|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
This course is a continuation of Introduction to Java Programming (CTIM157). It develops advanced Java programming skills that are required to fully utilize the capabilities of this object-oriented, general-purpose programming language. Topics covered include exception handling, streams and file input/output, dynamic data structures, recursion, swing objects, applets and HTML, and graphics objects. The student will create sophisticated applets and applications. Lecture: 2 hours Laboratory: 2 hours Prerequisite: Introduction to Java Programming (CTIM157) or Departmental Approval
-
3.00 Credits
This course will cover personal computer components and configuration. This hands-on hardware approach is intended to provide the student with real-world exposure to computer repair and maintenance. The student will use system diagnostics to analyze and repair personal computer system faults. The emphasis will be on troubleshooting and replacing individual system components such as memory, hard drives, floppy drives, video cards, modems, and other components. Lecture: 2 hours Laboratory: 2 hours
-
3.00 Credits
This course introduces the students to the help desk field and to the concepts needed to run a successful help desk. The major components of a help desk (people, process, technology, and information) are examined in detail. The advantages and disadvantages of different types of help desks, career trends and certification, performance measures, and issues related to minimizing stress and avoiding burnout are also considered. Students develop customer service skills including listening skills, written and verbal communications, handling difficult customers, and solving and preventing problems.
-
3.00 Credits
This course is designed to give those in the computer and security professions an understanding of the challenges of protecting information assets and the resources available to meet those challenges. An introduction to information/ computer security is followed by an examination of the need for security and the legal, ethical, and professional issues faced by professionals in this field. Students will then examine the methodologies within the five stages (Security Analysis, Logical Design, Physical Design, Implementation, and Maintenance and Change) of the development, implementaion, and maintenance of a new security system within an organization or the improvement of an existing security system.
-
3.00 Credits
No course description available.
-
1.00 Credits
No course description available.
-
1.00 Credits
No course description available.
-
3.00 Credits
No course description available.
-
3.00 Credits
No course description available.
-
3.00 Credits
This course will provide students with the tools for supervising people and technology in the rapidly changing information systems environment through a study of management theories, supervisory styles, and personnel procedures. Problem-solving and critical-thinking skills will be developed and applied to business situations. Topics covered include facilities layout and design, work standards and job analyses, work measurement and simplification, budgetary considerations, and the effective utilization of human resources.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|