37
BAC Computing and Information Systems Department Programmes Handbook SCIS 3/31/2020

BAC Computing and Information Systems Department

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BAC Computing and Information Systems Department

BAC Computing and Information Systems Department Programmes Handbook SCIS 3312020

1

Contents 1 Welcome note from Course Director 3

2 Vision and Mission 4

3 Introduction 4

31 School of Computing and Information Systems 4

32 Aims and Objectives 5

33 Career Prospects 5

4 Academic Information 5

41 Graduate Profiles 5

411 Applied Business Computing 5

412 Computer Systems Engineering 5

413 Mobile and Web Technologies 6

414 Business Intelligence and Data Analytics 6

415 Network Systems Engineering 6

416 Information and Communication Technology 6

42 Programme Structure 7

421 Module Synopsis 10

422 Duration and Mode of Study 25

423 Registration and Course Enrollment 25

43 Grades 25

431 Publication 25

432 Statement of Results 25

433 Result Decisions ndash Interpretations 25

434 Supplements 27

5 Assessments 27

51 General 27

52 Assignments and Projects 27

53 Assessment Examinations 27

54 Final Examinations 27

55 Submission Procedure for Coursework 28

56 Late Submission 28

57 Examination Regulations 28

58 Examination Timetables 28

2

59 Absence from Examinations 29

510 Repeating Modules 29

511 Results Publication 29

512 Transcripts 29

513 Request for reassessment 30

514 Mitigation 30

6 Progression 30

61 30

62 Year 1 2 and 3 Progression 30

63 Year 3 to Year 4 31

7 Attendance requirements 31

8 Policy on Cheating and Plagiarism 31

81 Plagiarism 31

82 Cheating 32

83 Repercussions and Consequences 33

9 ICT Resources 34

10 Complaints Procedure 34

3

1 Welcome note from Course Director

Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc

This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile

The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium

Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you

Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes

Make your years of study in BAC worthwhile

Galamoyo Male ndash Academic Director School of Computing and Information Systems

4

2 Vision and Mission

VISION

ldquoTo become the leader in ICT knowledge creation and dissemination in the region

and beyondrdquo

MISSION

The SCIS strives for excellence in creating applying and imparting knowledge in

Computing and Information Systems through comprehensive educational

programmes research in collaboration with industry and government and service to

the community

3 Introduction

31 School of Computing and Information Systems

The School of Computing and Information Systems seeks to educate graduates that will

be both productive and creative in modern business and industry environments Studies

range from theory through experimental techniques to Engineering methodology

Research and laboratory work complement student classroom studies This 4-year twin

program prepares students to operate as professionals at the cutting edge of Information

Technology

The field of computer science can trace its foundation to both mathematics and

engineering methodology with the emphasis on practical experience Using this

philosophy the School of Computing and Information Systems has designed a unique

curricular model that seeks to provide an increased relevance to the real world The Project

in particular expands upon the experimental and design approach by introducing students

to the creativity and productivity concerns required for business and industrial

development

The program offers majors in Computer Systems Engineering Applied Business

Computing Mobile Technologies Business Intelligence Network Computing and

Information Communication Technology BAC runs the first three years of the

programmes and the fourth year is delivered in collaboration with University of Sunderland

(UK) which confers awards of the same

5

32 Aims and Objectives

The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-

1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and

adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business

33 Career Prospects

Graduates will fit in industry business and research as

bull Computer Programmers

bull Research scientists

bull Software developers and consultants

bull Systems analysts or administrators

bull IT or Project managers

bull Entrepreneurs

bull Business analysts

4 Academic Information

41 Graduate Profiles

411 Applied Business Computing

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using NET platform

bull Advise business on IT technologies and solutions that can drive their strategy

bull Participate in project teams on IT departments or specialist IT companies

bull Startup entrepreneurships that support large IT companies and serve SMEs

412 Computer Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using Java platform

bull Administer systems in businesses of any size

bull Participate in project teams on IT departments or specialist IT companies

bull Startup techno-preneurships that support large IT companies and serve SMEs

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 2: BAC Computing and Information Systems Department

1

Contents 1 Welcome note from Course Director 3

2 Vision and Mission 4

3 Introduction 4

31 School of Computing and Information Systems 4

32 Aims and Objectives 5

33 Career Prospects 5

4 Academic Information 5

41 Graduate Profiles 5

411 Applied Business Computing 5

412 Computer Systems Engineering 5

413 Mobile and Web Technologies 6

414 Business Intelligence and Data Analytics 6

415 Network Systems Engineering 6

416 Information and Communication Technology 6

42 Programme Structure 7

421 Module Synopsis 10

422 Duration and Mode of Study 25

423 Registration and Course Enrollment 25

43 Grades 25

431 Publication 25

432 Statement of Results 25

433 Result Decisions ndash Interpretations 25

434 Supplements 27

5 Assessments 27

51 General 27

52 Assignments and Projects 27

53 Assessment Examinations 27

54 Final Examinations 27

55 Submission Procedure for Coursework 28

56 Late Submission 28

57 Examination Regulations 28

58 Examination Timetables 28

2

59 Absence from Examinations 29

510 Repeating Modules 29

511 Results Publication 29

512 Transcripts 29

513 Request for reassessment 30

514 Mitigation 30

6 Progression 30

61 30

62 Year 1 2 and 3 Progression 30

63 Year 3 to Year 4 31

7 Attendance requirements 31

8 Policy on Cheating and Plagiarism 31

81 Plagiarism 31

82 Cheating 32

83 Repercussions and Consequences 33

9 ICT Resources 34

10 Complaints Procedure 34

3

1 Welcome note from Course Director

Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc

This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile

The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium

Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you

Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes

Make your years of study in BAC worthwhile

Galamoyo Male ndash Academic Director School of Computing and Information Systems

4

2 Vision and Mission

VISION

ldquoTo become the leader in ICT knowledge creation and dissemination in the region

and beyondrdquo

MISSION

The SCIS strives for excellence in creating applying and imparting knowledge in

Computing and Information Systems through comprehensive educational

programmes research in collaboration with industry and government and service to

the community

3 Introduction

31 School of Computing and Information Systems

The School of Computing and Information Systems seeks to educate graduates that will

be both productive and creative in modern business and industry environments Studies

range from theory through experimental techniques to Engineering methodology

Research and laboratory work complement student classroom studies This 4-year twin

program prepares students to operate as professionals at the cutting edge of Information

Technology

The field of computer science can trace its foundation to both mathematics and

engineering methodology with the emphasis on practical experience Using this

philosophy the School of Computing and Information Systems has designed a unique

curricular model that seeks to provide an increased relevance to the real world The Project

in particular expands upon the experimental and design approach by introducing students

to the creativity and productivity concerns required for business and industrial

development

The program offers majors in Computer Systems Engineering Applied Business

Computing Mobile Technologies Business Intelligence Network Computing and

Information Communication Technology BAC runs the first three years of the

programmes and the fourth year is delivered in collaboration with University of Sunderland

(UK) which confers awards of the same

5

32 Aims and Objectives

The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-

1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and

adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business

33 Career Prospects

Graduates will fit in industry business and research as

bull Computer Programmers

bull Research scientists

bull Software developers and consultants

bull Systems analysts or administrators

bull IT or Project managers

bull Entrepreneurs

bull Business analysts

4 Academic Information

41 Graduate Profiles

411 Applied Business Computing

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using NET platform

bull Advise business on IT technologies and solutions that can drive their strategy

bull Participate in project teams on IT departments or specialist IT companies

bull Startup entrepreneurships that support large IT companies and serve SMEs

412 Computer Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using Java platform

bull Administer systems in businesses of any size

bull Participate in project teams on IT departments or specialist IT companies

bull Startup techno-preneurships that support large IT companies and serve SMEs

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 3: BAC Computing and Information Systems Department

2

59 Absence from Examinations 29

510 Repeating Modules 29

511 Results Publication 29

512 Transcripts 29

513 Request for reassessment 30

514 Mitigation 30

6 Progression 30

61 30

62 Year 1 2 and 3 Progression 30

63 Year 3 to Year 4 31

7 Attendance requirements 31

8 Policy on Cheating and Plagiarism 31

81 Plagiarism 31

82 Cheating 32

83 Repercussions and Consequences 33

9 ICT Resources 34

10 Complaints Procedure 34

3

1 Welcome note from Course Director

Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc

This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile

The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium

Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you

Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes

Make your years of study in BAC worthwhile

Galamoyo Male ndash Academic Director School of Computing and Information Systems

4

2 Vision and Mission

VISION

ldquoTo become the leader in ICT knowledge creation and dissemination in the region

and beyondrdquo

MISSION

The SCIS strives for excellence in creating applying and imparting knowledge in

Computing and Information Systems through comprehensive educational

programmes research in collaboration with industry and government and service to

the community

3 Introduction

31 School of Computing and Information Systems

The School of Computing and Information Systems seeks to educate graduates that will

be both productive and creative in modern business and industry environments Studies

range from theory through experimental techniques to Engineering methodology

Research and laboratory work complement student classroom studies This 4-year twin

program prepares students to operate as professionals at the cutting edge of Information

Technology

The field of computer science can trace its foundation to both mathematics and

engineering methodology with the emphasis on practical experience Using this

philosophy the School of Computing and Information Systems has designed a unique

curricular model that seeks to provide an increased relevance to the real world The Project

in particular expands upon the experimental and design approach by introducing students

to the creativity and productivity concerns required for business and industrial

development

The program offers majors in Computer Systems Engineering Applied Business

Computing Mobile Technologies Business Intelligence Network Computing and

Information Communication Technology BAC runs the first three years of the

programmes and the fourth year is delivered in collaboration with University of Sunderland

(UK) which confers awards of the same

5

32 Aims and Objectives

The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-

1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and

adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business

33 Career Prospects

Graduates will fit in industry business and research as

bull Computer Programmers

bull Research scientists

bull Software developers and consultants

bull Systems analysts or administrators

bull IT or Project managers

bull Entrepreneurs

bull Business analysts

4 Academic Information

41 Graduate Profiles

411 Applied Business Computing

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using NET platform

bull Advise business on IT technologies and solutions that can drive their strategy

bull Participate in project teams on IT departments or specialist IT companies

bull Startup entrepreneurships that support large IT companies and serve SMEs

412 Computer Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using Java platform

bull Administer systems in businesses of any size

bull Participate in project teams on IT departments or specialist IT companies

bull Startup techno-preneurships that support large IT companies and serve SMEs

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 4: BAC Computing and Information Systems Department

3

1 Welcome note from Course Director

Congratulations for taking a step in the right direction towards building a career in the field of computing and ICT Over the years that this department has delivered computing courses BAC has graduated over 1500 graduates who have moved on to take up employment in both the public and private sector ultimately taking up jobs as Software Developers Systems Analysts Project Managers Systems Administrators Network Administrators Help Desk Support Officers IT Managers Application Administrators etc

This is your opportunity and four years down the line you too can be counted as an aspiring professional All it takes is a dedication to your student profession hard work and responsible conduct No doubt the academic road ahead shall be challenging and you should be assured in the confidence that with the right approach to your studies and a positive social attitude will prevail over these challenges The reward will be worthwhile

The School of Computing and Information Systems (SCIS) has a team of dedicated professionals who will guide you throughout your years of study and help you reach out for the degree qualification on your way to the graduation podium

Apply yourself to the utmost make the best of your lecturers and ensure that you read and understand this course handbook and know what is expected of you

Finally you have been welcomed to BAC by the BAC Executive director Mrs S Leburu and to add to that welcome the School of Computing and Information Systems welcomes you to the BAC Computing Programmes

Make your years of study in BAC worthwhile

Galamoyo Male ndash Academic Director School of Computing and Information Systems

4

2 Vision and Mission

VISION

ldquoTo become the leader in ICT knowledge creation and dissemination in the region

and beyondrdquo

MISSION

The SCIS strives for excellence in creating applying and imparting knowledge in

Computing and Information Systems through comprehensive educational

programmes research in collaboration with industry and government and service to

the community

3 Introduction

31 School of Computing and Information Systems

The School of Computing and Information Systems seeks to educate graduates that will

be both productive and creative in modern business and industry environments Studies

range from theory through experimental techniques to Engineering methodology

Research and laboratory work complement student classroom studies This 4-year twin

program prepares students to operate as professionals at the cutting edge of Information

Technology

The field of computer science can trace its foundation to both mathematics and

engineering methodology with the emphasis on practical experience Using this

philosophy the School of Computing and Information Systems has designed a unique

curricular model that seeks to provide an increased relevance to the real world The Project

in particular expands upon the experimental and design approach by introducing students

to the creativity and productivity concerns required for business and industrial

development

The program offers majors in Computer Systems Engineering Applied Business

Computing Mobile Technologies Business Intelligence Network Computing and

Information Communication Technology BAC runs the first three years of the

programmes and the fourth year is delivered in collaboration with University of Sunderland

(UK) which confers awards of the same

5

32 Aims and Objectives

The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-

1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and

adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business

33 Career Prospects

Graduates will fit in industry business and research as

bull Computer Programmers

bull Research scientists

bull Software developers and consultants

bull Systems analysts or administrators

bull IT or Project managers

bull Entrepreneurs

bull Business analysts

4 Academic Information

41 Graduate Profiles

411 Applied Business Computing

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using NET platform

bull Advise business on IT technologies and solutions that can drive their strategy

bull Participate in project teams on IT departments or specialist IT companies

bull Startup entrepreneurships that support large IT companies and serve SMEs

412 Computer Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using Java platform

bull Administer systems in businesses of any size

bull Participate in project teams on IT departments or specialist IT companies

bull Startup techno-preneurships that support large IT companies and serve SMEs

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 5: BAC Computing and Information Systems Department

4

2 Vision and Mission

VISION

ldquoTo become the leader in ICT knowledge creation and dissemination in the region

and beyondrdquo

MISSION

The SCIS strives for excellence in creating applying and imparting knowledge in

Computing and Information Systems through comprehensive educational

programmes research in collaboration with industry and government and service to

the community

3 Introduction

31 School of Computing and Information Systems

The School of Computing and Information Systems seeks to educate graduates that will

be both productive and creative in modern business and industry environments Studies

range from theory through experimental techniques to Engineering methodology

Research and laboratory work complement student classroom studies This 4-year twin

program prepares students to operate as professionals at the cutting edge of Information

Technology

The field of computer science can trace its foundation to both mathematics and

engineering methodology with the emphasis on practical experience Using this

philosophy the School of Computing and Information Systems has designed a unique

curricular model that seeks to provide an increased relevance to the real world The Project

in particular expands upon the experimental and design approach by introducing students

to the creativity and productivity concerns required for business and industrial

development

The program offers majors in Computer Systems Engineering Applied Business

Computing Mobile Technologies Business Intelligence Network Computing and

Information Communication Technology BAC runs the first three years of the

programmes and the fourth year is delivered in collaboration with University of Sunderland

(UK) which confers awards of the same

5

32 Aims and Objectives

The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-

1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and

adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business

33 Career Prospects

Graduates will fit in industry business and research as

bull Computer Programmers

bull Research scientists

bull Software developers and consultants

bull Systems analysts or administrators

bull IT or Project managers

bull Entrepreneurs

bull Business analysts

4 Academic Information

41 Graduate Profiles

411 Applied Business Computing

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using NET platform

bull Advise business on IT technologies and solutions that can drive their strategy

bull Participate in project teams on IT departments or specialist IT companies

bull Startup entrepreneurships that support large IT companies and serve SMEs

412 Computer Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using Java platform

bull Administer systems in businesses of any size

bull Participate in project teams on IT departments or specialist IT companies

bull Startup techno-preneurships that support large IT companies and serve SMEs

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 6: BAC Computing and Information Systems Department

5

32 Aims and Objectives

The aim of the programmes is to combine an in-depth coverage of computing and its applications to the business environment with a systematic approach to the design and construction of high quality software systems By the end of the programme students should be able to-

1 Analyze real world problems design develop and implement software solutions 2 Use a wide range of tools available to software engineers 3 Show knowledge of the current trends in technology across a wide spectrum 4 Show sound educational basis to cope with future technological developments and

adopt these to the business environment 5 Analyze design implement and maintain computer systems 6 Pursue post-graduate degrees in the fields of Information Technology and Business

33 Career Prospects

Graduates will fit in industry business and research as

bull Computer Programmers

bull Research scientists

bull Software developers and consultants

bull Systems analysts or administrators

bull IT or Project managers

bull Entrepreneurs

bull Business analysts

4 Academic Information

41 Graduate Profiles

411 Applied Business Computing

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using NET platform

bull Advise business on IT technologies and solutions that can drive their strategy

bull Participate in project teams on IT departments or specialist IT companies

bull Startup entrepreneurships that support large IT companies and serve SMEs

412 Computer Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Analyze and develop solutions for business using Java platform

bull Administer systems in businesses of any size

bull Participate in project teams on IT departments or specialist IT companies

bull Startup techno-preneurships that support large IT companies and serve SMEs

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 7: BAC Computing and Information Systems Department

6

413 Mobile and Web Technologies

To produce a graduate that is equipped with the skills required to

bull Design and implement mobile solutions

bull Support and evaluate mobile technology applications

bull Advise and use mobile solutions for the enterprise customer

bull Design and administer mobile security solutions

bull Startup techno-preneurships that support and serve SMEs

414 Business Intelligence and Data Analytics

To produce a graduate that is equipped with the skills required to

bull Develop databases and data warehouses

bull Apply data mining technologies

bull Use data mining to predict the future to support decision making

415 Network Systems Engineering

To produce a graduate that is equipped with the skills required to

bull Conceptualize design and deploy networks on any scale

bull Configure and administer networks

416 Information and Communication Technology

To produce a graduate that is equipped with the skills required to

bull Implement manage and support of ICT systems

bull Implement manage and support security and digital etiquette in ICT systems

bull ICT consultancy

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 8: BAC Computing and Information Systems Department

7

42 Programme Structure

Programmes will be offered according to the schedule that follows Some modules

require prerequisites as shown on the programme structure

Computer Systems Engineering Applied Business Computing Year 1 Semester 1

Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 1 Computer-related Maths and Statistics System Development Computer Technology

Year 1 Semester 2 Java WMD Computer Systems Installation and Maintenance

Year 1 Semester 2 Introduction to Programming using C Web and Mobile Development Ecommerce

Year 2 Semester 1 Object Oriented Analysis and Design (Java) Mobile Application Development Database Design and Development

Year 2 Semester 1 Object Oriented Analysis and Design (C) Computer Networks Database Design and Development

Year 2 Semester 2 Computer Networks Discrete Mathematics Research amp Innovation

Year 2 Semester 2 Information Security Quantitative Analysis of Business Research and Innovation

Year 3 Semester 1 Advanced Web Development Intelligent Systems Computer Systems Administration

Year 3 Semester 1 Advanced Web Development Business Information Systems Computer Systems Administration

Year 3 Semester 2 Attachment

Year 3 Semester 2 Attachment

Year 4 Semester 1 Research Advanced Cyber Security Android Mobile Development

Year 4 Semester 1 Research User Experience Design Business Intelligence and Strategy

Year 4 Semester 2 Product Development Advanced Data Technologies Artificial Intelligence

Year 4 Semester 2 Product Development Software Enterprise Web Information Systems for Business

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 9: BAC Computing and Information Systems Department

8

Mobile and Web Technologies Business Intelligence and Data Analytics Year 1 Semester 1

Computer-related Maths and Statistics Mobile Development Environments Introduction to Mobile Technologies

Year 1 Semester 1 Computer-related Maths and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Systems Development Computer Programming Web and Multimedia Development

Year 1 Semester 2 Systems Development Fundamentals of Business Intelligence Web and Multimedia Development

Year 2 Semester 1 Mobile Application Development Computer Networks Cross Platform Development for Mobile Application

Year 2 Semester 1 Database Design amp Development Introduction to Data Analytics Python Programming

Year 2 Semester 2 Advanced Mobile Application Development Database Design amp Development Research and Innovation Project

Year 2 Semester 2 Data Warehousing Advanced Data Analytics Research and Innovation Project

Year 3 Semester 1 Enterprise Mobile App Dvpt Management Modelling amp Simulation of Mobile Networks Mobile amp Web Security

Year 3 Semester 1 Intelligent Systems Business Management R Programming

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Android Mobile Development User Experience Design Research

Year 4 Semester 1 Business Intelligence and Strategy User Experience Design Research

Year 4 Semester 2 Product Development Telecommunications Application Design and development for iOS

Year 4 Semester 2 Product Development Artificial Intelligence Advanced Data Technologies

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 10: BAC Computing and Information Systems Department

9

Network Systems Engineering Information Communication Technology

Year 1 Semester 1 Fundamentals of Networking Systems Development Computer Technology

Year 1 Semester 1 Computer Related Mathematics and Statistics Business Process Analysis Computer Technology

Year 1 Semester 2 Computer Related Mathematics and Statistics Routing and Switching Fundamentals Computer Systems Installation and Maintenance

Year 1 Semester 2 Systems Development Introduction to C Programming Computer Systems Installation and Maintenance

Year 2 Semester 1 Introduction to C Programming Data Centre Networking Wireless Networking

Year 2 Semester 1 Ethics amp Professional Conduct Object Oriented Analysis and Design with C Computer Networks

Year 2 Semester 2 Network Architecture Design Distributed Systems Research and Innovation Project

Year 2 Semester 2 Database Design and Development Quantitative Analysis for Business Information Systems Security

Year 3 Semester 1 Enterprise Networking Network Security Computer Systems Administration

Year 3 Semester 1 Computer Systems Administration Information Systems Strategy IT Systems Audit amp Forensics

Year 3 Semester 2 Industry Attachment

Year 3 Semester 2 Industry Attachment

Year 4 Semester 1 Research Advanced Cyber Security Ethical Hacking

Year 4 Semester 1 Research Business Intelligence and Strategy Business Modelling and Decision-Making

Year 4 Semester 2 Product Development Telecommunications Advanced Routing

Year 4 Semester 2 Product Development IT Service Management Professional Issue in Cybersecurity and Digital Forensics

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 11: BAC Computing and Information Systems Department

10

421 Module Synopsis

Computer Technology (CT) The module aims to provide students with a clear understanding of the various

technologies and the potential role that these can play in making businesses more

effective and successful Students will have an in-depth business-oriented view of

hardware software and data communications together with emerging mobile and

internet-based technologies The module covers basic computer applications

operating systems data storage and retrieval networks internet multimedia

software engineering database systems mobile computing and communications

Practically students will work on Microsoft Office Applications and Managing files in

the Windows Environment

Computer-Related Mathematics and Statistics (CMS) The module introduces students to the use of basic mathematics and statistics in

real world businesses The module seeks to develop quantitative critical thinking

skills relevant to decision making It deals with data collection analysis calculating

mean mode and use or probability in decision making Number systems computer

arithmetic measures of central tendency frequency and dispersion are covered as

part of the content

Systems Development (SD) Systems Development Overview Problem Solving Techniques amp Decisions

Software program basics Data storage maintenance and manipulation Object

oriented Programming concept Systems development planning Systems Design

Systems Testing amp Maintenance

Web and Multimedia Development (WMD)

This module will provide a detailed insight into the practical and theoretical

aspects of modern web page design amp development technologies The theoretical

side will cover such issues as emerging web techniques amp technologies and the

motivation behind such The practical side will give students hands-on experience

of developing Web pages using these techniques amp technologies Current ideas

on web page design Document Object Model (DOM) Document Type Definitions

(DTD) web page construction using authoring tools such as Dreamweaver HTML

coding Cascading Style Sheets XML external amp internal page validation

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 12: BAC Computing and Information Systems Department

11

Java This module takes students through the syntax of the Java programming language

object-oriented programming with the Java programming language creating

graphical user interfaces (GUI) exceptions file inputoutput (IO) threads and

networking Object oriented features such as classes inheritance and

polymorphism are also covered An overview of fundamental programming

concepts using Java as well as data aggregates data structures (eg linked lists

stacks queues trees and graphs) and an introduction to the analysis of algorithms

that operate on those data structures are also covered

Visual Basic (VB) Variables operators and expressions control structures are introduced Simple

functions input and output and classes along with objects are implemented After

completing this course students will be able to Describe the purpose of the NET

Framework and explain how to use Microsoft Visual Basic and Visual Studio 2010

to build NET Framework applications Describe the syntax of basic Visual Basic

programming constructs Describe how to catch handle and throw exceptions

Describe how to perform basic file IO operations in a Visual Basic application

Describe how to create and use new types (enumerations classes and structures)

and explain the differences

Computer Systems installation amp Maintenance (CSIM)

This module attempts to impart knowledge and skills to students in the following

areas adding and removing Field Replaceable Units from desktops and Portables

installation and configuration of peripheral devices performing preventive

maintenance and basic troubleshooting on common hardware software and

network faults configuring and servicing printers setting up configuring and tuning

simple LANs installing upgrading and troubleshooting operating systems

Electronic Commerce (Ecomm) This module provides an introduction to ecommerce looks at the technology

infrastructure that supports it ie Internet and the World Wide Web business

strategies for ecommerce marketing on the web shift from electronic data

interchange to ecommerce virtual communities web portals online auctions as

well as legal ethical and tax issues in ecommerce Also included are web server

hardware and software ecommerce software ecommerce security and electronic

payment systems

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 13: BAC Computing and Information Systems Department

12

Business Process Analysis (BPA)

Introduction to business processes introduction to business process modelling

tools the art of Business processes modelling analyzing business processes

business process improvement

Fundamentals of Business Intelligence (FBI)

Introduction to Business Intelligence Introduction to Databases and Data

Warehousing Reporting and Report Design Business Performance Management

Data Mining for Business Intelligence Data Mining Methods and Applications

Emerging trends in BI legal and ethical matters related to business intelligence

Computer Programming (CP)

Language Fundamentals Methods Subroutines logic control structures data

structures Basic input and Graphics Objects and Classes building a User driven

Application Testing and Debugging

Introduction to Mobile Technologies (IMT)

Overview of Mobile Technologies Network operators amp services Mobile Networks

Mobile Web Mobile Alliances amp standards BYOD amp device types Mobile operation

systems Basic device configuration amp management Device troubleshooting

Pervasive computing Implementing a mobile technology

Mobile Development Environments (MDE) Open amp closed source software Android development environmenttools iPhone

development environmenttools Windows Mobile development environmenttools

other development environments (Blackberry Symbian etc) Basic mobile

Application

Fundamentals of Networking (FN)

Introduction to networks and networking concepts network design networking

media network interface cards OSI reference model number systems error

detection and control network communications and protocols channel access

methods network administration and support and solving network problems

Routing amp Switching Fundamentals (RSF)

IPV6 IPV4 addressing network address translation VLANS routing algorithms

LAN Switching and segmentation spanning trees protocols and network security

issues Network configuration and network simulation

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 14: BAC Computing and Information Systems Department

13

Object Orientated Analysis amp Development (OOAD)

Students will develop skills and knowledge in object-oriented methodologies

analysis and design modelling using UML tools These skills will be acquired

through the use of lectures and lab sessions where UML tools will be used to

implement these concepts Applications of these skills will be demonstrated using

examples in JAVA (CSE) and VB (ABC) programming languages Using case

studies and tutorials students will develop analytical skills in object-oriented

programming which they can apply to suitable projects and systems development

The course gives students a thorough grounding in the key concepts of Object-

Oriented Programming techniques methods and Systems analysis and design

using UML tools Each programme will enhance and utilise Java and Visual basic

Database Design and Development (DDD)

The module seeks to provide the students with the necessary knowledge and skills

to understand the principles and practice of database systems development Topics

covered include database models conceptual data modeling ndash entities ERDs

introduction to SQL-create select insert statements stored procedures triggers

and functions database integration normalization and transaction management

and support Students will be expected to produce detailed data models and

requirements for a typical database application

Object Oriented Programming using C (C)

The goal of this course is to provide students with the knowledge and skills they

need to develop C applications for the Microsoftreg NET Platform The course

focuses on C program structure language syntax and implementation details

Content to be covered includes syntactical features of the C object-oriented

design with encapsulation inheritance and polymorphism advanced techniques

such as interfaces delegates and events effective development of GUI-based

applications and study of class libraries

Information Security (INFOSEC)

This module looks at how security professionals develop the overall security

program necessary to protect data and react to threats as they occur Various IT

security threats are covered and the foundation of the overall security program

needed to combat these threats In addition the administrative processes

necessary to execute an information security program a discovery into the various

ways network technologies can be subverted to allow users to steal data while in

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 15: BAC Computing and Information Systems Department

14

transit is also covered UNIX and Windows systems and how they must be

protected to secure data are included Areas covered include threats to IT assets

encryption fundamentals of network security intrusion detection fundamentals of

system security Windows system security Standards and compliance and security

testing

Distributed Systems (DS)

The module assumes the knowledge of Communication Networks It introduces

types of distributed systems Communication protocols RPC ROI and

Synchronization Transaction concepts Threads Servers Distributed systems

Consistency models and security management will form the core of this module

Discrete Mathematics (DM)

This module aims to prepare students for abstract reasoning using a range of

mathematical techniques such as set theory predicate logic functions and

relations and prepares students to appropriately specify software system

requirements with minimum ambiguity Contents include Logic representation of

simple verbal arguments truth-tables logic gates logical equivalence

Representation using Venn diagrams resolution proof method logic circuits and

Karnaugh maps Relations representations of relations equivalence relations

Quantitative Analysis for Business (QAB)

To make decisions one needs to have access to information Business information

is often numbers and statistics The quantitative analysis for business module

enables one to make good decisions and to organize and understand numbers

Areas covered include types of data and different collection methods data

representation probability sampling normal and t distributions analysis of

variance correlation and regression analysis and time series analysis

Corporate Governance and Ethics (CGE) This module is aimed at changing the mind set of future information systems

executives from an administrative mindset to a strategic mindset a mindset that will

enable them to build more responsive Information Systems organizations and to

place the IS department right at the center of corporate strategy Its focus is on the

importance of ethics how to deal with ethical conflicts basis for corporate

governance and corporate social responsibility Best practices in corporate

governance are covered in depth

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 16: BAC Computing and Information Systems Department

15

Research amp Innovation (RI)

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Introduction to Data Analytics (IDA)

Module covers collecting and analysing data Graphical representation of data

Measures of location and dispersion Probability Distribution of random variables

Sampling distributions and estimation Interval estimation Hypothesis testing

Correlation and Regression Analysis of Variance amp experimental design Chi-

square test Time series analysis

Decision Support Systems (DSS)

Module covers introduction to DSS DSS and Business Intelligence DSS lifecycle

Phases of the decision making process DSS architecture data management

subsystem (data extraction preparing and staging) model management

subsystem (Linear programming regression decision trees AI expert systems

data mining sensitivity analysis) dialogue subsystem (usability interaction

modalities Intelligent user interface)

In-Memory Computing

Desirability feasibility and viability of In-memory computing Information in real

time Impact of recent hardware trends current enterprise applications in-memory

enterprise database systems targeting multi-cores and main memory

understanding memory hierarchies parallel data processing using multi-cores

compression for speed and memory consumption designing an in-memory

database system Optimizing Data layout (Colum Row Hybrid) Organizing and

accessing data SQL for in-memory data access efficient retrieval of business

objects enabling analytics on transactional data In-memory application

development model ndash moving business logic into the database

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 17: BAC Computing and Information Systems Department

16

Strategic Management

Steps in strategy formulation external and internal environment analysis BCG

matrix BE matrix Porterrsquos Five Forces analysis SWOT organizational strategic

risk management Benchmarking decision making strategy implementation

change management Business Intelligence roadmap

Data Warehousing (DW)

Introduce to Data warehousing and data mining architecture design and

development Multi-dimensional model star schemas fact tables dimensions

Data warehouse physical design Data warehouse construction OLAP techniques

for Data warehouse intelligent systems techniques for data warehousing support

for data warehouses applications and trends in data warehousing

Mobile Application Development (MAD I)

Mobile development life cycle Application design amp architecture Application APIs

Frameworks

Mobile Commerce (MC)

Introduction to Mobile Commerce Mobile Industry amp Vendors Business operational

Readiness Mobile Business Products amp services Overview Mobile Marketing amp

advertising Secure Mobile purchasing Mobile Customer support Ethics amp Legal

considerations

Computer Networks (CN)

Introduction to Networks and Networking Concepts Network Design Essentials

Networking Media Network Interface Cards OSI Reference model Number

systems error detection and control Network Communications and Protocols

Channel access Methods Network administration and support Solving Network

Problems

Mobile Application Development (MAD II)

Application data sources development App installationdeployment Mobile

application testing App store submission Fundamental AI for Games

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 18: BAC Computing and Information Systems Department

17

Cross Platform Development for Mobile Applications (CPDMA)

Principles of operability Platforms comparison App formatting issues Best Cross

platform tools Best practices Cross platform implementation Compatibility

Testing

Data Centre Networking (DCN)

Enterprise data center design fundamentals technology trends and challenges

facing the data center general data center architecture components software-

defined networks (SDNs) architecture and design considerations This module also

provides an overview of virtualization discusses the various virtualization

technologies and network virtualization design considerations

Wireless Networking (WN)

In this module fundamental aspects of wireless networks with emphasis on current

and next-generation wireless networks will be explored Various aspects of wireless

networking will be covered including fundamentals of cellular communication

mobile radio propagation multiple access techniques mobility support channel

allocation Wireless PANLANMAN WiMAX standards mobile ad-hoc networks

wireless sensor networks and routing in wireless and mobile networks The goal of

this course is to introduce the students to state-of-the-art wireless network protocols

and architectures We will also look at industry trends and discuss some innovative

ideas that have recently been developed Some of the course material will be drawn

from research papers industry white papers and Internet RFCs

Network Architecture Design (NAD)

The module covers areas of Network Architecture Design that include a hierarchical

network for a small business recommendations for designing a network that is

scalable type of switches and routers available for small-to-medium-sized business

networks The module also covers configuration and verification of basic settings

on a Cisco IOS device The module extensively covers the concepts of STP and

FHRP used to cater for redundancy with no logical loops

Advanced Website Development (AWD)

The module aims to equip students on how to build dynamic Web applications using

industry standard server side and client technologies It focuses on advanced

server scripting managing web projects web security and database design It also

covers the techniques and concepts needed to build efficient full-featured state-of-

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 19: BAC Computing and Information Systems Department

18

the-art web applications using either Java 2 Enterprise Edition Servlet (J2EE) or

Microsoft Net Web services A variety of alternative delivery platforms including

mobile phones and other portable devices are explored Upon completion leaners

will have an essential combination of a front-end scripting language a back-end

programming language skills needed by Web Development Professionals

Intelligent Systems

This course provides an overview and introduction to the field of Artificial

Intelligence Notions of rational behavior and intelligent agents will be discussed

The course also introduces the concepts and methodologies of Intelligent Systems

and provides the learner with most essential application development skills in

the Artificial Intelligence paradigm The emphasis will be on understanding the

fundamental concepts as well as being able to practically apply the corresponding

approaches in solving practical problems and developing useful software

applications Data mining and machine learning concepts are also introduced An

introduction to Artificial Intelligence Programming using Prolog will be provided to

help students with the programming part of the course

Business Information Systems (BIS)

The module covers systems theory explores various enterprise information

systems It gives the basics of decision support and the role business intelligence

in the knowledge driven economies of today Project management process steps

methodologies and tool are considered It gives a student an opportunity to review

the evolution and development of Web 20 and 30 technologies that are being

integrated into enterprise information systems This module is aimed at changing

the mind set of future information systems executives from an administrative

mindset to a strategic mindset a mindset that will enable them to build more

responsive Information Systems organizations and to place the IS department right

at the center of corporate strategy Topics will revolve around planning designing

and deploying winning strategic Information systems for a competitive organization

Computer Systems Administration (CSA) The module perceives Computer Networks as the prerequisite This module has a

strong thrust on the consolidation of the following concepts and their practical

implications LAN Technologies ie Wired Based including Ethernet-Fast Ethernet

and Gigabit Ethernet and Wireless Based LANS including IEEE80211 standard IP

addressing and Sub netting WAP technology Network security architecture

networking Protocols Operating systems and the structure of Windows NT and

Linux OS Systems administration practices (serverclient side) Systems

administration using Windows 2003 Server OS

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 20: BAC Computing and Information Systems Department

19

Modelling and Simulation of Mobile Networks (MSMN)

Introduction to modelling amp simulation Network analysis model design amp

development simulation techniquestypes of simulation simulation support

systems amp environments performance evaluation amp reporting

Enterprise Mobile Application Development and Management

The module will take students through team development and dynamics App

Business context analysis App marketing and branding App data management

Location based services amp acquisition cloud technology Students will assess

business needs for a mobile service recommend marketing strategies in line with

the given solution They are also required to understand the information (non-

marketing) disseminationdistribution strategies to the customer by the solution

Mobile and Web Security (MWS)

Introductionto security Confidentiality Integrity and Availability Threats in Mobile

Phones Security Policy formulation risk-driven security Web Commerce Security

Threats and Attacks Building Blocks Voice SMS and identification data

interception in GSM Software and Hardware Mobile phone tricks SMS security

issues Mobile Phone Forensics

Enterprise Networking

Module covers the following Hierarchical Network Design Connecting to the WAN

Point-to-Point Connections Frame Relay Broadband Solutions Static Routing

Securing Site-to-Site Connectivity Monitoring the Network Troubleshooting the

Network

Network Security

The course covers a range of topics including Security problems in computing

Cryptography Program Security Protection in general-purpose Operating

Systems Database Security Legal Privacy and Ethical Issues in Computer

Security Administering Security Security in Networks and Designing Trusted

Operating Systems

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 21: BAC Computing and Information Systems Department

20

Industry Attachment

Students will be attached in industry so they have the opportunity to apply learnt

theoretical concepts into practice Before placement students will attend work

related seminars that will prepare them for the world of work During these

seminars communication skills time management activity planning and execution

skills proper work conduct work ethics and general employment issues will be

discussed A student will be attached to a school mentor and to an industry

supervisor to enhance the learning experience and attend to issues before they go

out of hand It is a requirement that students are placed in departments that are

relevant to this programme Post-attachment seminars shall provide a platform to

share experiences and evaluate the attachment process

Year 4 Modules

Research

Introduces a variety of research approaches and examines how to specify and

contextualise a research problem collect data analyse and present data and

evaluate the methodology adopted

Artefact

Provides the opportunity to develop a practical solution to a given project related to

the degree and evaluate the success against identifiable and measurable criteria

Project Management

You will learn modern approaches to the development and management of IT-

related projects making use of the latest principles techniques and research

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Artificial Intelligence

This module develops your knowledge of current AI principles and your skills in this

fast-moving area which is a particular focus of Sunderlandrsquos research

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 22: BAC Computing and Information Systems Department

21

Concurrent and Distributed Systems

This module covers modern multi-processor and distributed system software

development using appropriate programming languages frameworks and APIs

Advanced Databases

This module explores solutions related to complex database systems such as

enhanced data models query optimisation clustering scalability security forensic

investigation data warehousing data analysis tools and more

Applied Multimedia

You will develop media and interaction-rich applications on alternative platforms

including mobile phones PDAs digital TV and mobile games platforms You will

also carry out research into both the hardware and software aspects of such

devices including ones that are not yet released to the public

User Experience Design

You will study principles and practices that ensure users gain the most appropriate

experience when interacting with computer-based software and hardware systems

Emerging Mobile Technologies

Internet trends and developments Current and future Architectures next-

generation standards ad hoc and mesh network protocols opportunistic delivery

and delay tolerant networks cognitive radio networks vehicular networks security

and privacy considerations Technological and social impacts

Project 1

Students will first identify a problem then propose a solution or strategy to

addressing such a problem The problem can be in areas such as Mobile

integration Mobile usability Enterprise app development amp strategies wireless

network protocols network simulation and optimisation etc Students will deliver a

portfolio report that detail the problem area research in the area through literature

review chapter and a proposalstrategic plan to solve the problem

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 23: BAC Computing and Information Systems Department

22

Mobile User Experience

Introduction to usability Design theories amp principles UserHuman considerations

amp considerations Design for small screen gadgets Mobile usability Testing Mobile

Content strategies Form factors

Distributed Systems

Introduction to Distributed Systems Remote Procedure Calls Remote Object

Invocation Concurrency control Synchronization Clock synchronization

Replication and Consistency Data-centric Consistency Models Distribution

Protocols Consistency Protocols

Project 2

This module enables students to exercise their academic and technical skills by

producing a tangible piece of work in mobile technology in the form of a project

The product may include but not limited to a software piece simulation piece

simulation diagrams algorithms etc

Research and Innovation

Students will develop skills and knowledge in software project management

techniques prototype development systems analysis and design using object-

oriented programming application of modelling techniques using UML and other

tools These skills will be acquired through the use of lectures and group

consultations with supervisors Applications of these skills will be demonstrated

using prototypes built with JAVA VB and HTML Research methods

Brainstorming Critical thinking Design thinking Mind mapping Entrepreneurship

Techno-preneurship Sales pitch practices Presentation Interpersonal abilities

Communication mentorship

Intelligent Systems

Introduction to AI Intelligent agents Solving Problems by Searching heuristic

search techniques constraint satisfaction problems stochastic search methods

Game Playing minimax Knowledge and Reasoning Propositional logic first order

logic Planning Uncertain Knowledge and Reasoning knowledge representation

Probabilistic reasoning Genetic Algorithms Introduction to Natural Language

Processing

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 24: BAC Computing and Information Systems Department

23

Implementing Data Models and Reports

Designing dimensions and measures Implementing and configuring dimensions in

a cube designing a schema to support cube architecture Creating measures

Implementing a cube Creating Multidimensional Expressions (MDX) queries

Implementing custom logic in a data model implementing storage design in a

multidimensional model Selecting an appropriate model for data analysis

Analysing data model performance Processing data models Troubleshooting data

analysis issues Implementing a tabular data model Implementing business logic

in a tabular data model Implementing data access for a tabular data model

Designing a report Implementing a report layout Configuring authentication and

authorization for a reporting solution Implementing interactivity in a report

Troubleshooting reporting service issues Managing a report environment

Configuring report data sources and datasets

Applied Data Analytics

Introduction to Machine Learning Concept Learning Decision Tree Learning

Artificial Neural Networks WEKA Machine Learning Tool Evaluating Hypotheses

Bayesian Learning Instance Based Learning Support Vector Machines

Advanced Business Application Programming I (ABAP-1)

SAP System Overview ABAP Data Types Debugging Program Flow Control and

Logical Expressions Structures amp Internal Tables Select Statements Basic

Reporting Data Dictionary Database Tables User Selection Screen Design

Advanced Business Application Programming II (ABAP-2)

Working with external files Web Dynpro ALV Reports Smart Forms SAP Security

and Authorizations Performance Analysis and Tuning Web Services BADIs and

User Exits Object Oriented ABAP ABAP and XML

Marketing Analytics

Marketing engineering approach marketing engineering tools market response

model marketing engineering business value customer lifetime value

segmentation targeting and positioning approach forecasting in marketing

conjoint analysis for product design the marketing mix Harvesting value from

marketing Engineering

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 25: BAC Computing and Information Systems Department

24

Advanced Routing

The module begins with a detailed study of the current exterior gateway protocol

that manages the routing of IP traffic over the Internet Students will learn how

service providers and other multi-homed organisations use this protocol to support

their routing policies

Cyber Security

This module you will learn how to analyze the range of tradeoffs in balancing the

security properties of confidentiality integrity and availability You will also learn

how to select the appropriate tools and techniques to address and manage

concepts of risk threats vulnerabilities and potential attacks This course

combines theory and practice balancing cutting-edge security technologies and

solutions with concepts and principles of the field

Ethical Hacking

Module develops knowledge and understanding of ethical hacking which is about

locating and strengthening security weaknesses in computer systems A range of

legal and social aspects in the ethical hacking domain This course aims to provide

students with the knowledge and skills required to understand the mechanics

behind hacking attacks and develop appropriate countermeasures In addition they

will gain the necessary background knowledge and technical skills to undertake

security audit testing on computer networks and systems

Telecommunications

Module moves from analogue principles to digital telephony VOIP packetized

voice GSM and converged networks Students will have an opportunity to build a

fully converged modern telecommunications system

Computing Project

Students will research a topic and develop software that is connected to that topic

Examples include an Android audio application a Trojan detector and a network

monitoring tool

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 26: BAC Computing and Information Systems Department

25

422 Duration and Mode of Study

The duration of the programmes shall be four years Each academic year or level

shall include two semesters Progression will be dependent on successful

completion of courses taken during the semesters

The BSc Programmes are available on a full time and part-time basis with the

part-time meant to allow for those in industry to be able to develop themselves

A student has a maximum of eight years to complete the entire programme

423 Registration and Course Enrollment

All students are expected to register for each semester before it begins The

registry department determines the dates thus students must adhere to these to

avoid delays in receipt of resources such as books and allowance processing

It is the responsibility of every student to ensure that they are fully registered and

have been issued with proof of registration

43 Grades

431 Publication

The notice board will be used as a formal means of communication and it is the

studentrsquos responsibility to check their results from it While all efforts will be made

to ensure accuracy the School reserves the right to make necessary amendments

to published results

432 Statement of Results

Statement of results will be issued after every semester and issued from the

registrarrsquos office These are a record of academic achievement and must be duly

safeguarded as they will be required by various stakeholders from time to time

433 Result Decisions ndash Interpretations

The results are presented in the following component form ie Coursework Exam

and the Module marks The results for a module may be Pass Fail SupCW SupEx

or SupMod Additionally there is a semester result which gives an indication of

whether a student is proceeding to the next semester repeating failed modules or

they have been discontinued

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 27: BAC Computing and Information Systems Department

26

Pass Student has attained a module mark of 40 and above and either component is 35 and above

PC

Pass with compensation ndash granted for Year 3 progressing to Year 4 at the discretion of the assessment board for only one failed 20 credit module The module must have been attempted during the last offering

Fail Student has attained less than 35 in the module mark

Prcd The student may proceed to the next semesteracademic year

Prcd + Supl

The student may proceed to the next semesteracademic year and has been

allowed to supplement the indicated component(s)

Supl +Review

The decision depends on outcome of supplementary results which then give

the final decision ie student can only register provisionally at the discretion

of the Registrar

Prcd + Rpt

Repeat the module when it is next offered A student must attempt a module

with full attendance up to a maximum of 3 times thus a module may only

be repeated twice If they fail on the second repeat attempt they will then

get a FDis

DRptc

Discontinue and repeat academic year after at least 6 months To be readmitted the student must apply to the registrar A student may repeat an academic year only once after which they will then get a FDis result

FDis

To get a Fail and Discontinue (FDis) a student has proved that they cannot

handle the SCIS programme they have failed an academic year twice or

failed the same module up to 3 times FDis means they will no longer be

eligible for any of the SCIS programmes They may find programmes in

other departments

SupMod

One is awarded a supplement module when the module mark is less

than 40 more than 34 and neither the coursework mark nor the

exam mark is greater than 40 In this case a student will sit for both

the coursework and the examination

SupCW

One is awarded a supplement coursework when the module mark

ranges from 35 to 39 and the exam mark is at least 40

SupEx

One is awarded a supplement exam when the module mark ranges from 35 to 39 and the coursework mark is at least 40

Prcd+Sup+Rpt

A student has earned sufficient credits to proceed they have failed a

module and are sitting for supplements

Rpt

A student repeats failed modules and will not be allowed to proceed

to the next semester academic year

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 28: BAC Computing and Information Systems Department

27

434 Supplements

Whilst every attempt will be made to accommodate repeating students in the timetable it

may not be practically possible to accommodate all the individual cases Students are

therefore urged to work diligently to avoid cases that may result in their academic life

getting complicated This applies to students with carry-forward modules (Prcd+Rpt)

NB Supplementary assessments are offered in the week preceding ie before the

commencement of a new semester The maximum mark that can be attained for a

supplemented component is 40

5 Assessments

51 General All assessments will be subject to moderation Students will be awarded grades based on

two assessment components as below except for project modules which are assessed by

coursework only at 100

Coursework ndash makes up 40 of the overall grade for any module to be undertaken

by the student The coursework is made up of two continuous assessment

components namely

bull At least 1 assignment ndashthis contributes 60 of the coursework

bull At least 1 assessment examination ndash this contributes 40 of the coursework

Final examination ndashthis makes up the remaining 60 of the overall grade

``

NB Students must attempt all assessment components Students can normally

expect feedback for assessed work

52 Assignments and Projects Most modules shall have an assignment which seeks to allow the student to enhance

research skills and in some cases report writing Some modules will require application as

in the case of programming modules Group and individual Projects require a consolidated

report to be submitted

Students are responsible for keeping a backup copy of their submitted work

53 Assessment Examinations

These are normally scheduled to take place mid-way into the semester and apply to all

modules excluding year 4 the individual and group projects

54 Final Examinations

Normally taken at the end of each semester respective dates may be found on the

academic calendar

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 29: BAC Computing and Information Systems Department

28

55 Submission Procedure for Coursework Students will be informed by the school of the submission deadlines for assignments and

projects and it is important to comply with them Normally all submissions are to be done

on TURNITIN for assignments and project documentation by 1159pm Assignment and

project code must be uploaded onto local shared drive by the deadline It is the studentrsquos

responsibility to make sure that their submission details are available on TURNITIN way

before the submission date

56 Late Submission Late submission of assignments will not be accepted

57 Examination Regulations Examinations play a major role in grade determination and as such should be taken

seriously by all students The following guidelines should be adhered to so as to avoid

unnecessary mishaps during the examination period

bull Candidates must be seated in the examination room 30mins before the

start of the examination

bull Candidates will not be allowed to leave the examination room in the first

hour of the examination and within the last ten minutes of the examination

bull No candidate will be allowed back once they have left the examination

room

bull All candidates must have in their possession their student ID cards The ID

cards must be in full display on the top right-hand corner of the desk

bull Every candidate must bring along their own examination accessories

Borrowing or lending of examination accessories will not be allowed

bull Candidates will not be allowed to have examination related materials on

them All examination related materials must be handed over to the

invigilator before the start of the examination

bull Candidates will not be allowed to write on the question papers All rough

work should be written at the back of the answer booklet and crossed out

bull Cellphones and any communication devices will not be allowed in the exam

room

bull No student will be allowed to sit for the examination once it has started

58 Examination Timetables

Examination Timetables are circulated on Notice Boards before the Semester 1 and 2 examinations Students have a responsibility to check timetables for clashes and report any to respective module leaders or the administrative assistant immediately

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 30: BAC Computing and Information Systems Department

29

Always check the Final Timetable to see if any of your exams have been moved MISREADING OF THE TIMETABLE IS NOT A VALID REASON FOR ABSENCE OR LATE ARRIVAL

The Supplementary Exam Timetable is published immediately after publication of each semesterrsquos results Students have to also carefully check their results and confirm the dates to avoid disappointment

59 Absence from Examinations

No special sitting will be provided for missed examinations If one was absent from an examination they must inform the department in writing of the reasons for their absence as soon as possible and in any case before results are confirmed supplying supporting evidence where relevant

510 Repeating Modules

Following a decision by the examination board students may be offered a place to repeat

failed modules or repeat the level The student must apply to repeat to the Registrar and

may be granted permission subject to availability of funding sponsorship and places

Conditions will be as follows

bull Students may choose to repeat failed modules subject to such assessments being

available during that semester and subject to availability of the module and space

which the registrar must approve

bull The student must attend classes for the modules they are repeating and attempt

all its assessment components

511 Results Publication

Once examination marking is complete the examination board sits to consider the results

for all candidates After a complete thorough process all the ratified results will be

published by the department Students should make sure they check for their results

Where there is a conflict between a published results decision and the provisions of this

handbook the handbook provisions take precedence and it is the responsibility of the

students to bring the anomaly to the attention of the appropriate course leader This entails

the completion of a Results Query form and is available from the Registrarrsquos office

512 Transcripts

Transcripts will be issued from the Registrarrsquos office and any issued by any other means

will not be deemed valid Transcripts will be available only after completion of the

programme Duplicate transcripts can be obtained after payment of a fee which is

reviewed from time to time but is currently at P100

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 31: BAC Computing and Information Systems Department

30

513 Request for reassessment

If a student feels their script has been unfairly marked they may request for a remark by filling in a reassessment form and submitting it to the office of the registrar within 7 days of results publication and upon payment of a reassessment fee However for supplementary exams the request must be registered within 2 days of results publication The reassessment fee shall be determined by the college management from time to time The said fee will be refunded should the reassessment result in the fail grade changing to at least a pass grade otherwise it is non-refundable The department will only accept reassessment requests for a fail grade only

514 Mitigation

The School acknowledges that circumstances may arise that make it impossible for students to meet assessment deadlines or sit for examinations These may include but are not limited to illness of a student or family bereavement In the event of such circumstancersquos students must submit documentary evidence along with a mitigation form such as a medical certificate to the Registrarrsquos office who will forward these to the Assessment Board Students shall not submit mitigation and sit for the affected assessment Taking an assessment nullifies mitigation Poor practice financial issues failing to backup assignments and any other foreseeable and preventable circumstances do not constitute mitigation Remember that the acceptance of evidence provided by students is carefully considered

and is not automatic Should the Assessment Board not be satisfied as to the authenticity

of the reasons brought forward then the student will be awarded a zero mark for the missed

component Should the Assessment Board be satisfied and accept the mitigation then the

missed component will be offered to the student at the next available sitting

Communication of the outcome of mitigation will be done in writing through the registrarrsquos

office

A copy of the Mitigation form can be obtained from registry

6 Progression

61 General

A student is permitted to proceed with his or her approved programme only if he or she

maintains acceptable progress as evidenced by attendance of classes satisfactory

performance in examinations and the proper completion of such other work as may be

allotted to the student

62 Year 1 2 and 3 Progression

To progress from semester to semester and year to year a student must have accumulated

no more than 40 failed credits (2 modules worth 20 credits each)

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 32: BAC Computing and Information Systems Department

31

63 Year 3 to Year 4 Progression

Students are required to have passed all modules to proceed to year 4

7 Attendance requirements

bull Attendance to lectures and tutorials is compulsory

bull Attendance for each module should be at least 75 from the official start of the

semester to the point of submission for assignments to the date of assessment

examination sitting and that of the final examination Failure to achieve this

minimum results in the student not being allowed to sit for assessments in that

module

bull Attendance is strictly monitored and records are kept A poor attendance record

can lead to the initiation of disciplinary procedures and could in serious cases lead

to exclusion from the College

bull Attendance is an issue which is often asked about specifically by employers and

education institutions who are seeking references about students Employers place

great weight on this issue - what point is there in employing a brilliant person if they

will not be at work

8 Policy on Cheating and Plagiarism

Students are expected to be above reproach in all scholastic activities Students who

engage in academic dishonesty are subject to disciplinary penalties including the

possibility of failure in the course dismissal from School of Computing and Information

Systems and dismissal from a professional body the student is a member of

Academic dishonesty includes but is not limited to cheating plagiarism and any act

designed to give unfair advantage to a student or the attempt to commit such acts This

definition includes any creativity exercised by the student with an aim of attaining an unfair

advantage Since academic dishonesty harms the individual all students and the integrity

of the School of Computing and Information Systems and the courses it offers policies on

academic dishonesty will be strictly enforced

Cheating and plagiarism are expanded on below Prohibited conduct includes and is not

limited to the following

81 Plagiarism

Plagiarism demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 33: BAC Computing and Information Systems Department

32

Excellent written expression of well-formulated ideas is a fundamental skill for academic

and career success Plagiarism interferes with the assessment and feedback process that

is necessary to promote academic growth Plagiarism defrauds the Lecturer with a false

view of a studentrsquos strengths and weaknesses It may prevent further instruction in areas

of weakness and delay the student in reaching his or her potential

Plagiarism includes but is not limited to

bull Taking someone elsersquos assignment or portion of an assignment and submitting it as

your own

bull Submitting material written by someone else or rephrasing the ideas of another

without acknowledging them

bull Presenting the work of tutors parents siblings or friends as your own

bull Submitting purchased papers as your own

bull Submitting papers from the Internet written by someone else as your own

bull Supporting plagiarism by providing your work to others whether you believe it will

be copied or not

82 Cheating

Cheating demonstrates a lack of integrity and character that is inconsistent with the goals

and values of the School of Computing and Information Systems Education is based on

learning specific skills forming lifelong work habits and developing mature coping skills

according to each studentrsquos unique abilities Stress propels students to make unethical

choices When students choose to cheat it may be a symptom of more serious problems

such as inappropriate career choice over-commitment to extra-curricular activities andor

academic desperation The compromise of their values through cheating may lead to loss

of self-esteem as the students are often painfully aware of their shortcomings and fight a

tiring battle to preserve their images at the cost of their ethics True self-esteem is based

on competence Cheating robs students of their opportunity to become competent

Assignments should be considered individual unless the Lecturer states otherwise

Cheating includes but is not limited to

bull Copying faxing emailing or in any way duplicating assignments that are

turned in wholly or in part as original work

bull Exchanging assignments with other students either handwritten or computer

generated whether you believe they will be copied or not

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 34: BAC Computing and Information Systems Department

33

bull Using any form of memory aid during tests quizzes and examinations

without the express permission of the instructor

bull Using a computer or other means to translate someone elsersquos assignment

from one language into another language and submitting it as your own

bull Giving or receiving answers during tests quizzes and examinations to or

from other students It is your responsibility to secure your papers so other

students will not have the opportunity to copy from you or the temptation to

do so

bull Taking credit for group work when you have not contributed an equal or

appropriate share toward the final result

bull Accessing tests quizzes and examinations for the purpose of determining

the questions in advance of their administration

bull Using summariescommentaries (Cliffs Notes Spark Notes etc) in lieu of

reading the assigned materials

bull Collusion

83 Repercussions and Consequences

Students caught plagiarising and cheating will be subject to a disciplinary hearing The disciplinary committee will pass a resolution which will be forwarded to the Assessment Board which will either ratify or overturn it After the disciplinary hearing the likely penalties include

Zero (0) mark in the exam test or assignment

Writing another exam test or assignment

Notifying the sponsor

Denied admission to further courses

Notifying the concerned Professional body

Should the student feel the resolution passed by the Assessment Board to be unfair then

they may appeal in writing to the Appeals Board

Be aware that cheating is often a joint undertaking Cheating is always harmful to all parties

involved It sacrifices the integrity of the person who provides the materials and robs the

copier of the opportunity to learn and express independent opinion Cheating is not an

individual activity all parties involved are equally guilty and will be subject to the same

consequences

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 35: BAC Computing and Information Systems Department

34

Academic honesty on the part of all students is fundamental to their ethical and

professional development

9 ICT Resources

For guidelines and regulations pertaining to these refer to the ICT student handbook

10 Complaints Procedure Students should use the following procedure for complaints Complaints of an academic nature

bull Speak to the relevant lecturercourse tutor who will try and resolve the problem

informally

bull Write to the Course Manager outlining the nature of the complaint and the resolution

by the lecturercourse tutor

bull Appeal in writing to the Course Director through the office of the registrar The

Directorrsquos decision will be final

Other complaints

bull Write to the Registrar who will liaise with the relevant department (eg hostel

accounts) and try to resolve the problem informally

bull Appeal in writing to the Student Welfare Director through the office of the Registrar

outlining the nature of the complaint and the resolution by the Registrar The Student

Welfare Directorrsquos decision will be final

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 36: BAC Computing and Information Systems Department

35

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Mitigating Circumstances Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip COURSE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip EVIDENCE SUBMITTED (please tick appropriate box and attach evidence)

Letter from Student Letter from Counsellor Sick note (s) Other (eg Death Certificate etc) (Please specify) helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Name and signature of member of staff holding evidence helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DETAILS OF MODULES AND ASSESSMENTS AFFECTED MODULES AFFECTED (Eg AWD CT etc)

ASSESSMENTS AFFECTED (Eg Ass Test Assignment Exam etc)

DATE OF AFFECTED ASSESSMENTSS SEMESTER (eg 1 OR 2)

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Received By helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 SCHOOL OF COMPUTING AND INFORMATION SYSTEMS RECEIPT OF MITIGATION FORM NAME OF STUDENT helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

CIS NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

AUTHORISED SIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

DATE RECEIVED helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form

Page 37: BAC Computing and Information Systems Department

36

SCHOOL OF COMPUTING AND INFORMATION SYSTEMS

Reassessment Form

EVIDENCE OF MITIGATING CIRCUMSTANCES

PLEASE COMPLETE FORM IN BLOCK CAPITALS REF NUMBER helliphelliphelliphelliphelliphelliphelliphelliphelliphellip

NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip CIS NO helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODULE TITLE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip YEARSEMESTERhelliphelliphelliphelliphelliphelliphelliphelliphellip NB Attach proof of payment

COMPONENT TO BE REMARKED (please tick appropriate box and attach copy)

AssignmentProject Assessment test Examination JUSTIFICATIONREASONShelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip

Student Signature helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Date helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Approved Not Approved helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipDate helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip 1048581 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1048581 FOR OFFICIAL USE ONLY OLD MARK helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip NEW MARK AFTER REMARK helliphelliphelliphelliphelliphelliphelliphelliphellip

EXAMINERrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip MODERATORrsquoS NAME helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipSIGNATURE helliphelliphelliphelliphelliphelliphelliphelliphellip helliphelliphellip

DATE helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellip Results query form