• Tidak ada hasil yang ditemukan

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

N/A
N/A
Protected

Academic year: 2023

Membagikan "BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY "

Copied!
81
0
0

Teks penuh

There is no doubt that Information Technology has become the main core in the development process within public and private organizations in the age of technology and information. Providing academic programs that qualify specialized and excellent workforce in the field of computer science and information technology in the Kingdom of Saudi Arabia, conduct scientific research and offer consulting services contributes to solving technical and informatics issues in Saudi society. To keep up with academic progress in international universities in the field of Computing and Informatics.

All countries strive to equip their population with the latest tools and technologies in the field of IT and software engineering. To prepare qualified and trained students to meet the needs of the labor market in the field of information technology and to obtain higher degrees; by providing exceptional education with the latest and most adequate knowledge, best practices and skills in the field of information technology. Communicate effectively with team members within the institution and contribute to decision-making processes.

Total 21

Total 5 Year 2

Total 17

Total 18 Year 3

Total 15

  • Field Experience (internship, cooperative program….)
  • Project or Research Requirements (if any) a. Brief description
  • Admission Requirements for the program
  • Attendance and Completion Requirements
  • LEARNING FACILITIES AND EQUIPMENT
    • Facilities required
    • Classrooms
    • Equipment (including IT)

Information Technology Science Program January 2021 14 choose a development project to work on. The focus in this part will be on low-level design, implementation, testing and quality assurance as well as project management. Science in Information Technology Program January 2021 15 - give a presentation to an audience of peers and.

Assessment will include assessment of the following items - A complete written report by the student. The college has provided students with new facilities to impart quality education. All classes are regularly monitored to ensure that none of the assets are in poor or disorderly condition.

Course Descriptions

In addition to these, each classroom is equipped with general facilities such as air conditioning, adequate lighting and proper seating arrangements. Blackboard system as educational software with accounting for all teachers and students to manage their academic activities and conduct virtual sessions.

1 - UNIVERSITY REQUIREMENTS

Credit 16 Hours

The Q:Skills series from the world famous Oxford University Press has been chosen as the official textbook of the course which students purchase from a distributor. The Q:Skills series is one of the leading EFL course textbooks available in the current market. In this regard, the skills of reading, writing are covered in the first two hours of the face-to-face class, while the listening and speaking book will be covered in the second part of the face-to-face class.

The overall aim is therefore to develop the students' ability to communicate as effectively as possible in the English language. Conduct a research protocol and access knowledge through searches, mainly print and electronic search engines available in the English language. Learn about the culture of the English-speaking world and benefit from their experiences.

Contact 4 Hours

برنامج علوم تكنولوجيا المعلومات يناير 2021 21 مقدمة في أجهزة الكمبيوتر وتكنولوجيا المعلومات (الإصدار الثاني)، 2016. برنامج علوم تكنولوجيا المعلومات يناير 2021 25 آسف.

2 - College requirements

Contact 3 Hours

In this course, students will be taught to work on complex data structures and algorithms. The main focus of this course is to prepare the transition from conventional functional programming to more relevant object-oriented programming. Also includes key data structures, including stacks, queues, linked lists, binary trees, recursion, and examples that use some fundamental algorithms of computer science.

Outlines concepts such as inheritance, polymorphism and reusability with special emphasis on object oriented programming. Design and implement programs using object-oriented programming concepts such as encapsulation, inheritance, polymorphism, abstract classes and methods. Demonstrate proficiency in understanding the application of various data structures to heterogeneous real-life problems.

The purpose of this course is to familiarize students with the principles, architecture and operation of a standard operating system. Upon completion of this course, students will appreciate the significance of the operating system for program efficiency, synchronization, multi-tasking, and other related topics. Topics include: Computer and Operating System Structures, Process and Thread Management, Process Synchronization and Communications, Memory Management, Virtual Memory, File System, I/O Subsystem and Device Management, and Selected Examples in Networking, Protection and Security.

Recognize the impact of the interaction between design decisions and operating system features on the performance and stability of programs.

Coursework 25 25

It introduces students to interference, diffraction and polarization, magnetic fields; electromagnetic waves; Maxwell's four equations; Modern physics and applications, Molecules and solids; Semiconductors and semiconductor devices. The course introduces students to the importance of maintaining a computer-based database using a DBMS and its potential advantages for the organization. Students upon completion of this course will be able to understand key database concepts and develop a simple database for a small organization using standard DBMS.

In this course, students are required to study the following topics: Basic concepts in database systems and architectures; Entity-relationship model, data models (including the basics of relational model and SQL), database design (database dependencies and normalization), database implementation. This course provides students with hands-on experience with the most advanced networking tools, technologies, standards and protocols. Present the aspects of practical work to an audience of colleagues and staff in the form of a final report.

Topics covered are: measures of central tendency; measures of dispersion; graphical presentation of data; linear regression; basic concepts of probability; binomial and normal probability distributions; confidence intervals; and hypothesis testing of the mean, proportion for one or two populations. Show, reproduce and describe the issues and practices of Statistics how they use statistical data in Business. Explain the issues and practices of Statistics and how they use statistical data in Business.

3 - Major requirements

The purpose of this course is to introduce students to the application of IT systems in various professional spectrums in the form of information systems. Topics include basic hardware, software, data, and an overview of the use of information technology in organizations. This course also provides an understanding of information systems and describes the concepts of how IS can provide competitive advantage.

This course introduces the fundamental principles of problem analysis and software design to college students. Program in Science in Information Technology, January 2021 53 Network Management: Principles and Practice, 2nd Edition, Mani. Program of Science in Information Technology January 2021 54 Technology Entrepreneurship, 2nd Edition, Natasha E, James C and Thomas H, ISBN.

Information Technology Science Program January 2021 55 Enterprise Information Systems: A Model-Based Approach, 3rd Edition Cheryl L. Information Technology Science Program January 2021 56 Business Intelligence and Analytics: Systems for Decision Support, 10th Edition, 2014, Ramesh Sharda, Dursun Delen and Efraim Turban, ISBN Pearson/Prentice Hall. This course will equip undergraduate Information Technology students with the basic skills to conduct research in the field of Information Technology.

The course will focus mainly on topics related to the field of information technologies. Natural Sciences in Information Technology program January 2021 62 Course description: All elective course descriptions are given in a separate section after these descriptions. This course provides an introduction to the field of professional issues related to social and ethical issues in computing.

This course introduces the concepts and issues related to securing information systems and developing policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security sources, and the role of policies, people, and processes in information security. This course aims to provide students with a basic and fundamental knowledge concept of mobile computing.

4 – ELECTIVE COURSES DESCRIPTION

This course emphasizes the core concepts of the cloud computing paradigm and infrastructure system, network and storage virtualization, service and deployment models, and cloud programming models. Students in this course will analyze and evaluate various cloud computing solutions to achieve high availability, scalability, infrastructure automation, decoupling and web scale storage. This course focuses on fundamentals of cloud computing security based on current standards, protocols and best practices.

This course shows how a modern cloud system is built, designed and maintained, debugged, evaluated and tested. This course will provide an in-depth understanding of how modern networks are designed, their weak points, and both traditional and future approaches to making them resilient. Program of Science in Information Technology January 2021 73 security, enterprise network security, IP security, data center operations protection and relevant protocols, etc.

Information Technology Science Program January 2021 74 Course Description: Cyber ​​forensics is a very critical area of ​​21st century IT organizations because this knowledge provides the means to control and combat various types of cybercrime . This course focuses on the fundamental principles of cyber medicine methodology and new investigative techniques related to the identification, collection and preservation of digital crime scene evidence. This course exposes students to the basic concepts of wireless sensor networks and their applications.

This course introduces students to fundamental concepts of IoT, the evolution of IoT in modern times, protocols used in IoT. This course describes the network parameters for IoT systems and its different elements, challenges new architectural models, transport methods, features and communication criteria that use smart objects. This course focuses on the space that includes both advanced M2M solutions and Subnets of Things, distinguishes between the Industrial IoT and the Consumer IoT, produces the talent that enables new business applications to connect with physical devices and machines.

This course ensures the protection of personal data, the application of the legal principles, as well as the effective information security of services, IoT ecosystems and privacy, connectivity interfaces with security implications.

Referensi

Dokumen terkait

Page 22 of 50 Units theoretical and practical Training hours Theoretical Practical Employing modern technology in hotels 4 8 Technology uses in hotel departments 4 8 Specialized