|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
(3 Units) Introduction to Visual Basic programming for business applications. Covers principles of object oriented, interactive, and file maintenance programming. Several business application programs will be written. Prerequisites: CIS 2000. (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) Introduction to Java programming for business applications. Covers the principles of object oriented, interactive, and file maintenance programming. Emphasis will be placed on Graphical User Interfaces and web programming. (Formerly Java/C++ Programming) Prerequisites: Computer literacy (such as CIS 2000). (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) A continuation of CIS 2010. Places emphasis on advanced programming methods and techniques in COBOL. Students will become knowledgeable in file creation, data retrieval, report formatting, data sorting, table structures, advanced debugging tools, in conjunction with features of COBOL Report writer software. Field trips may be required for on-site exposure. (Formerly CIS 3011) Prerequisites: CIS 2010. (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) A continuation of CIS 2020. Places emphasis on advanced programming methods and techniques in Visual Basic. (Formerly CIS 3730 Structured Programming) Prerequisites: CIS 2020 (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) A continuation of CIS 2030. Students will be introduced to advanced programming techniques including Object Oriented Design, array processing, recursion, user defined methods, and advanced GUIs and graphics. (Formerly Advanced Java/C++ Programming) Prerequisites: CIS 2030 or equivalent. (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) Overview of the value and applications of IT to business organizations with a management perspective. Topics of interest may include: current trends of IT infrastructure, strategic roles of IT, enterprise systems and supply chain management, e-Commerce and EDI, knowledge management, decision making model, DSSs, artificial intelligence and expert systems, data mining, data base management, multidimensional data bases, and IS planning and development. Lab projects will focus on the application of IT to the design and development of models for improving managerial decision making. (Credit may not be given for both CIS 3700 and CIS 3780). (Formerly CIS 2700) Prerequisites: CIS 2000 or equivalent. (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) An introduction to interactive computer graphics with emphasis on business and management applications. Topics will include the graphic representation of data, coordinates systems, graphic primitives, transformations, display structures, types of display, and data acquisition devices. Prerequisites: Computer literacy (such as CIS 2000) and CIS 2010. (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) A focus on management considerations of information technology specifically microcomputers, in the business environment. Students will prepare projects involving hands-on learning of decision support, data base, financial accounting, marketing, operations, software in microcomputers. Satisfies G.E. area F3. Prerequisites: Computer Literacy (such as CIS 2000). (Credit may not be given for both CIS 3700 and CIS 3780.) (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) How to locate and use information effectively for research and personal productivity. Specification of information requirements, effective information search and retrieval methodologies, modeling, and data analysis. Prerequisites: CIS 2000 or CS 2000 or CS 4000 and upper-division standing. (Lecture, 2 hours; laboratory, 2 hours)
-
3.00 Credits
(3 Units) Course provides an initial exposure to personal computer security. Includes identifying security complexities introduced when computers are used in a networked environment, identifying possible threats, and creating and enforcing a security policy in a real world business environment.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|