Lab.
Lec.
Contact Hours
1Tot.
Lab.
Lec.
Credit Units
1Course No
Course Code Course
Information CIS 413 670258 2 0 2 2 0
1
Every unit equals a minimum of 50 minutes in theory lecture or minimum 100 minutes in practical laboratory.
University Requirement College Requirement Program Requirement Core Elective
Track
Computer Science (CS)
Computer Information Systems (CIS) Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)
Program
None Prerequisite
6 Level
Course Description
This course introduces the students to the legal, social, and ethical issues of information technology and use.
The course focuses on topics such as information assurance and security, growth and control of the internet, information rights, intangible digital intellectual property, liability, accountability, philosophical foundations of privacy protection, security, crime, ethical principles, codes of ethics, "the digital divide", philosophical foundations of intellectual property, role of Patent and Technology Transfer offices, role of government, role of law enforcement, role of business and industry; professional conduct, social responsibility, and rigorous standards for software testing and reliability.
Students read, write, discuss, and present reports on these topics: fraud and abuse, electronic communication privacy, mail fraud, credit card abuse, privacy protection, copyright and patent statute, digital-rights management, communication decency, ACM code of ethics and professional conduct, dispute resolution policy, privacy implications of widespread data collection for transactional databases, data warehouses, surveillance systems, and cloud computing, Ramifications of differential privacy, technology-based solutions for privacy protection, cultural and environmental impacts of implementation decisions (e.g. organizational policies, economic viability, and resource consumption), law and computer, Saudi anti-cybercrime law.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe the role of intellectual property in computing profession. (SO:0; PI:0.1)
2. Assess professional implications in the design and usage of technological systems (SO:4;PI:4.2) 3. Analyze the risks associated with usage of computing technology at individual, organizational, and
societal levels. (SO:6;PI:6.2)
4. Develop communication skills through presentation to peers on ethical and unethical aspects of computing technologies. (SO:3;PI:3.2)
5. Write technical reports on ethical, legal and social impact of computing and responsibilities of computing professionals. (SO:3;PI:3.1)
6. Show skills to work in a group project in a cohesive manner to produce quality deliverables.
(SO:5;PI:5.1)
7. Show skills to structure themselves to work in a cohesive manner (SO:5;PI:5.2)
11/19/2020 62
Assignment(s)
15%
Quiz(zes) Grading
(assessment
strategies) Project(s) 20% Lab
Mid-term (II) 20%
Mid-term (I)
Final 40%
Participation 5%
Textbook:
Sara Baase, Timothy M. Henry (2017) “A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the
Internet”, 5th edition, ISBN-10: 0134615271 ISBN-13: 978-0134615271 PearsonReference Book:
1. Ethics & Information Technology Journal
2. Michael J. Quinn, (2016) Ethics for the Information Age, Global Edition, 6/E, ISBN-10: 1292061235
• ISBN-13: 9781292061238, Pearson Higher Education.
3. Association of Computing Machinery Code of Ethics 4. Saudi Anti Cyber Crime Law available at
https://www.boe.gov.sa/ViewSystemDetails.aspx?lang=en&SystemID=217&VersionID=232
Brief list of topics to be covered
- IT and Unexpected Developments - Privacy
o
Philosophical foundations of privacy rights
oLegal foundations of privacy protection
o
Privacy implications of widespread data collection for transactional databases, data warehouses, surveillance systems, and cloud computing
o
Ramifications of differential privacy
o
Technology-based solutions for privacy protection - Intellectual Property
- Evaluating and controlling Technology - Errors, Failures and Risks
- Professional Ethics and Responsibilities, ACM code of ethics and professional conduct, Ethical argumentation
- Growth and control of the Internet
- Philosophical foundations of intellectual property - Intangible digital intellectual property (IDIP)
- Legal foundations for intellectual property protection
-Cyber Crime and Saudi Anti-Cybercrime Law - Digital rights management
- Being a sustainable practitioner by taking into consideration cultural and environmental impacts of implementation decisions (e.g. organizational policies, economic viability, and resource
consumption).
11/19/2020 63
Course
Name Operating Systems ليغشتلا مظن
Course Information
Course Code Course No Credit Units
Lec. Lab. Tot. Contact Hours
1Lec. Lab.
CS 322 670252 2 1 3 2 2
1
Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement
Core Elective Program
Computer Science (CS)
Computer Information Systems (CIS) Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 7 Prerequisite 670249 - CS 314
Course Description
This course introduces the fundamentals of the modern operating systems design and implementation. It covers the different techniques used by the operating system to achieve its goals as resource manager. The topics provide the student with the basic concepts, structures, and algorithms that work as intermediary software between the user and the hardware. The course also discusses how applications interact with the operating system and how the operating systems interact with the machine. Some of the existing operating systems will be highlighted as examples to explain how the topics taught in the course are applied in these systems.
Course Learning Outcomes (CLOs)
After successful completion of this course, students will be able to:
1. Explain how to use the Linux operating system commands.
2. Identify the processes and threads of a process 3. Compare various processor scheduling algorithms
4. Compare various process/thread synchronization methods.
5. Evaluate structure/organization of modern file systems
6. Evaluate modern memory management techniques used in Operating Systems Grading
(assessment strategies)
Quiz(zes) 10% Assignment(s)
Project(s) Lab 25%
Mid-term(I) 20% Mid-term (II)
Participation 5% Final 40%
Textbook:
• Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating Systems Concepts", 10
thEdition”, 2018 Wiley.
• Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating Systems Concepts", 9th
Edition”, 2013 Wiley.
11/19/2020 64
Reference Book:
1. W. Stallings, “Operating Systems: Internals and Design Principles”, Prentice Hall. Latest Edition.
2. Jean Bacon, Tim Harris “Operating Systems”, Addison-Wesley, Latest Edition Lab Book:
• “Linux Essentials”, Roderick W. Smith, Sybex, 2012.
Brief list of topics to be covered
• Operating System Concepts & Structure
• Processes
• Threads
• Process Synchronization
• CPU Scheduling
• Deadlock
• Main Memory
• Virtual Memory
• File System
11/19/2020 65
Dalam dokumen
academic year 2020-2021 artificial intelligence
(Halaman 72-76)