

Assignments, presentations

Model answers

2.2.3 Manage user s of website Explain Password management Create, delete users Provide passwords and access

rights to users Modify user details

Users of the website are properly managed

Practical sessions, assignments

Demonstration, model answers

2.2.4 Analyze management of website contents

Explain upload and download issues

Explain forms and password issues Explain telnet, ftp

Management of website contents properly analyzed

Assignments, Test and Examinations and model answers

Demonstration, model answers

2.2.5 Manage website updates Describe website update tools Explain and apply HTML Explain and apply PHP Apply Knowledge of Dreamweaver

Website updates are properly managed

Assignments, exercises and model answers

Demonstration, model answers

3.2.1. Apply software development tools

Explain software development lifecycle (SDLC)

Explain structured software development techniques

Explain object oriented software development techniques

Software development tools are properly applied

Assignments, exercises and model answers

Demonstration, model answers

276

Page 277: New Ict Curriculum (All Levels)

3.1.2 Apply various software development models

Explain waterfall model Explain V-Model Describe Prototyping

Various software development models are properly applied

Assignments, Test and Examinations

Demonstration, model answers

3.1.3 Apply the steps in the requirements analysis process

Apply requirements elicitation concept

Explain user’s role in the requirements definition

Explain the role of documentation in requirements definition

The steps in the requirements analysis process are properly applied

Assignments, Test and Examinations

Model answers, checklist

3.1.4 Design software information systems

Apply design techniques Explain object oriented design Apply structured design techniques

Software information systems are properly designed

Assignments, Test and Examinations

Model answers, checklist

3.2.1 Apply object oriented techniques

Explain objects Explain classes Describe UML diagrams

Object oriented techniques are properly applied

Assignments, Test and Examinations

Model answers, checklist

3.2.2 Apply agile software development techniques

Apply Dynamic System Development Method (DSDM)

Apply extreme Programming (XP) method

Explain agile techniques in software development

Agile software development techniques are properly applied

Assignments, Test and Examinations

Model answers, checklist

3.2.3 Apply object oriented concepts using UML to describe software development process

Apply cases, Apply actors Apply UML diagrams

Object oriented techniques using UML are properly applied

Assignments, Test and Examinations

Model answers, checklist

3.3.1 Apply object oriented analysis and design with UML

Explain the objects Explain the classes apply the use cases and other UML

diagrams

Object oriented analysis and design is properly applied

Assignments, Test and Examinations

Model answers, checklist

277

Page 278: New Ict Curriculum (All Levels)

using UML

3.3.2 Discuss object oriented programming with JAVA

Declare comments in JAVA Declare classes and objects in JAVA Explain inheritance Explain JDK

Object oriented programming with JAVA is clearly discussed

Assignments, Test and Examinations

Model answers, checklist

3.4.1 Describe objects and classes of software systems

Apply object methods Apply object properties Explain message passing function

Objects and classes are clearly described

Assignments, Test and Examinations

Model answers, checklist

3.4.2 Explain inheritance, polymorphism, message passing in object orientation

Apply object orientation concepts Explain objects Explain classes

Inheritance, polymorphism, and message passing are clearly explained

Assignments, Test and Examinations

Model answers

3.4.3 Describe UML diagrams in software development

Apply object orientation concepts Explain class diagrams Explain collaborative diagrams Understand deployment diagrams Explain use cases

UML diagrams are clearly described

Assignments, Test and Examinations

Model answers

3.5.1 Apply the concept of Object Oriented Database Management Systems

Define OODBMS Explain the function of OODBMS Describe features of OODBMS

The concept of OODBMS are clearly applied

Exercise

examination

Modal answers

3.5 .2 Design Object Oriented Database Management Systems

Explain OODBMS Explain the relationship between

objects and classes Apply inheritance concept.

OODBMS are properly designed

Exercise

Test

model answers

checklist

4.1.1 Analyze current e-business situations

Analyze the operations of current e-business

E-business situations Assignments, Test Case studies,

278

Page 279: New Ict Curriculum (All Levels)

Identify the gap between expected situation and the current situation

Apply knowledge of ICT to gather e-applications needs

clearly analyzed and Examinations demonstration, study tours Test and Examinations

4.1.2 Identify business e-applications needs

Discuss different business e-applications needs

Apply information systems techniques in capturing data

Discuss different models for capturing data

Business e-applications needs identified

Assignments, Test and Examinations

Case studies, demonstration, study tours Test and Examinations

4.1.3 Apply various e-business applications in contemporary business settings

explain use of e-applications in business

Discuss different e-business systems

Explain different information technology that support e-business

E-business applications applied contemporary business settings

Assignments, Test and Examinations

Case studies, demonstration, study tours Test and Examinations

4.1.4 Discuss the advantages and disadvantages of e-business

Discuss the pros and cons of e-application

Discuss the strengths of e-applications

Compare e-application with traditional applications

Advantages and disadvantages of e-business discussed

Assignments, Test and Examinations

Case studies, demonstration, study tours Test and Examinations

4.2.1 Analyze current business situations

Analyze the operations of current system

Identify the gap between expected situation and the current situation

Apply knowledge of system analysis and design to capture data

Current business situations are properly analyzed

Exercises

assignment

checklist

Model answers

4.2.2 Identify business information needs

Discuss different business information systems

Apply information systems techniques in capturing data

Discuss different models for capturing data

Business information needs

are clearly identified

Group work

Examination

Demonstrations, Assignments, Test and Examinations

4.2.3.Explain different information Define a system Different information Exercises questions and model

279

Page 280: New Ict Curriculum (All Levels)

systems Explain information system Differentiate between information

and a system

systems are properly explained

assignment

answers

4.2.4 Apply various information systems in business

explain use of information system in business

Discuss different information system that support business

Explain different information technology that support business

Various information systems in business are properly applied

assignment

exercise

Demonstrations, Assignments, Test and Examinations

4.3.1 Explain the principles of MIS Define MIS Discuss uses of MIS in business

organization Identify different types of MIS

Principles of MIS are clearly explained.

Exercise

assignment

model answers

4.3.2Apply the MIS principles in making decisions

Explain the function of MIS in an organization.

Discuss the role MIS in decision making.

Discuss steps in decision making

Principles of MIS in making decisions are properly applied

Assignment

Group discussion

Model answers

checklist

5.1 .1 Discuss common security threats

define security threats Identify common threats Classify threats

Security threats are thoroughly discussed

Exercise

Test

Model answers

Checklist

5.1.2 Explain different types of security threats

Describe security threats Understand the causes of threats Classify security threats according

to their causes

Different types of security threats are clearly explained

assignment

exercise Demonstrations, Assignments, Test and Examinations

5.1.3 Asses the effects of security threats

Describe the importance of security Apply appropriate measures to

prevent/minimize threats Identify different sources of threats

Effects of security threats are properly assessed

Assignment

Group discussion

Model answers

Checklist

5.2.1 Apply various security technologies

Define security technology Identify different features of

security technology

Various security technologies are

Exercise Answers

280

Page 281: New Ict Curriculum (All Levels)

Discuss different security technology

properly applied assignment Checklist

5.2.2 Identify security resources for safeguarding information systems

Describe IT in relation to security Discuss different Information

technologies used to safeguard information systems.

Discuss different technology used to safeguard information system

Security resources for safeguarding information systems are clearly identified.

exercise

assignment Demonstrations, Assignments, Test and Examinations

5.3.1 Explain the role of data in an organization

Define data Apply the concept of data quality Discuss different uses of data

The role of data in an organization, is clearly explained

Group work

exercise

model answers

checklist

5.3.2 Describe different information assets

Define information assets Identify different information

assets within an organization Discuss the functions of

information assets

Information assets are clearly described.

Exercise

assignment

checklist

modal answers

5.3.3 Inspect information systems for security threats

Identify different security threats Discuss the behavior of Information

systems before and after security threats.

Apply different techniques in inspection

information systems for security threats are properly inspected

Practical exercise

Group work

Demonstrations, Assignments, Test and Examinations

5.3.4 Implement mechanisms to protect information systems from security threats

Apply different security measures Identify strong and weak security

measures Discuss the effects of applying

weak security measures in information systems

Mechanisms to protect information systems are properly implemented

exercise

assignment

Demonstrations, Assignments, Test and Examinations

281

Page 282: New Ict Curriculum (All Levels)

11.0 BENCHMARKING OF ASSESSMENT CRITERIA

S/NO ASSESSMENT CRITERIA SATISFACTORY GOOD EXCELLENT

1.1.1 The concept of distributed system is clearly applied

Explains the concept of distributed system

Explains the concept of distributed systems and identifies types of distributed systems

Explains the concept of distributed systems, identifies types of distributed systems and discusses the features of distributed systems

1.1.2 The types of distributed systems properly identified.

Mentions the examples of distributed systems

Mentions the examples of distributed systems and discusses the types of distributed systems

Mentions the examples of distributed systems, discusses the types of distributed systems and compares distributed systems with other systems

1.1.3 The pros and cons of the distributed systems are thoroughly discussed

Identifies the advantages of distributed systems

Identifies the advantages and disadvantages of distributed systems

Identifies the advantages, disadvantages of distributed systems and the limits of distributed systems

1.2.1 The concept of system autonomy in distributed systems is clearly explained

Defines system autonomy concept

Defines system autonomy concept, explains the concept of system autonomy on distributed systems

Defines system autonomy concept, explains the concept of system autonomy on distributed systems, and explains the importance of system autonomy

1.2.2 Distributed computing and programming concepts are clearly explained

Explains the concept of distributed computing

Explains the concept of distributed computing, and the concept of distributed programming

Explains the concept of distributed computing, the concept of distributed programming, and describes different programming technologies

1.2.3 Design issues with distributed systems clearly explained

Mentions the known design issues in distributed systems

Mentions the known design issues in distributed systems, and describes the

Mentions the known design issues in distributed systems, describes the issues in distributed systems, and explains the

282

Page 283: New Ict Curriculum (All Levels)

issues in distributed systems

role of design issues in distributed systems

1.2.4 Models of distributed systems clearly described

Mentions the models of distributed systems

Mentions the models of distributed systems, and describes the distributed systems resources

Mentions the models of distributed systems, describes the distributed system resources and describes the architectural, interactive and fault models

1.2.5 Inter-process communication in distributed systems clearly explained

Defines communication

Defines communication and explains communication in distributed systems

Defines communication, explains communication in distributed systems and describes process communications

1.3.1 Replication and their reasons are clearly explained

Explains the concept of replication

Explains the concept of replication and discusses the reasons for replication

Explains the concept of replication, discusses the reasons for replication, and explains the importance of replication

1.3.2. Consistency models clearly applied Defines models Defines models and explains, mentions common consistency models

Defines models, explains mentions common consistency models and describes the models

1.3.3 Distributed system implementation models clearly analyzed

Explains the concept of distributed systems

Explains the concept of distributed systems and describes distributed system models

Explains the concept of distributed systems, describes distributed system models and explains the functions of distributed system models

1.4.1 The concept of distributed file system clearly explained

Explains an file system

Explains a file system and explains distribution of resources in a system

Explains a file system, explains distribution of resources in a system, and describes files in a distributed system

1.4.2 File service types in distributed systems clearly described

Explains a file service Explains a file service, and mentions common file

Explains a file service, mentions common file service types, and describes file

283

Page 284: New Ict Curriculum (All Levels)

service types service types in a distributed system

1.4.3 Issues in distributed file systems properly discussed

Explains reasons for using distributed file systems

Explains reasons for using distributed file systems and explains design issues with distributed file systems

Explains reasons for using distributed file systems, explains design issues with distributed file systems and identifies types of file systems

1.5.1 Faults, errors and failures are clearly described and classified

Defines faults, errors and failures

Defines faults, errors and failures, explains these in a distributed system environment

Defines faults, errors and failures, explains these in a distributed system environment and identifies and describes identified faults

1.5.2 Failure models in distributed systems clearly explained

Applies system failure concepts

Applies system failure concepts and explains failure models in distributed systems

Applies system failure concepts, explains failure models in distributed systems and describes different models applied in distributed systems

1.5.3 Hardware reliability models properly applied

Defines the term hardware

Defines the term hardware and applies hardware reliability concepts

Defines the term hardware, applies hardware reliability concepts and mentions common hardware reliability models

1.5.4 Recovery mechanisms correctly applied

Defines recovery concept

Defines recovery concept and explains what is a recovery mechanism

Defines recovery concept, explains what is a recovery mechanism and discusses common recovery mechanisms in distributed systems

2.1.1 Web technology concepts are properly applied in web design

Explains the concept of computer networking and resource networking

Explains the concept of computer networking and resource networking and defines the world wide web (www)

Explains the concept of computer networking and resource networking and defines the world wide web (www) and describes internet facilities

284

Page 285: New Ict Curriculum (All Levels)

2.1.2 Web development tools are clearly applied

Applies HTML tags Applies HTML tags, PHP tools and SQL basics

Applies HTML tags, PHP tools and SQL basics and java scripts

2.2.1 The concept of website management is properly applied

Discusses web hosting issues

Discusses web hosting issues and applies website management tools

Discusses web hosting issues, applies website management tools and analyses contents of management

2.2.2 Access control mechanisms are properly applied

Discusses administrative rights issues

Discusses administrative rights issues and discusses different privileges

Discusses administrative rights issues, different privileges and security policy issues

2.2.3 Users of the website are properly managed

Explains password management

Explains password management and creates, modifies and deletes users

Explains password management , creates, modifies and deletes users and provides access rights to users

2.2.4 Management of website contents properly managed

Explains upload and download issues

Explains upload and download issues and understands forms and password issues

Explains upload and download issues, understands forms and password issues and explains telnet, ftp

2.2.5 Website updates are properly managed

Describes website update tools

Describes website update tools and explains and applies PHP and HTML

Describes website update tools and explains and applies PHP and HTML and applies knowledge of Dreamweaver

3.1.1 Software development tools are properly applied

Explains software development life cycles (SDLC)

Explains software development life cycles (SDLC) and structured software development tools

Explains software development life cycles (SDLC) and structured software development tools with examples

3.1.2 Various software development models are properly applied

Explains waterfall model

Explains waterfall model and V-model

Explains waterfall model, V-model and describes prototyping

3.1.3 The steps in the requirements Applies requirements Applies requirements Applies requirements elicitation concepts, 285

Page 286: New Ict Curriculum (All Levels)

analysis process are properly applied

elicitation concepts elicitation concepts,

and explains user’s role in the requirements definition

explains user’s role in the requirements definition and the role of documentation in requirements definition

3.1.4 Software information system are properly designed

Applies design techniques

Applies design techniques and explains object design

Applies design techniques, explains object design, and applies structured design techniques

3.2.1 Object oriented techniques using UML are properly applied

Explains objects Explains objects and classes Explains objects ,classes, and describe UML diagrams

3.2.2 Agile software development techniques are properly applied

Applies dynamic system development method(DSDM)

Applies dynamic system development method(DSDM) and extreme programming (XP) method

Applies dynamic system development method (DSDM) ,eXtreme programming (XP) method and explains agile techniques in software development.

3.2.3 Object oriented techniques using UML are properly applied

Applies cases Applies cases, and actors Applies cases ,actors, and UML diagrams

3.3.1 Object oriented analysis and design using UML is properly applied

Explains the objects Explains the objects and classes

Explains the objects ,classes, applies the use cases and other UML diagrams

3.3.2 Software development process using UML is properly applied

Applies object oriented concepts

Applies object oriented concepts and explains the UML diagram

Applies object oriented concepts, explains the UML diagram and applies class methods and properties

3.3.3 Object oriented programming with JAVA is clearly discussed

Declares, comments and objects in JAVA

Declares, comments , classes, objects in JAVA and explains inheritance

Declares, comments , classes, objects in JAVA ,explain inheritance and JDK

3.4.1 Objects and classes are clearly Applies object Applies object methods Applies object methods ,properties and

286

Page 287: New Ict Curriculum (All Levels)

described methods and properties explains message passing function

3.4.2 Inheritance, polymorphism and message passing are clearly explained

Applies object orientation concepts

Applies object orientation concepts and explain objects

Applies object orientation concepts, explain objects and classes

3.4.3 UML diagrams are clearly described Applies object orientation concepts and explains class diagrams

Applies object orientation concepts, explains class diagrams and collaborative diagrams.

Applies object orientation concepts, explains class diagrams ,collaborative diagrams ,deployment diagrams and explains use cases

3.5.1 The concept of OODBMS are clearly applied

Explains OODBMS Explains OODBMS and function.

Explains OODBMS, f unction and describes features

3.5.2 OODBMS are properly designed Explains OODBMS Explains OODBMS and the relationship between objects and classes

Explains OODBMS and the relationship between objects, classes and applies inheritance concept.

4.1.1 E-business situations clearly analyzed

Analyses the operations of current e-business

Analyses the operations of current e-business and identifies the gap between expected situation and the current situation

Analyses the operations of current e-business, identifies the gap between expected situation, and the current situation and applies the knowledge of ICT to gather e-applications needs

4.1.2 Business e-applications needs identified

Discusses different business e-applications

Discusses different business e-applications and applies e-business techniques in capturing data

Discusses different business e-applications, applies e-business techniques in capturing data and discusses different models for capturing data

4.1.3 E-business applications applied contemporary business settings

Explains the use of e-applications in business

Explains the use of e-applications in business and discusses different e-

Explains the use of e-applications in business, discusses different e-business systems and explains different

287

Page 288: New Ict Curriculum (All Levels)

business systems information technology that support e-business

4.1.4 Advantages and disadvantages of e-business discussed

Discusses the pros and cons of e-applications

Discusses the pros and cons of e-applications and discusses the strengths of e-applications

Discusses the pros and cons of e-applications, discusses the strengths of e-applications and compares e-applications with traditional applications

4.2.1 Current business situations are properly analyzed

Analyses of the operations of current system

Analyses of the operations of current system and identify the gap between expected situation and the current situation,

Analyses of the operations of current system and identify the gap between expected situation and the current situation and applies knowledge of system analysis and design to capture data.

4.2.2 Business information needs are clearly identified

Discuss different business information systems

Discuss different business information systems and apply information systems techniques in capturing data.

Discuss different business information systems, apply information systems techniques in capturing data and discuss different models for capturing data.

4.2.3 Different information systems are properly explained

Defines a system Defines a system and explain information system

Defines a system, explain information system and differentiate between information and a system

4.2.4 Various information systems in business are properly applied

Explains use of information systems in business

Explains use of information systems in business and discusses different information system that support business

Explains use of information systems in business, discusses different information systems that support business and explains different ITthat support business.

4.3.1 Principles of MIS are clearly explained

Defines MIS Defines MIS and discuss uses of MIS in business

Defines MIS ,discuss uses of MIS in business organization and identifies

288

Page 289: New Ict Curriculum (All Levels)

organization different types of MIS

4.3.2 Principles of MIS in making decision are properly applied

Explains function of MIS in an organization

Explains function of MIS in an organization and discusses the role of MIS in decision making

Explains function of MIS in an organization ,discusses the role of MIS in decision making and discusses steps in decision making

5.1.1 Security threats are thoroughly discussed

Defines security threats

Defines security threats and identifies common threats

Defines security threats , identifies common threats, and classifies security threats

5.1.2 Different types of security threats are clearly explained

Describes security threats

Describes security threats and understands the causes of threats

Describes security threats, understands the causes of threats and, classifies security threats according to their causes.

5.1.3 The effects of security threats are properly assessed

Describes the importance of security

Describes the importance of security and applies appropriate measures to prevent or to minimize threats

Describes the importance of security, applies appropriate measures to prevent or to minimize threats, and identifies different sources of threats

5.2.1 Various security technologies are properly applied

Describes the importance of security

Describes the importance of security and applies appropriate measures to prevent/minimize threats

Describe the importance of security ,applies appropriate measures to prevent /minimize threats and identifies different sources of threats

5.2.2 Security resources for safeguarding information systems are clearly identified

Describes IT in relation to security

Describes IT in relation to security and identifies different information technologies used to safeguard information systems

Describes IT in relation to security , identifies different information technology used to safeguard information systems and discusses different technologies used to safeguard information system

289

Page 290: New Ict Curriculum (All Levels)

5.3.1 The role of data in an organization is clearly explained

Define data Define data and applies the concept of data quality

Define data, applies the concept of data quality and discusses different uses of data.

5.3.2 Information assets are clearly described

Defines information assets

Defines information assets and identifies different information systems within an organization.

Defines information assets, identifies different information systems within an organization, and discusses the functions of information assets

5.3.3 Information systems for security threats are properly inspected

Identifies different threats

Identifies different security threats and discusses the behavior of information systems before and after security threats

Identify different threats and discuss the behavior of information systems before and after security threats and applies different techniques in inspection.

5.3.4 Mechanisms to protect information systems are properly implemented

Applies different security measures

Applies different security measures, and identifies strong and weak security measures

Applies different security measures, identifies strong and weak security measures and discusses the effects of applying weak security measures in information system

290

Page 291: New Ict Curriculum (All Levels)

NTA LEVEL 8

12.0 MODULES DESCRIPTION

CODE: BDIT 811

NAME: DISTRIBUTED SYSTEMS MANAGEMENTNUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES:

1.1.1 Apply the concept of distributed systems1.1.2 Identify the examples of distributed systems1.1.3 Discuss the pros and cons of distributed systems1.2.1 Explain the concept of systems autonomy in distributed systems1.2.2 Describe distributed computing and programming concepts1.2.3 Discuss design issues with distributed systems1.2.4 Describe models of distributed systems1.2.5 Explain inter-process communication in distributed systems1.3.1 Explain replication and the reasons for replication1.3.2 Apply consistency models1.3.3 Analyze distributed systems implementation models1.4.1 Explain the concept of distributed file systems1.4.2 Describe file service types in distributed systems1.4.3 Discuss and classify issues in distributed file systems1.5.1 Describe faults, errors and failures1.5.2 Classify faults1.5.3 Explain failure models in distributed systems1.5.4 Apply hardware reliability models1.5.5 Apply recovery mechanisms

291

Page 292: New Ict Curriculum (All Levels)

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION

This module will be conducted through class lectures, demonstrations and practical work in the computer laboratory under close supervision of

the lecture.

REFERENCES;

1. Blair, G.S., F. Costa, G. Coulson, H. Duran, et al, (2005), “The Design of a Resource-Aware Reflective Middleware Architecture”, Proceedings

of the 2nd International Conference on Meta-Level Architectures and Reflection, St.-Malo, Springer-Verlag, France.

2. Coulouris, G. et al , (2000), Distributed Systems : Concepts and Design, Third Edition, 2000, Books News Inc, USA

3. George Coulouris, Jean Dollimore and Tim Kindberg, (2000), Distributed Systems: Concepts and Design, Addison Wesley, USA

4. Mullender, S (2009), Distributed Systems, 2nd Edition, Longman Group United Kingdom, UK

5. Tanenbaum, A & Martin, V (2007); Distributed Systems- Principles and Paradigms; 2nd Edition, Pearson Prentice Hall, New Delhi, India

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60%

292

Page 293: New Ict Curriculum (All Levels)

CODE: BDIT 812

NAME: WEB PROGRAMMING

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES

2.1.1 Apply web technology concepts in web design

2.1.2 Apply web development tools in web design

2.1.3 Discuss the standardization process of websites

2.2.1 Apply the concept of website management

2.2.2 Apply access control mechanisms

2.2.3 Manage users of websites

2.2.4 Analyze management of website contents

2.2.5 Manage website updates

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION

This module will be conducted through class lectures, tutorials, demonstrations and practical work in the computer laboratory under close

supervision of the lecture.

293

Page 294: New Ict Curriculum (All Levels)

REFERENCES;

1. Jackson, J (2006), Web Technologies: A Computer Science Perspective. Prentice Hall, New Delhi, India.

2. O'Reilly, T and John, B (2004), Opening Welcome: State of the Internet Industry. In San Francisco, California, USA

3. Paul, G andShriram, K (2001), “Programming the Web with High-Level Programming Languages”. Proceedings of ESOP 2001. India.

4. Scott, Dand Sharp, R (2002); Abstracting application-level Web security. In Proceedingsof 11th ACM International World Wide Web

Conference, Hawaii,USA,

5. Sebesta, R (2007), Programming the World Wide Web (4th Edition). Addison Wesley, McGraw-Hill Co, USA.

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60

294

Page 295: New Ict Curriculum (All Levels)

CODE: BDIT 813

NAME: SOFTWARE ENGINEERING

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES:

3.1.1 Apply software development tools

3.1.2 Apply various software development models

3.1.3 Apply the steps in the requirement analysis process

3.1.4 Design software information systems

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION

This module will be conducted through lectures, tutorials, practical work in the computer laboratory under close supervision of the lecture and

fields during vacations.

295

Page 296: New Ict Curriculum (All Levels)

REFERENCES;

1. Carlo, G; Jazayeri, M and Mandrioli, D (2003), Fundamentals of Software Engineering, 2nd International Edition, Pearson Education, Prentice-

Hall, United Kingdom.

2. Lauesen, R.S ((2005), Software requirements: Styles and Techniques , 4th Edition, Addison-Wesley Pub Co. USA

3. Pressman, R. S (2005). Software Engineering: A Practitioner's Approach , 6th edition, Boston, Mass: McGraw-Hill, USA

4. Roger, P.S (2009), Software Engineering –A practitioner’s Approach, 5th edition, Pearson Publishing Co. LTD, UK.

5. Sommerville, I (2007) , Software Engineering,8th Edition , Pearson Education, Harlow, England

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60%

296

Page 297: New Ict Curriculum (All Levels)

CODE: BDIT 814

NAME: OBJECT ORIENTED DATABASE MANAGEMENT SYSTEMS

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES:

3.2.1 Apply object oriented techniques in software development3.2.2 Apply agile software techniques to develop software3.2.3 Apply object oriented concepts using UML to describe software development processes3.3.1 Apply object oriented analysis and design with UML3.3.2 Discuss object oriented programming with JAVA5.4.1 Describe object and classes of software systems5.4.2 Explain inheritance, polymorphism and message passing 5.4.3 Describe UML diagrams in software development5.4.4 Apply objects and classes in preparing class diagrams3.5.1 Apply concept of Object Oriented Database Management System3.5.2 Design Object Oriented Database Management Systems

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION

This module will be conducted through class lectures, tutorials, and practical work in the computer laboratory under close supervision of the

lecture or tutorial assistants.

297

Page 298: New Ict Curriculum (All Levels)

REFERENCES;

1. Ambler, S. W (2004). The Object Primer: Agile Model Driven Development with UML 2. Cambridge University Press, UK

2. Booch, G, et al(2000) OMG Unified Modeling Language Specification, Version 1.3 First Edition Pearson Co. UK

3. Elmasri, R&Navathe, S.B (2000), Fundamentals of Database Systems (3rd Edition), Addison-Wesley, USA

4. Jacobson, I, Grady B &James Rumbaugh (2000). The Unified Software Development Process. Addison-Wesley New Jersey, USA.

5. Penker, M and Hans-Erik E (2000), Business Modeling with UML, John Wiley & Son, USA.

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60%

298

Page 299: New Ict Curriculum (All Levels)

CODE: BDIT 821

NAME: E-BUSINESS

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES:

4.1.1 Analyze current business e-applications

4.1.2 Identify business e-applications needs

4.1.3 Explain different information systems

4.1.4 Apply various e-business applications in contemporary business settings.

4.1.5 Discuss the advantages and disadvantages of e-applications.

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION

This module will be conducted through class lectures, case studies, tutorials and practical work in the computer laboratory under close

supervision of the lecture.

299

Page 300: New Ict Curriculum (All Levels)

REFERENCES;

1. Eastlake, D. E (2010), 3rd and T. Goldstein. ECML v1.1: Field specifications forE-commerce, London School of Business, UK

2. Kalakota, R & Robinson, M (2000), E-Business 2.0: Roadmap for Success, 2nd Edition, Addison-Wesley professional; UK

3. Lynda M. A (2002), Excerpts from the E-business Handbook, The St. Lucie Press, Fair Association, Inc, USA

4. Minoli, D and Minoli, E (2008) Web Commerce Technology Handbook, TataMcGraw-Hill, New Delhi, India.

5. Rosen, A (2000), The E-commerce Question and Answer Book, American Management Association, USA.

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60%

300

Page 301: New Ict Curriculum (All Levels)

CODE: BDIT 822

NAME:MANAGEMENT INFORMATION SYSTEMS

NUMBER OF CREDITS: 30

SUB-ENABLING OUTCOMES:

4.2.1 Analyze current business situations

4.2.2 Identify business information needs

4.2.3 Explain different information systems

4.3.1 Explain the principles of MIS in making decisions

4.3.2 Apply various information systems in business

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

METHODS OF INSTRUCTION:

This module will be conducted through class lectures, field tours and practical work in the computer laboratory under close supervision of the

lecture.

301

Page 302: New Ict Curriculum (All Levels)

REFERENCES:

1. Davis,G.B (2006), The Blackwell Encyclopedia of Management, Management Information Systems (Blackwell Encyclopedia of Management)

Volume 7, Wiley-Blackwell, United Kingdom

2. Effy, O (2008), management Information Systems, Sixth Edition, Course Technology, McGraw-Hill ,USA.

3. Jessup, Leonard M.; Joseph S. Valacich (2008), Information Systems Today, 3rd Edition, Pearson Publishing Co, United Kingdom.

4. O’Brien, J (2009), Management Information Systems – Managing Information Technology in the Internetworked Enterprise,( 7th Edition ),

Boston: Irwin McGraw-Hill, USA

5. O’Brien, J.A., &George M.M (2008). Management Information Systems, 8th Edition. New York: McGraw-Hill, USA.

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60%

302

Page 303: New Ict Curriculum (All Levels)

CODE: BDIT 823

NAME: INFORMATION TECHNOLOGY SECURITY MANAGEMENT

NUMBER OF CREDITS: 15

SUB-ENABLING OUTCOMES:

5.1.1 Discuss common security threats

5.1.2 Explain different types of security threats

5.1.3 Assess the effects of security threats

5.2.1 Apply various security technologies

5.2.2 Identify security resources for safeguarding information systems

5.3.1 Explain the role of data in an organization

5.3.2 Describe different information assets

5.3.3 Inspect information systems for security threats

5.3.4 Implement mechanisms to protect information systems from security threats

TEACHING AIDS:

Chalk board, Overhead projectors, Flip chart stand and power points.

303

Page 304: New Ict Curriculum (All Levels)

METHODS OF INSTRUCTION

This module will be conducted through class lectures, tutorials, observations and practical work in the computer laboratory under close

supervision of the lecture.

REFERENCES;

1. Mansour, O &Ghazawneh, A. (2009) Research in Information Systems: Implications of the constant changing nature of IT capabilities in the

social computing era, Molde University College, Molde, Norway.

2. Schechter, S.E (2004). Computer security strength and risk: a quantitative approach, Ph.D. thesis, Harvard University

3. Stallings (2001), Network Security Essentials, Pearson Education Asia, New Delhi

4. Varian. H System reliability and free riding. In Economics of Information Security. J. Camp, S. Lewis, eds. (Kluwer Academic Publishers, 2004),

vol. 12 of Advancesin Information Security, UK.

5. Varian, H (2000), Managing online security risks; In the New York Times, New York, USA.

INTEGRATED METHOD OF ASSESSMENT

Continuous assessment – 40%

End of Semester exams – 60%

304