Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
BAC Computing and Information Systems Department Programmes Handbook SCIS 3312020
1
Contents 1 Welcome note from Course Director 3
2 Vision and Mission 4
3 Introduction 4
31 School of Computing and Information Systems 4
32 Aims and Objectives 5
33 Career Prospects 5
4 Academic Information 5
41 Graduate Profiles 5
411 Applied Business Computing 5
412 Computer Systems Engineering 5
413 Mobile and Web Technologies 6
414 Business Intelligence and Data Analytics 6
415 Network Systems Engineering 6
416 Information and Communication Technology 6
42 Programme Structure 7
421 Module Synopsis 10
422 Duration and Mode of Study 25
423 Registration and Course Enrollment 25
43 Grades 25
431 Publication 25
432 Statement of Results 25
433 Result Decisions ndash Interpretations 25
434 Supplements 27
5 Assessments 27
51 General 27
52 Assignments and Projects 27
53 Assessment Examinations 27
54 Final Examinations 27
55 Submission Procedure for Coursework 28
56 Late Submission 28
57 Examination Regulations 28
58 Examination Timetables 28
2
59 Absence from Examinations 29
510 Repeating Modules 29
511 Results Publication 29
512 Transcripts 29
513 Request for reassessment 30
514 Mitigation 30
6 Progression 30
61 30
62 Year 1 2 and 3 Progression 30
63 Year 3 to Year 4 31
7 Attendance requirements 31
8 Policy on Cheating and Plagiarism 31
81 Plagiarism 31
82 Cheating 32
83 Repercussions and Consequences 33
9 ICT Resources 34
10 Complaints Procedure 34
3
1 Welcome note from Course Director
Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc
This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile
The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium
Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you
Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes
Make your years of study in BAC worthwhile
Galamoyo Male ndash Academic Director School of Computing and Information Systems
4
2 Vision and Mission
VISION
ldquoTo become the leader in ICT knowledge creation and dissemination in the region
and beyondrdquo
MISSION
The SCIS strives for excellence in creating applying and imparting knowledge in
Computing and Information Systems through comprehensive educational
programmes research in collaboration with industry and government and service to
the community
3 Introduction
31 School of Computing and Information Systems
The School of Computing and Information Systems seeks to educate graduates that will
be both productive and creative in modern business and industry environments Studies
range from theory through experimental techniques to Engineering methodology
Research and laboratory work complement student classroom studies This 4-year twin
program prepares students to operate as professionals at the cutting edge of Information
Technology
The field of computer science can trace its foundation to both mathematics and
engineering methodology with the emphasis on practical experience Using this
philosophy the School of Computing and Information Systems has designed a unique
curricular model that seeks to provide an increased relevance to the real world The Project
in particular expands upon the experimental and design approach by introducing students
to the creativity and productivity concerns required for business and industrial
development
The program offers majors in Computer Systems Engineering Applied Business
Computing Mobile Technologies Business Intelligence Network Computing and
Information Communication Technology BAC runs the first three years of the
programmes and the fourth year is delivered in collaboration with University of Sunderland
(UK) which confers awards of the same
5
32 Aims and Objectives
The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-
1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and
adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business
33 Career Prospects
Graduates will fit in industry business and research as
bull Computer Programmers
bull Research scientists
bull Software developers and consultants
bull Systems analysts or administrators
bull IT or Project managers
bull Entrepreneurs
bull Business analysts
4 Academic Information
41 Graduate Profiles
411 Applied Business Computing
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using NET platform
bull Advise business on IT technologies and solutions that can drive their strategy
bull Participate in project teams on IT departments or specialist IT companies
bull Startup entrepreneurships that support large IT companies and serve SMEs
412 Computer Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using Java platform
bull Administer systems in businesses of any size
bull Participate in project teams on IT departments or specialist IT companies
bull Startup techno-preneurships that support large IT companies and serve SMEs
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
1
Contents 1 Welcome note from Course Director 3
2 Vision and Mission 4
3 Introduction 4
31 School of Computing and Information Systems 4
32 Aims and Objectives 5
33 Career Prospects 5
4 Academic Information 5
41 Graduate Profiles 5
411 Applied Business Computing 5
412 Computer Systems Engineering 5
413 Mobile and Web Technologies 6
414 Business Intelligence and Data Analytics 6
415 Network Systems Engineering 6
416 Information and Communication Technology 6
42 Programme Structure 7
421 Module Synopsis 10
422 Duration and Mode of Study 25
423 Registration and Course Enrollment 25
43 Grades 25
431 Publication 25
432 Statement of Results 25
433 Result Decisions ndash Interpretations 25
434 Supplements 27
5 Assessments 27
51 General 27
52 Assignments and Projects 27
53 Assessment Examinations 27
54 Final Examinations 27
55 Submission Procedure for Coursework 28
56 Late Submission 28
57 Examination Regulations 28
58 Examination Timetables 28
2
59 Absence from Examinations 29
510 Repeating Modules 29
511 Results Publication 29
512 Transcripts 29
513 Request for reassessment 30
514 Mitigation 30
6 Progression 30
61 30
62 Year 1 2 and 3 Progression 30
63 Year 3 to Year 4 31
7 Attendance requirements 31
8 Policy on Cheating and Plagiarism 31
81 Plagiarism 31
82 Cheating 32
83 Repercussions and Consequences 33
9 ICT Resources 34
10 Complaints Procedure 34
3
1 Welcome note from Course Director
Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc
This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile
The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium
Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you
Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes
Make your years of study in BAC worthwhile
Galamoyo Male ndash Academic Director School of Computing and Information Systems
4
2 Vision and Mission
VISION
ldquoTo become the leader in ICT knowledge creation and dissemination in the region
and beyondrdquo
MISSION
The SCIS strives for excellence in creating applying and imparting knowledge in
Computing and Information Systems through comprehensive educational
programmes research in collaboration with industry and government and service to
the community
3 Introduction
31 School of Computing and Information Systems
The School of Computing and Information Systems seeks to educate graduates that will
be both productive and creative in modern business and industry environments Studies
range from theory through experimental techniques to Engineering methodology
Research and laboratory work complement student classroom studies This 4-year twin
program prepares students to operate as professionals at the cutting edge of Information
Technology
The field of computer science can trace its foundation to both mathematics and
engineering methodology with the emphasis on practical experience Using this
philosophy the School of Computing and Information Systems has designed a unique
curricular model that seeks to provide an increased relevance to the real world The Project
in particular expands upon the experimental and design approach by introducing students
to the creativity and productivity concerns required for business and industrial
development
The program offers majors in Computer Systems Engineering Applied Business
Computing Mobile Technologies Business Intelligence Network Computing and
Information Communication Technology BAC runs the first three years of the
programmes and the fourth year is delivered in collaboration with University of Sunderland
(UK) which confers awards of the same
5
32 Aims and Objectives
The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-
1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and
adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business
33 Career Prospects
Graduates will fit in industry business and research as
bull Computer Programmers
bull Research scientists
bull Software developers and consultants
bull Systems analysts or administrators
bull IT or Project managers
bull Entrepreneurs
bull Business analysts
4 Academic Information
41 Graduate Profiles
411 Applied Business Computing
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using NET platform
bull Advise business on IT technologies and solutions that can drive their strategy
bull Participate in project teams on IT departments or specialist IT companies
bull Startup entrepreneurships that support large IT companies and serve SMEs
412 Computer Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using Java platform
bull Administer systems in businesses of any size
bull Participate in project teams on IT departments or specialist IT companies
bull Startup techno-preneurships that support large IT companies and serve SMEs
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
2
59 Absence from Examinations 29
510 Repeating Modules 29
511 Results Publication 29
512 Transcripts 29
513 Request for reassessment 30
514 Mitigation 30
6 Progression 30
61 30
62 Year 1 2 and 3 Progression 30
63 Year 3 to Year 4 31
7 Attendance requirements 31
8 Policy on Cheating and Plagiarism 31
81 Plagiarism 31
82 Cheating 32
83 Repercussions and Consequences 33
9 ICT Resources 34
10 Complaints Procedure 34
3
1 Welcome note from Course Director
Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc
This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile
The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium
Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you
Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes
Make your years of study in BAC worthwhile
Galamoyo Male ndash Academic Director School of Computing and Information Systems
4
2 Vision and Mission
VISION
ldquoTo become the leader in ICT knowledge creation and dissemination in the region
and beyondrdquo
MISSION
The SCIS strives for excellence in creating applying and imparting knowledge in
Computing and Information Systems through comprehensive educational
programmes research in collaboration with industry and government and service to
the community
3 Introduction
31 School of Computing and Information Systems
The School of Computing and Information Systems seeks to educate graduates that will
be both productive and creative in modern business and industry environments Studies
range from theory through experimental techniques to Engineering methodology
Research and laboratory work complement student classroom studies This 4-year twin
program prepares students to operate as professionals at the cutting edge of Information
Technology
The field of computer science can trace its foundation to both mathematics and
engineering methodology with the emphasis on practical experience Using this
philosophy the School of Computing and Information Systems has designed a unique
curricular model that seeks to provide an increased relevance to the real world The Project
in particular expands upon the experimental and design approach by introducing students
to the creativity and productivity concerns required for business and industrial
development
The program offers majors in Computer Systems Engineering Applied Business
Computing Mobile Technologies Business Intelligence Network Computing and
Information Communication Technology BAC runs the first three years of the
programmes and the fourth year is delivered in collaboration with University of Sunderland
(UK) which confers awards of the same
5
32 Aims and Objectives
The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-
1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and
adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business
33 Career Prospects
Graduates will fit in industry business and research as
bull Computer Programmers
bull Research scientists
bull Software developers and consultants
bull Systems analysts or administrators
bull IT or Project managers
bull Entrepreneurs
bull Business analysts
4 Academic Information
41 Graduate Profiles
411 Applied Business Computing
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using NET platform
bull Advise business on IT technologies and solutions that can drive their strategy
bull Participate in project teams on IT departments or specialist IT companies
bull Startup entrepreneurships that support large IT companies and serve SMEs
412 Computer Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using Java platform
bull Administer systems in businesses of any size
bull Participate in project teams on IT departments or specialist IT companies
bull Startup techno-preneurships that support large IT companies and serve SMEs
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
3
1 Welcome note from Course Director
Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc
This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile
The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium
Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you
Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes
Make your years of study in BAC worthwhile
Galamoyo Male ndash Academic Director School of Computing and Information Systems
4
2 Vision and Mission
VISION
ldquoTo become the leader in ICT knowledge creation and dissemination in the region
and beyondrdquo
MISSION
The SCIS strives for excellence in creating applying and imparting knowledge in
Computing and Information Systems through comprehensive educational
programmes research in collaboration with industry and government and service to
the community
3 Introduction
31 School of Computing and Information Systems
The School of Computing and Information Systems seeks to educate graduates that will
be both productive and creative in modern business and industry environments Studies
range from theory through experimental techniques to Engineering methodology
Research and laboratory work complement student classroom studies This 4-year twin
program prepares students to operate as professionals at the cutting edge of Information
Technology
The field of computer science can trace its foundation to both mathematics and
engineering methodology with the emphasis on practical experience Using this
philosophy the School of Computing and Information Systems has designed a unique
curricular model that seeks to provide an increased relevance to the real world The Project
in particular expands upon the experimental and design approach by introducing students
to the creativity and productivity concerns required for business and industrial
development
The program offers majors in Computer Systems Engineering Applied Business
Computing Mobile Technologies Business Intelligence Network Computing and
Information Communication Technology BAC runs the first three years of the
programmes and the fourth year is delivered in collaboration with University of Sunderland
(UK) which confers awards of the same
5
32 Aims and Objectives
The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-
1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and
adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business
33 Career Prospects
Graduates will fit in industry business and research as
bull Computer Programmers
bull Research scientists
bull Software developers and consultants
bull Systems analysts or administrators
bull IT or Project managers
bull Entrepreneurs
bull Business analysts
4 Academic Information
41 Graduate Profiles
411 Applied Business Computing
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using NET platform
bull Advise business on IT technologies and solutions that can drive their strategy
bull Participate in project teams on IT departments or specialist IT companies
bull Startup entrepreneurships that support large IT companies and serve SMEs
412 Computer Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using Java platform
bull Administer systems in businesses of any size
bull Participate in project teams on IT departments or specialist IT companies
bull Startup techno-preneurships that support large IT companies and serve SMEs
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
4
2 Vision and Mission
VISION
ldquoTo become the leader in ICT knowledge creation and dissemination in the region
and beyondrdquo
MISSION
The SCIS strives for excellence in creating applying and imparting knowledge in
Computing and Information Systems through comprehensive educational
programmes research in collaboration with industry and government and service to
the community
3 Introduction
31 School of Computing and Information Systems
The School of Computing and Information Systems seeks to educate graduates that will
be both productive and creative in modern business and industry environments Studies
range from theory through experimental techniques to Engineering methodology
Research and laboratory work complement student classroom studies This 4-year twin
program prepares students to operate as professionals at the cutting edge of Information
Technology
The field of computer science can trace its foundation to both mathematics and
engineering methodology with the emphasis on practical experience Using this
philosophy the School of Computing and Information Systems has designed a unique
curricular model that seeks to provide an increased relevance to the real world The Project
in particular expands upon the experimental and design approach by introducing students
to the creativity and productivity concerns required for business and industrial
development
The program offers majors in Computer Systems Engineering Applied Business
Computing Mobile Technologies Business Intelligence Network Computing and
Information Communication Technology BAC runs the first three years of the
programmes and the fourth year is delivered in collaboration with University of Sunderland
(UK) which confers awards of the same
5
32 Aims and Objectives
The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-
1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and
adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business
33 Career Prospects
Graduates will fit in industry business and research as
bull Computer Programmers
bull Research scientists
bull Software developers and consultants
bull Systems analysts or administrators
bull IT or Project managers
bull Entrepreneurs
bull Business analysts
4 Academic Information
41 Graduate Profiles
411 Applied Business Computing
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using NET platform
bull Advise business on IT technologies and solutions that can drive their strategy
bull Participate in project teams on IT departments or specialist IT companies
bull Startup entrepreneurships that support large IT companies and serve SMEs
412 Computer Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using Java platform
bull Administer systems in businesses of any size
bull Participate in project teams on IT departments or specialist IT companies
bull Startup techno-preneurships that support large IT companies and serve SMEs
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
5
32 Aims and Objectives
The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-
1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and
adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business
33 Career Prospects
Graduates will fit in industry business and research as
bull Computer Programmers
bull Research scientists
bull Software developers and consultants
bull Systems analysts or administrators
bull IT or Project managers
bull Entrepreneurs
bull Business analysts
4 Academic Information
41 Graduate Profiles
411 Applied Business Computing
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using NET platform
bull Advise business on IT technologies and solutions that can drive their strategy
bull Participate in project teams on IT departments or specialist IT companies
bull Startup entrepreneurships that support large IT companies and serve SMEs
412 Computer Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Analyze and develop solutions for business using Java platform
bull Administer systems in businesses of any size
bull Participate in project teams on IT departments or specialist IT companies
bull Startup techno-preneurships that support large IT companies and serve SMEs
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
6
413 Mobile and Web Technologies
To produce a graduate that is equipped with the skills required to
bull Design and implement mobile solutions
bull Support and evaluate mobile technology applications
bull Advise and use mobile solutions for the enterprise customer
bull Design and administer mobile security solutions
bull Startup techno-preneurships that support and serve SMEs
414 Business Intelligence and Data Analytics
To produce a graduate that is equipped with the skills required to
bull Develop databases and data warehouses
bull Apply data mining technologies
bull Use data mining to predict the future to support decision making
415 Network Systems Engineering
To produce a graduate that is equipped with the skills required to
bull Conceptualize design and deploy networks on any scale
bull Configure and administer networks
416 Information and Communication Technology
To produce a graduate that is equipped with the skills required to
bull Implement manage and support of ICT systems
bull Implement manage and support security and digital etiquette in ICT systems
bull ICT consultancy
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
7
42 Programme Structure
Programmes will be offered according to the schedule that follows Some modules
require prerequisites as shown on the programme structure
Computer Systems Engineering Applied Business Computing Year 1 Semester 1
Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology
Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance
Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce
Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development
Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development
Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation
Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation
Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration
Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration
Year 3 Semester 2 Attachment
Year 3 Semester 2 Attachment
Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development
Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy
Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence
Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
8
Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1
Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies
Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development
Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development
Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application
Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming
Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project
Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project
Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security
Year 3 Semester 1 Intelligent Systems Business Management R Programming
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Android Mobile Development User Experience Design Research
Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research
Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS
Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
9
Network Systems Engineering Information Communication Technology
Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology
Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology
Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance
Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance
Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking
Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks
Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project
Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security
Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration
Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics
Year 3 Semester 2 Industry Attachment
Year 3 Semester 2 Industry Attachment
Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking
Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making
Year 4 Semester 2 Product Development Telecommunications Advanced Routing
Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
10
421 Module Synopsis
Computer Technology (CT) The module aims to provide students with a clear understanding of the various
technologies and the potential role that these can play in making businesses more
effective and successful Students will have an in-depth business-oriented view of
hardware software and data communications together with emerging mobile and
internet-based technologies The module covers basic computer applications
operating systems data storage and retrieval networks internet multimedia
software engineering database systems mobile computing and communications
Practically students will work on Microsoft Office Applications and Managing files in
the Windows Environment
Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in
real world businesses The module seeks to develop quantitative critical thinking
skills relevant to decision making It deals with data collection analysis calculating
mean mode and use or probability in decision making Number systems computer
arithmetic measures of central tendency frequency and dispersion are covered as
part of the content
Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions
Software program basics Data storage maintenance and manipulation Object
oriented Programming concept Systems development planning Systems Design
Systems Testing amp Maintenance
Web and Multimedia Development (WMD)
This module will provide a detailed insight into the practical and theoretical
aspects of modern web page design amp development technologies The theoretical
side will cover such issues as emerging web techniques amp technologies and the
motivation behind such The practical side will give students hands-on experience
of developing Web pages using these techniques amp technologies Current ideas
on web page design Document Object Model (DOM) Document Type Definitions
(DTD) web page construction using authoring tools such as Dreamweaver HTML
coding Cascading Style Sheets XML external amp internal page validation
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
11
Java This module takes students through the syntax of the Java programming language
object-oriented programming with the Java programming language creating
graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and
networking Object oriented features such as classes inheritance and
polymorphism are also covered An overview of fundamental programming
concepts using Java as well as data aggregates data structures (eg linked lists
stacks queues trees and graphs) and an introduction to the analysis of algorithms
that operate on those data structures are also covered
Visual Basic (VB) Variables operators and expressions control structures are introduced Simple
functions input and output and classes along with objects are implemented After
completing this course students will be able to Describe the purpose of the NET
Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010
to build NET Framework applications Describe the syntax of basic Visual Basic
programming constructs Describe how to catch handle and throw exceptions
Describe how to perform basic file IO operations in a Visual Basic application
Describe how to create and use new types (enumerations classes and structures)
and explain the differences
Computer Systems installation amp Maintenance (CSIM)
This module attempts to impart knowledge and skills to students in the following
areas adding and removing Field Replaceable Units from desktops and Portables
installation and configuration of peripheral devices performing preventive
maintenance and basic troubleshooting on common hardware software and
network faults configuring and servicing printers setting up configuring and tuning
simple LANs installing upgrading and troubleshooting operating systems
Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology
infrastructure that supports it ie Internet and the World Wide Web business
strategies for ecommerce marketing on the web shift from electronic data
interchange to ecommerce virtual communities web portals online auctions as
well as legal ethical and tax issues in ecommerce Also included are web server
hardware and software ecommerce software ecommerce security and electronic
payment systems
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
12
Business Process Analysis (BPA)
Introduction to business processes introduction to business process modelling
tools the art of Business processes modelling analyzing business processes
business process improvement
Fundamentals of Business Intelligence (FBI)
Introduction to Business Intelligence Introduction to Databases and Data
Warehousing Reporting and Report Design Business Performance Management
Data Mining for Business Intelligence Data Mining Methods and Applications
Emerging trends in BI legal and ethical matters related to business intelligence
Computer Programming (CP)
Language Fundamentals Methods Subroutines logic control structures data
structures Basic input and Graphics Objects and Classes building a User driven
Application Testing and Debugging
Introduction to Mobile Technologies (IMT)
Overview of Mobile Technologies Network operators amp services Mobile Networks
Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation
systems Basic device configuration amp management Device troubleshooting
Pervasive computing Implementing a mobile technology
Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone
development environmenttools Windows Mobile development environmenttools
other development environments (Blackberry Symbian etc) Basic mobile
Application
Fundamentals of Networking (FN)
Introduction to networks and networking concepts network design networking
media network interface cards OSI reference model number systems error
detection and control network communications and protocols channel access
methods network administration and support and solving network problems
Routing amp Switching Fundamentals (RSF)
IPV6 IPV4 addressing network address translation VLANS routing algorithms
LAN Switching and segmentation spanning trees protocols and network security
issues Network configuration and network simulation
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
13
Object Orientated Analysis amp Development (OOAD)
Students will develop skills and knowledge in object-oriented methodologies
analysis and design modelling using UML tools These skills will be acquired
through the use of lectures and lab sessions where UML tools will be used to
implement these concepts Applications of these skills will be demonstrated using
examples in JAVA (CSE) and VB (ABC) programming languages Using case
studies and tutorials students will develop analytical skills in object-oriented
programming which they can apply to suitable projects and systems development
The course gives students a thorough grounding in the key concepts of Object-
Oriented Programming techniques methods and Systems analysis and design
using UML tools Each programme will enhance and utilise Java and Visual basic
Database Design and Development (DDD)
The module seeks to provide the students with the necessary knowledge and skills
to understand the principles and practice of database systems development Topics
covered include database models conceptual data modeling ndash entities ERDs
introduction to SQL-create select insert statements stored procedures triggers
and functions database integration normalization and transaction management
and support Students will be expected to produce detailed data models and
requirements for a typical database application
Object Oriented Programming using C (C)
The goal of this course is to provide students with the knowledge and skills they
need to develop C applications for the Microsoftreg NET Platform The course
focuses on C program structure language syntax and implementation details
Content to be covered includes syntactical features of the C object-oriented
design with encapsulation inheritance and polymorphism advanced techniques
such as interfaces delegates and events effective development of GUI-based
applications and study of class libraries
Information Security (INFOSEC)
This module looks at how security professionals develop the overall security
program necessary to protect data and react to threats as they occur Various IT
security threats are covered and the foundation of the overall security program
needed to combat these threats In addition the administrative processes
necessary to execute an information security program a discovery into the various
ways network technologies can be subverted to allow users to steal data while in
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
14
transit is also covered UNIX and Windows systems and how they must be
protected to secure data are included Areas covered include threats to IT assets
encryption fundamentals of network security intrusion detection fundamentals of
system security Windows system security Standards and compliance and security
testing
Distributed Systems (DS)
The module assumes the knowledge of Communication Networks It introduces
types of distributed systems Communication protocols RPC ROI and
Synchronization Transaction concepts Threads Servers Distributed systems
Consistency models and security management will form the core of this module
Discrete Mathematics (DM)
This module aims to prepare students for abstract reasoning using a range of
mathematical techniques such as set theory predicate logic functions and
relations and prepares students to appropriately specify software system
requirements with minimum ambiguity Contents include Logic representation of
simple verbal arguments truth-tables logic gates logical equivalence
Representation using Venn diagrams resolution proof method logic circuits and
Karnaugh maps Relations representations of relations equivalence relations
Quantitative Analysis for Business (QAB)
To make decisions one needs to have access to information Business information
is often numbers and statistics The quantitative analysis for business module
enables one to make good decisions and to organize and understand numbers
Areas covered include types of data and different collection methods data
representation probability sampling normal and t distributions analysis of
variance correlation and regression analysis and time series analysis
Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems
executives from an administrative mindset to a strategic mindset a mindset that will
enable them to build more responsive Information Systems organizations and to
place the IS department right at the center of corporate strategy Its focus is on the
importance of ethics how to deal with ethical conflicts basis for corporate
governance and corporate social responsibility Best practices in corporate
governance are covered in depth
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
15
Research amp Innovation (RI)
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Introduction to Data Analytics (IDA)
Module covers collecting and analysing data Graphical representation of data
Measures of location and dispersion Probability Distribution of random variables
Sampling distributions and estimation Interval estimation Hypothesis testing
Correlation and Regression Analysis of Variance amp experimental design Chi-
square test Time series analysis
Decision Support Systems (DSS)
Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle
Phases of the decision making process DSS architecture data management
subsystem (data extraction preparing and staging) model management
subsystem (Linear programming regression decision trees AI expert systems
data mining sensitivity analysis) dialogue subsystem (usability interaction
modalities Intelligent user interface)
In-Memory Computing
Desirability feasibility and viability of In-memory computing Information in real
time Impact of recent hardware trends current enterprise applications in-memory
enterprise database systems targeting multi-cores and main memory
understanding memory hierarchies parallel data processing using multi-cores
compression for speed and memory consumption designing an in-memory
database system Optimizing Data layout (Colum Row Hybrid) Organizing and
accessing data SQL for in-memory data access efficient retrieval of business
objects enabling analytics on transactional data In-memory application
development model ndash moving business logic into the database
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
16
Strategic Management
Steps in strategy formulation external and internal environment analysis BCG
matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic
risk management Benchmarking decision making strategy implementation
change management Business Intelligence roadmap
Data Warehousing (DW)
Introduce to Data warehousing and data mining architecture design and
development Multi-dimensional model star schemas fact tables dimensions
Data warehouse physical design Data warehouse construction OLAP techniques
for Data warehouse intelligent systems techniques for data warehousing support
for data warehouses applications and trends in data warehousing
Mobile Application Development (MAD I)
Mobile development life cycle Application design amp architecture Application APIs
Frameworks
Mobile Commerce (MC)
Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational
Readiness Mobile Business Products amp services Overview Mobile Marketing amp
advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal
considerations
Computer Networks (CN)
Introduction to Networks and Networking Concepts Network Design Essentials
Networking Media Network Interface Cards OSI Reference model Number
systems error detection and control Network Communications and Protocols
Channel access Methods Network administration and support Solving Network
Problems
Mobile Application Development (MAD II)
Application data sources development App installationdeployment Mobile
application testing App store submission Fundamental AI for Games
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
17
Cross Platform Development for Mobile Applications (CPDMA)
Principles of operability Platforms comparison App formatting issues Best Cross
platform tools Best practices Cross platform implementation Compatibility
Testing
Data Centre Networking (DCN)
Enterprise data center design fundamentals technology trends and challenges
facing the data center general data center architecture components software-
defined networks (SDNs) architecture and design considerations This module also
provides an overview of virtualization discusses the various virtualization
technologies and network virtualization design considerations
Wireless Networking (WN)
In this module fundamental aspects of wireless networks with emphasis on current
and next-generation wireless networks will be explored Various aspects of wireless
networking will be covered including fundamentals of cellular communication
mobile radio propagation multiple access techniques mobility support channel
allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks
wireless sensor networks and routing in wireless and mobile networks The goal of
this course is to introduce the students to state-of-the-art wireless network protocols
and architectures We will also look at industry trends and discuss some innovative
ideas that have recently been developed Some of the course material will be drawn
from research papers industry white papers and Internet RFCs
Network Architecture Design (NAD)
The module covers areas of Network Architecture Design that include a hierarchical
network for a small business recommendations for designing a network that is
scalable type of switches and routers available for small-to-medium-sized business
networks The module also covers configuration and verification of basic settings
on a Cisco IOS device The module extensively covers the concepts of STP and
FHRP used to cater for redundancy with no logical loops
Advanced Website Development (AWD)
The module aims to equip students on how to build dynamic Web applications using
industry standard server side and client technologies It focuses on advanced
server scripting managing web projects web security and database design It also
covers the techniques and concepts needed to build efficient full-featured state-of-
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
18
the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or
Microsoft Net Web services A variety of alternative delivery platforms including
mobile phones and other portable devices are explored Upon completion leaners
will have an essential combination of a front-end scripting language a back-end
programming language skills needed by Web Development Professionals
Intelligent Systems
This course provides an overview and introduction to the field of Artificial
Intelligence Notions of rational behavior and intelligent agents will be discussed
The course also introduces the concepts and methodologies of Intelligent Systems
and provides the learner with most essential application development skills in
the Artificial Intelligence paradigm The emphasis will be on understanding the
fundamental concepts as well as being able to practically apply the corresponding
approaches in solving practical problems and developing useful software
applications Data mining and machine learning concepts are also introduced An
introduction to Artificial Intelligence Programming using Prolog will be provided to
help students with the programming part of the course
Business Information Systems (BIS)
The module covers systems theory explores various enterprise information
systems It gives the basics of decision support and the role business intelligence
in the knowledge driven economies of today Project management process steps
methodologies and tool are considered It gives a student an opportunity to review
the evolution and development of Web 20 and 30 technologies that are being
integrated into enterprise information systems This module is aimed at changing
the mind set of future information systems executives from an administrative
mindset to a strategic mindset a mindset that will enable them to build more
responsive Information Systems organizations and to place the IS department right
at the center of corporate strategy Topics will revolve around planning designing
and deploying winning strategic Information systems for a competitive organization
Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a
strong thrust on the consolidation of the following concepts and their practical
implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet
and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP
addressing and Sub netting WAP technology Network security architecture
networking Protocols Operating systems and the structure of Windows NT and
Linux OS Systems administration practices (serverclient side) Systems
administration using Windows 2003 Server OS
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
19
Modelling and Simulation of Mobile Networks (MSMN)
Introduction to modelling amp simulation Network analysis model design amp
development simulation techniquestypes of simulation simulation support
systems amp environments performance evaluation amp reporting
Enterprise Mobile Application Development and Management
The module will take students through team development and dynamics App
Business context analysis App marketing and branding App data management
Location based services amp acquisition cloud technology Students will assess
business needs for a mobile service recommend marketing strategies in line with
the given solution They are also required to understand the information (non-
marketing) disseminationdistribution strategies to the customer by the solution
Mobile and Web Security (MWS)
Introductionto security Confidentiality Integrity and Availability Threats in Mobile
Phones Security Policy formulation risk-driven security Web Commerce Security
Threats and Attacks Building Blocks Voice SMS and identification data
interception in GSM Software and Hardware Mobile phone tricks SMS security
issues Mobile Phone Forensics
Enterprise Networking
Module covers the following Hierarchical Network Design Connecting to the WAN
Point-to-Point Connections Frame Relay Broadband Solutions Static Routing
Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the
Network
Network Security
The course covers a range of topics including Security problems in computing
Cryptography Program Security Protection in general-purpose Operating
Systems Database Security Legal Privacy and Ethical Issues in Computer
Security Administering Security Security in Networks and Designing Trusted
Operating Systems
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
20
Industry Attachment
Students will be attached in industry so they have the opportunity to apply learnt
theoretical concepts into practice Before placement students will attend work
related seminars that will prepare them for the world of work During these
seminars communication skills time management activity planning and execution
skills proper work conduct work ethics and general employment issues will be
discussed A student will be attached to a school mentor and to an industry
supervisor to enhance the learning experience and attend to issues before they go
out of hand It is a requirement that students are placed in departments that are
relevant to this programme Post-attachment seminars shall provide a platform to
share experiences and evaluate the attachment process
Year 4 Modules
Research
Introduces a variety of research approaches and examines how to specify and
contextualise a research problem collect data analyse and present data and
evaluate the methodology adopted
Artefact
Provides the opportunity to develop a practical solution to a given project related to
the degree and evaluate the success against identifiable and measurable criteria
Project Management
You will learn modern approaches to the development and management of IT-
related projects making use of the latest principles techniques and research
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Artificial Intelligence
This module develops your knowledge of current AI principles and your skills in this
fast-moving area which is a particular focus of Sunderlandrsquos research
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
21
Concurrent and Distributed Systems
This module covers modern multi-processor and distributed system software
development using appropriate programming languages frameworks and APIs
Advanced Databases
This module explores solutions related to complex database systems such as
enhanced data models query optimisation clustering scalability security forensic
investigation data warehousing data analysis tools and more
Applied Multimedia
You will develop media and interaction-rich applications on alternative platforms
including mobile phones PDAs digital TV and mobile games platforms You will
also carry out research into both the hardware and software aspects of such
devices including ones that are not yet released to the public
User Experience Design
You will study principles and practices that ensure users gain the most appropriate
experience when interacting with computer-based software and hardware systems
Emerging Mobile Technologies
Internet trends and developments Current and future Architectures next-
generation standards ad hoc and mesh network protocols opportunistic delivery
and delay tolerant networks cognitive radio networks vehicular networks security
and privacy considerations Technological and social impacts
Project 1
Students will first identify a problem then propose a solution or strategy to
addressing such a problem The problem can be in areas such as Mobile
integration Mobile usability Enterprise app development amp strategies wireless
network protocols network simulation and optimisation etc Students will deliver a
portfolio report that detail the problem area research in the area through literature
review chapter and a proposalstrategic plan to solve the problem
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
22
Mobile User Experience
Introduction to usability Design theories amp principles UserHuman considerations
amp considerations Design for small screen gadgets Mobile usability Testing Mobile
Content strategies Form factors
Distributed Systems
Introduction to Distributed Systems Remote Procedure Calls Remote Object
Invocation Concurrency control Synchronization Clock synchronization
Replication and Consistency Data-centric Consistency Models Distribution
Protocols Consistency Protocols
Project 2
This module enables students to exercise their academic and technical skills by
producing a tangible piece of work in mobile technology in the form of a project
The product may include but not limited to a software piece simulation piece
simulation diagrams algorithms etc
Research and Innovation
Students will develop skills and knowledge in software project management
techniques prototype development systems analysis and design using object-
oriented programming application of modelling techniques using UML and other
tools These skills will be acquired through the use of lectures and group
consultations with supervisors Applications of these skills will be demonstrated
using prototypes built with JAVA VB and HTML Research methods
Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship
Techno-preneurship Sales pitch practices Presentation Interpersonal abilities
Communication mentorship
Intelligent Systems
Introduction to AI Intelligent agents Solving Problems by Searching heuristic
search techniques constraint satisfaction problems stochastic search methods
Game Playing minimax Knowledge and Reasoning Propositional logic first order
logic Planning Uncertain Knowledge and Reasoning knowledge representation
Probabilistic reasoning Genetic Algorithms Introduction to Natural Language
Processing
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
23
Implementing Data Models and Reports
Designing dimensions and measures Implementing and configuring dimensions in
a cube designing a schema to support cube architecture Creating measures
Implementing a cube Creating Multidimensional Expressions (MDX) queries
Implementing custom logic in a data model implementing storage design in a
multidimensional model Selecting an appropriate model for data analysis
Analysing data model performance Processing data models Troubleshooting data
analysis issues Implementing a tabular data model Implementing business logic
in a tabular data model Implementing data access for a tabular data model
Designing a report Implementing a report layout Configuring authentication and
authorization for a reporting solution Implementing interactivity in a report
Troubleshooting reporting service issues Managing a report environment
Configuring report data sources and datasets
Applied Data Analytics
Introduction to Machine Learning Concept Learning Decision Tree Learning
Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses
Bayesian Learning Instance Based Learning Support Vector Machines
Advanced Business Application Programming I (ABAP-1)
SAP System Overview ABAP Data Types Debugging Program Flow Control and
Logical Expressions Structures amp Internal Tables Select Statements Basic
Reporting Data Dictionary Database Tables User Selection Screen Design
Advanced Business Application Programming II (ABAP-2)
Working with external files Web Dynpro ALV Reports Smart Forms SAP Security
and Authorizations Performance Analysis and Tuning Web Services BADIs and
User Exits Object Oriented ABAP ABAP and XML
Marketing Analytics
Marketing engineering approach marketing engineering tools market response
model marketing engineering business value customer lifetime value
segmentation targeting and positioning approach forecasting in marketing
conjoint analysis for product design the marketing mix Harvesting value from
marketing Engineering
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
24
Advanced Routing
The module begins with a detailed study of the current exterior gateway protocol
that manages the routing of IP traffic over the Internet Students will learn how
service providers and other multi-homed organisations use this protocol to support
their routing policies
Cyber Security
This module you will learn how to analyze the range of tradeoffs in balancing the
security properties of confidentiality integrity and availability You will also learn
how to select the appropriate tools and techniques to address and manage
concepts of risk threats vulnerabilities and potential attacks This course
combines theory and practice balancing cutting-edge security technologies and
solutions with concepts and principles of the field
Ethical Hacking
Module develops knowledge and understanding of ethical hacking which is about
locating and strengthening security weaknesses in computer systems A range of
legal and social aspects in the ethical hacking domain This course aims to provide
students with the knowledge and skills required to understand the mechanics
behind hacking attacks and develop appropriate countermeasures In addition they
will gain the necessary background knowledge and technical skills to undertake
security audit testing on computer networks and systems
Telecommunications
Module moves from analogue principles to digital telephony VOIP packetized
voice GSM and converged networks Students will have an opportunity to build a
fully converged modern telecommunications system
Computing Project
Students will research a topic and develop software that is connected to that topic
Examples include an Android audio application a Trojan detector and a network
monitoring tool
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
25
422 Duration and Mode of Study
The duration of the programmes shall be four years Each academic year or level
shall include two semesters Progression will be dependent on successful
completion of courses taken during the semesters
The BSc Programmes are available on a full time and part-time basis with the
part-time meant to allow for those in industry to be able to develop themselves
A student has a maximum of eight years to complete the entire programme
423 Registration and Course Enrollment
All students are expected to register for each semester before it begins The
registry department determines the dates thus students must adhere to these to
avoid delays in receipt of resources such as books and allowance processing
It is the responsibility of every student to ensure that they are fully registered and
have been issued with proof of registration
43 Grades
431 Publication
The notice board will be used as a formal means of communication and it is the
studentrsquos responsibility to check their results from it While all efforts will be made
to ensure accuracy the School reserves the right to make necessary amendments
to published results
432 Statement of Results
Statement of results will be issued after every semester and issued from the
registrarrsquos office These are a record of academic achievement and must be duly
safeguarded as they will be required by various stakeholders from time to time
433 Result Decisions ndash Interpretations
The results are presented in the following component form ie Coursework Exam
and the Module marks The results for a module may be Pass Fail SupCW SupEx
or SupMod Additionally there is a semester result which gives an indication of
whether a student is proceeding to the next semester repeating failed modules or
they have been discontinued
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
26
Pass Student has attained a module mark of 40 and above and either component is 35 and above
PC
Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering
Fail Student has attained less than 35 in the module mark
Prcd The student may proceed to the next semesteracademic year
Prcd + Supl
The student may proceed to the next semesteracademic year and has been
allowed to supplement the indicated component(s)
Supl +Review
The decision depends on outcome of supplementary results which then give
the final decision ie student can only register provisionally at the discretion
of the Registrar
Prcd + Rpt
Repeat the module when it is next offered A student must attempt a module
with full attendance up to a maximum of 3 times thus a module may only
be repeated twice If they fail on the second repeat attempt they will then
get a FDis
DRptc
Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result
FDis
To get a Fail and Discontinue (FDis) a student has proved that they cannot
handle the SCIS programme they have failed an academic year twice or
failed the same module up to 3 times FDis means they will no longer be
eligible for any of the SCIS programmes They may find programmes in
other departments
SupMod
One is awarded a supplement module when the module mark is less
than 40 more than 34 and neither the coursework mark nor the
exam mark is greater than 40 In this case a student will sit for both
the coursework and the examination
SupCW
One is awarded a supplement coursework when the module mark
ranges from 35 to 39 and the exam mark is at least 40
SupEx
One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40
Prcd+Sup+Rpt
A student has earned sufficient credits to proceed they have failed a
module and are sitting for supplements
Rpt
A student repeats failed modules and will not be allowed to proceed
to the next semester academic year
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
27
434 Supplements
Whilst every attempt will be made to accommodate repeating students in the timetable it
may not be practically possible to accommodate all the individual cases Students are
therefore urged to work diligently to avoid cases that may result in their academic life
getting complicated This applies to students with carry-forward modules (Prcd+Rpt)
NB Supplementary assessments are offered in the week preceding ie before the
commencement of a new semester The maximum mark that can be attained for a
supplemented component is 40
5 Assessments
51 General All assessments will be subject to moderation Students will be awarded grades based on
two assessment components as below except for project modules which are assessed by
coursework only at 100
Coursework ndash makes up 40 of the overall grade for any module to be undertaken
by the student The coursework is made up of two continuous assessment
components namely
bull At least 1 assignment ndashthis contributes 60 of the coursework
bull At least 1 assessment examination ndash this contributes 40 of the coursework
Final examination ndashthis makes up the remaining 60 of the overall grade
``
NB Students must attempt all assessment components Students can normally
expect feedback for assessed work
52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance
research skills and in some cases report writing Some modules will require application as
in the case of programming modules Group and individual Projects require a consolidated
report to be submitted
Students are responsible for keeping a backup copy of their submitted work
53 Assessment Examinations
These are normally scheduled to take place mid-way into the semester and apply to all
modules excluding year 4 the individual and group projects
54 Final Examinations
Normally taken at the end of each semester respective dates may be found on the
academic calendar
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
28
55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and
projects and it is important to comply with them Normally all submissions are to be done
on TURNITIN for assignments and project documentation by 1159pm Assignment and
project code must be uploaded onto local shared drive by the deadline It is the studentrsquos
responsibility to make sure that their submission details are available on TURNITIN way
before the submission date
56 Late Submission Late submission of assignments will not be accepted
57 Examination Regulations Examinations play a major role in grade determination and as such should be taken
seriously by all students The following guidelines should be adhered to so as to avoid
unnecessary mishaps during the examination period
bull Candidates must be seated in the examination room 30mins before the
start of the examination
bull Candidates will not be allowed to leave the examination room in the first
hour of the examination and within the last ten minutes of the examination
bull No candidate will be allowed back once they have left the examination
room
bull All candidates must have in their possession their student ID cards The ID
cards must be in full display on the top right-hand corner of the desk
bull Every candidate must bring along their own examination accessories
Borrowing or lending of examination accessories will not be allowed
bull Candidates will not be allowed to have examination related materials on
them All examination related materials must be handed over to the
invigilator before the start of the examination
bull Candidates will not be allowed to write on the question papers All rough
work should be written at the back of the answer booklet and crossed out
bull Cellphones and any communication devices will not be allowed in the exam
room
bull No student will be allowed to sit for the examination once it has started
58 Examination Timetables
Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
29
Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL
The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment
59 Absence from Examinations
No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant
510 Repeating Modules
Following a decision by the examination board students may be offered a place to repeat
failed modules or repeat the level The student must apply to repeat to the Registrar and
may be granted permission subject to availability of funding sponsorship and places
Conditions will be as follows
bull Students may choose to repeat failed modules subject to such assessments being
available during that semester and subject to availability of the module and space
which the registrar must approve
bull The student must attend classes for the modules they are repeating and attempt
all its assessment components
511 Results Publication
Once examination marking is complete the examination board sits to consider the results
for all candidates After a complete thorough process all the ratified results will be
published by the department Students should make sure they check for their results
Where there is a conflict between a published results decision and the provisions of this
handbook the handbook provisions take precedence and it is the responsibility of the
students to bring the anomaly to the attention of the appropriate course leader This entails
the completion of a Results Query form and is available from the Registrarrsquos office
512 Transcripts
Transcripts will be issued from the Registrarrsquos office and any issued by any other means
will not be deemed valid Transcripts will be available only after completion of the
programme Duplicate transcripts can be obtained after payment of a fee which is
reviewed from time to time but is currently at P100
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
30
513 Request for reassessment
If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only
514 Mitigation
The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered
and is not automatic Should the Assessment Board not be satisfied as to the authenticity
of the reasons brought forward then the student will be awarded a zero mark for the missed
component Should the Assessment Board be satisfied and accept the mitigation then the
missed component will be offered to the student at the next available sitting
Communication of the outcome of mitigation will be done in writing through the registrarrsquos
office
A copy of the Mitigation form can be obtained from registry
6 Progression
61 General
A student is permitted to proceed with his or her approved programme only if he or she
maintains acceptable progress as evidenced by attendance of classes satisfactory
performance in examinations and the proper completion of such other work as may be
allotted to the student
62 Year 1 2 and 3 Progression
To progress from semester to semester and year to year a student must have accumulated
no more than 40 failed credits (2 modules worth 20 credits each)
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
31
63 Year 3 to Year 4 Progression
Students are required to have passed all modules to proceed to year 4
7 Attendance requirements
bull Attendance to lectures and tutorials is compulsory
bull Attendance for each module should be at least 75 from the official start of the
semester to the point of submission for assignments to the date of assessment
examination sitting and that of the final examination Failure to achieve this
minimum results in the student not being allowed to sit for assessments in that
module
bull Attendance is strictly monitored and records are kept A poor attendance record
can lead to the initiation of disciplinary procedures and could in serious cases lead
to exclusion from the College
bull Attendance is an issue which is often asked about specifically by employers and
education institutions who are seeking references about students Employers place
great weight on this issue - what point is there in employing a brilliant person if they
will not be at work
8 Policy on Cheating and Plagiarism
Students are expected to be above reproach in all scholastic activities Students who
engage in academic dishonesty are subject to disciplinary penalties including the
possibility of failure in the course dismissal from School of Computing and Information
Systems and dismissal from a professional body the student is a member of
Academic dishonesty includes but is not limited to cheating plagiarism and any act
designed to give unfair advantage to a student or the attempt to commit such acts This
definition includes any creativity exercised by the student with an aim of attaining an unfair
advantage Since academic dishonesty harms the individual all students and the integrity
of the School of Computing and Information Systems and the courses it offers policies on
academic dishonesty will be strictly enforced
Cheating and plagiarism are expanded on below Prohibited conduct includes and is not
limited to the following
81 Plagiarism
Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
32
Excellent written expression of well-formulated ideas is a fundamental skill for academic
and career success Plagiarism interferes with the assessment and feedback process that
is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false
view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas
of weakness and delay the student in reaching his or her potential
Plagiarism includes but is not limited to
bull Taking someone elsersquos assignment or portion of an assignment and submitting it as
your own
bull Submitting material written by someone else or rephrasing the ideas of another
without acknowledging them
bull Presenting the work of tutors parents siblings or friends as your own
bull Submitting purchased papers as your own
bull Submitting papers from the Internet written by someone else as your own
bull Supporting plagiarism by providing your work to others whether you believe it will
be copied or not
82 Cheating
Cheating demonstrates a lack of integrity and character that is inconsistent with the goals
and values of the School of Computing and Information Systems Education is based on
learning specific skills forming lifelong work habits and developing mature coping skills
according to each studentrsquos unique abilities Stress propels students to make unethical
choices When students choose to cheat it may be a symptom of more serious problems
such as inappropriate career choice over-commitment to extra-curricular activities andor
academic desperation The compromise of their values through cheating may lead to loss
of self-esteem as the students are often painfully aware of their shortcomings and fight a
tiring battle to preserve their images at the cost of their ethics True self-esteem is based
on competence Cheating robs students of their opportunity to become competent
Assignments should be considered individual unless the Lecturer states otherwise
Cheating includes but is not limited to
bull Copying faxing emailing or in any way duplicating assignments that are
turned in wholly or in part as original work
bull Exchanging assignments with other students either handwritten or computer
generated whether you believe they will be copied or not
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
33
bull Using any form of memory aid during tests quizzes and examinations
without the express permission of the instructor
bull Using a computer or other means to translate someone elsersquos assignment
from one language into another language and submitting it as your own
bull Giving or receiving answers during tests quizzes and examinations to or
from other students It is your responsibility to secure your papers so other
students will not have the opportunity to copy from you or the temptation to
do so
bull Taking credit for group work when you have not contributed an equal or
appropriate share toward the final result
bull Accessing tests quizzes and examinations for the purpose of determining
the questions in advance of their administration
bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of
reading the assigned materials
bull Collusion
83 Repercussions and Consequences
Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include
Zero (0) mark in the exam test or assignment
Writing another exam test or assignment
Notifying the sponsor
Denied admission to further courses
Notifying the concerned Professional body
Should the student feel the resolution passed by the Assessment Board to be unfair then
they may appeal in writing to the Appeals Board
Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties
involved It sacrifices the integrity of the person who provides the materials and robs the
copier of the opportunity to learn and express independent opinion Cheating is not an
individual activity all parties involved are equally guilty and will be subject to the same
consequences
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
34
Academic honesty on the part of all students is fundamental to their ethical and
professional development
9 ICT Resources
For guidelines and regulations pertaining to these refer to the ICT student handbook
10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature
bull Speak to the relevant lecturercourse tutor who will try and resolve the problem
informally
bull Write to the Course Manager outlining the nature of the complaint and the resolution
by the lecturercourse tutor
bull Appeal in writing to the Course Director through the office of the registrar The
Directorrsquos decision will be final
Other complaints
bull Write to the Registrar who will liaise with the relevant department (eg hostel
accounts) and try to resolve the problem informally
bull Appeal in writing to the Student Welfare Director through the office of the Registrar
outlining the nature of the complaint and the resolution by the Registrar The Student
Welfare Directorrsquos decision will be final
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
35
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Mitigating Circumstances Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)
Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)
ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)
DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form
36
SCHOOL OF COMPUTING AND INFORMATION SYSTEMS
Reassessment Form
EVIDENCE OF MITIGATING CIRCUMSTANCES
PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip
NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment
COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)
AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip
Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip
EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip
DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form