|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
This course introduces students to the concepts of technology mobility and the role that new and smaller computing devices play in new systems development. The student will be introduced to the field of mobile systems architecture and apply this knowledge to the creation of architectures using both mobile and traditional computing resources. Following this the student will learn about development using today's popular mobile devices and develop their own architecture and system based on mobile devices.
-
3.00 Credits
This course is an introduction to the basic concepts of information security. Topics include security threats, attacks, defenses against attacks, risk management, basic cryptography, and trusted information systems. Students will have an opportunity to learn a variety of state-of the-art tools that are being used in industry. There will be hands-on applications to strengthen concepts learned in class.
-
3.00 Credits
This course is an introduction to the basic concepts of technologies that are used on the Web. Topics include: Web basics, standards, and infrastructure, client/server architecture on the Web, page presentation using markup languages and style sheets, the Document Object Model (DOM), client-side programming and server-side programming, Web data representation, and Web services.
-
3.00 Credits
This course is an introduction to the basic software components of an operating system. Topics include process management, storage management, processor management, auxiliary storage management, evaluation of an operating system's performance, networks, operating system security, case studies of particular operating systems.
-
3.00 Credits
Digital Forensics entails the collection, organization, explanation, and presentation of evidence assembled in the course of investigations initiated by legal and law enforcement personnel to substantiate or refute legal proceedings of a criminal or non-criminal nature. Because computer scientists play a key role in defining and using technologies for digital forensics, their involvement in such activities is extremely critical. The purpose of this course is to engage the student into digital forensics activities from three viewpoints. The first viewpoint involves looking at digital forensics from the standpoint of the activities and issues faced by the digital forensics expert. The second viewpoint is to consider the nature of the contributions that computer scientists can make to the field of digital forensics through the creation and advancement of algorithms to aid in forensics analytical tasks. Finally the third viewpoint will be to examine digital forensics from the viewpoint of the legal personnel involved and to consider their requirements for evidence and explanation.
-
3.00 Credits
This is the first course in a two semester capstone sequence. This course introduces the fundamental principles of software engineering. Coverage will include the System Development Lifecycle (SDLC) methodologies, capturing requirements, design modeling, project management, risk management, and quality assurance. Students will learn techniques for requirements elicitation, prioritization, validation, and specification. They will be introduced to various design models that are used to capture requirements.
-
3.00 Credits
This is the second course in a two semester capstone sequence. This course presents the advanced principles of software engineering. Coverage will include the professional responsibilities of the software engineer, implementation, testing, configuration management, and the project management. Students will be introduced to different development and testing approaches.
-
3.00 Credits
Database technology is fundamental to all information technology. Seldom is there a system that has been developed today without some kind of database component. This course provides the students with a fundamental understanding of database concepts, how to create, modify, and access databases, the different types of databases, and an introduction to advanced database topics.
-
3.00 Credits
An introduction to finite state automata and regular expressions; the Myhill Nerode theorem and the minimization of finite automata; context free grammars, the Chomsky normal form; the Greibach normal form, and push-down automata; properties of context free languages; Turing machines; computability and the halting problem, the Chomsky hierarchy; deterministic context free languages and LR(k) grammars.
-
3.00 Credits
This course combines students from computer science and information technology programs with students taking a course offered by another academic department into interdisciplinary teams that solve a problem or create a prototype product within the domain of that application discipline or disciplines. Student teams analyze problems or opportunities in the disciplinary application domain. They use rapid prototyping techniques that combine off-the-shelf software and custom software to create a prototype software system, and they present or exhibit this system to an audience interested in the domain.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|