Itec111 Lec

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

VPAA-QF-10

Republic of the Philippines


CvSU Mission
CvSU Vision CAVITE STATE UNIVERSITY Cavite State University shall provide
The premier universityin CCAT Campus excellent, equitable and relevant educational
historic Cavite recognized for
excellence in the development
Rosario, Cavite opportunities in the arts, science and

of globally competitive and  (046) 437-9505 /  (046) 437-6659 technology through quality instruction and
relevant research and development activities.
morally upright individuals. cvsurosario@cvsu.edu.ph It shall produce professional, skilled and
www.cvsu-rosario.edu.ph morally upright individuals for global
competitiveness.

DEPARTMENT OF COMPUTER STUDIES

COURSE SYLLABUS
2nd Semester, AY 2021-2022
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Integrated
Course Programming
ITEC111 Course Title Type Lecture Credit Units 2
Code and
Technologies
Course The course compares and contrasts the different encrypting and decrypting techniques for ensuring data security. This also recommends
Description where selection for a scripting language and an application language would be more appropriate.
BSINFO 302-A (Tuesday – 1:00pm to 3:00pm
BSINFO 302-B (Wednesday - 1:00pm to 3:00pm
Pre-
Course Schedule BSINFO 302-C (Tuesday – 3:00pm to 5:00pm
requisites
BSINFO 302-D (Wednesday – 3:00pm to 5:00pm)
BSINFO 302-E (Wednesday – 10:00am to 12:00nn)

Students are expected to live by and stand for the following University tenets:

Core Values TRUTH is demonstrated by the student’s objectivity and honesty during examinations, class activities and in the
development of projects.
EXCELLENCE is exhibited by the students’ self-confidence, punctuality, diligence and commitment in the assigned
tasks, class performance and other course requirements.

V02-2020-06-01
SERVICE is manifested by the students’ respect, rapport, fairness and cooperation in dealing with their peers and
members of the community.
In addition, they should exhibit love and respect for nature and support for the cause of humanity.

The CvSU-CCAT shall endeavor to achieve the following goals:

1. offer various programs/courses relevant to the needs of the clients for global competitiveness;
Goals of the
2. upgrade the qualification and competences of the teaching and non-teaching personnel for quality service;
College/
3. improve facilities relevant for effective and efficient education and training;
Campus
4. engage in research and extension projects/activities that will lead to instruction and community improvement; and
5. strengthen linkages with the local and international agencies for instruction, research, development, and
production.

Objective of The Department of Computer Studies was established to provide quality and equitable education through relevant instruction,
the research and extension services with sustainable leadership in the fields of information technology and computer science
Department towards the development of globally competent and morally upright individuals.

Program Educational Objectives (based on the program CMO)


The BSINFOTECH program aims to produce graduates who can:

1. apply knowledge of utilization of both hardware and software technologies involving planning, installing, customizing,
operating, managing and administering, and maintaining information technology infrastructure that provides computing
solutions to address the needs of an organization;
2. conduct relevant researches and extension program activities in the field of information technology;
3. promote the development and transfer of appropriate information technology;
4. promote environmental preservation and protection on projects and enterprises related to information technology; and
5. become morally upright IT professionals with primary or secondary job roles.

Student Outcomes and Relationship to Program Educational Objectives


Program Educational Objectives
Program/Student Outcomes (based on the program CMO)
Code (based on the program
Bachelor in Technical Vocational Teacher Education
CMO)
1 2 3 4 5

V02-2020-07-01
The students should:
Apply knowledge of computing fundamentals, knowledge of a computing specialization, and
a. mathematics, science, and domain knowledge appropriate for the computing models from ✓ ✓ ✓ ✓ ✓
defined problems and requirements
Identify, analyze, formulate, research literature, and solve complex computing problems and
b. requirements reaching substantiated conclusions using fundamental principle of mathematics, ✓ ✓ ✓ ✓ ✓
computing sciences, and relevant domain disciplines
Design and evaluate solutions for complex computing problems, and design and evaluate
c. systems, components or processes that meet specified needs with appropriate consideration for ✓ ✓ ✓ ✓
public health and safety, cultural, societal, and environmental considerations.
Create, select, adapt and apply appropriate techniques, resources and modern computing tools
d. to complex computing activities, with an understanding of the limitations to accomplish a ✓ ✓ ✓ ✓
common goal
Function effectively as an individual and as a member or leader in diverse teams and in
e. ✓ ✓ ✓ ✓
multidisciplinary settings
Communicate effectively with the computing community as with society at large about complex
f. computing activities by being able to comprehend and write effective reports, design ✓ ✓ ✓ ✓
documentation, make effective presentations and give and understand clear instructions
An ability to recognize the legal, social, ethical and professional issues involved in the utilization
g. of computer technology and be guided by the adoption of appropriate professional, ethical and ✓ ✓ ✓ ✓ ✓
legal practices.
Recognize the need, and have the ability, to engage in independent learning for continual
h. ✓ ✓ ✓
development as a computing professional
i. Assist in the creation of an effective IT project plan ✓ ✓ ✓ ✓
Communicate effectively with the computing community as with society at large about complex
j. ✓ ✓ ✓
computing activities through logical writing, presentations, and clear instructions
Analyze the local and global impact of computing information technology on individuals,
k. ✓ ✓
organizations, and society
Understand professional, ethical, legal, security and social issues and responsibilities in the
l. ✓ ✓ ✓ ✓ ✓
utilization of information technology
Recognize the need for and engage in planning self-learning and improving performance as a
m. ✓ ✓ ✓ ✓
foundation
Course Outcomes and Relationship to Student Outcomes
Program Outcomes Addressed by the Course
Program/Student Outcomes Code
After completing this course, the students must be able to:
A B C D E F G H I J K L M
1.

V02-2020-07-01
2.
*Level : I-Introductory E- Enabling D-Demonstrative
COURSE COVERAGE
Outcom
Due Date
Intended Teaching and es-
of
Wee Learning Learning Mode of based
Topic Resources Needed Submissi
k Outcomes Activities Delivery Assess
on of
No. (ILO) (TLA) ment
Output
(OBA)
1 After the I. Orientation • Discussion • Distance • Course Syllabus
completion of Subject Mode
thechapter, Guidelines and
students will Policies
be able to: Class Policy Grading
1. identify the System Course
course description, Requirement
content,
requirements,
grading system as
well as classpolicy.
2-4 After the II. Cryptography Discussion Face to Presentation graphics • Assign • Before
completion of Introduction to Face ment the end
the chapter, Cryptography Lecture Mode • Referencebook Activity ofWeek
students should • Quiz 2
beable to: The • Individual and/or
1. Identify objectives Activities
Cryptogra of • Distance
phy Cryptogra Mode
2. En phy
u Attacks
m
er
at
e

V02-2020-07-01
th
e
ob
je
cti
ve
of
cr
yp
to
gr
ap
hy
Identify different
typeof attacks
4-5 After the III. Software Discussion Distance Presentation graphics Assign Before
completion of Security Mode ment the end
the chapter, Practices Lecture Activit ofWeek
students should Evidence-based and/or Reference book y Quiz 4
beable to: Security vs.code Individual
1. Differ access security Activities Face to Internet research
entiat Best security coding practices Face Mode materials
e
evide Computer
nce-
base
d
secur
ity
and
code
acce
ss
secur
ity

V02-2020-07-01
Identify the best
security coding
practices
6-8 After the IV. Integrative Discussion Face to Presentation graphics Assign Before
completion of Coding Face ment the end
the chapter, Design PatternsInterfaces Lecture Mode Reference book Activit ofWeek
students should Inheritance y Quiz 6
beable to: Individual and/or Internet research
1. Id Activities materials
en Distance
tif Mode Computer
y
de
si
gn
pa
tte
rn
s
2. Describe
Interface
s
Identify and
describe
Inheritance
9 MIDTERM EXAM
10- After the V. Discussion Face to Presentation graphics Assign Before
11 completion of Overview Face ment the end
the chapter, of Lecture Mode Reference book Activit ofWeek
students should Program y Quiz 11
beable to: ming Individual and/or Internet research
1. Un Language Activities materials
der History of Distance
sta Programming Mode Computer
nd

V02-2020-07-01
the Languages
his Programming paradigms
tor Effects of scale
y
of
pro
gra
m
mi
ng
lan
gu
ag
es
2. Ide
ntif
y
diff
ere
nt
pro
gra
mm
ing
par
adi
gm
s
Identify the effects
of scale
12- After the VI. Scripting Discussion Face to Presentation graphics Assign Before
13 completion of Languages Face ment the end
the chapter, Scripting Lecture Mode Reference book Activit ofWeek
students should Languages y Quiz 13
beable to: Scripting Languages Individual and/or Internet research

V02-2020-07-01
1. U VS.Programming Activities materials
n Languages Distance
d Mode Computer
e
r
s
t
a
n
d

s
c
r
i
p
t
i
n
g

l
a
n
g
u
a
g
e
s
Differentiate
scripting languages
andprogramming
languages

V02-2020-07-01
14- After the VII. Intersystem Discussion Face to Reference book As Before
16 completion of Communications Lecture Face the end
the chapter, Architectures for Mode Internet sig ofWeek
students should integratingsystems researchmaterials 15
beable to: Web services and and/or nm
1. Determine middleware
architectur ent
es for
integrating Ac
systems,
2. Identify tivi
web
services ty
and
middlewar Quiz
e
17 After the VII. Data mapping Discussion Face to Reference book Assign Before
completion of andexchange Face ment the end
the chapter, Metadata Lecture Mode Internet research Activit ofWeek
students should materials y Quiz 16
beable to: Data representation andencoding
Individual and/or
1. Identif Parsing XML documents Activities Computer
y data Distance
repres Mode
entatio
n and
encodi
ng
Determine how to
parse xml
documents
18 Final Examination
COURSE REQUIREMENTS
Lecture Requirements:

V02-2020-07-01
1. Mid-Term / Final Examination (Comprehensive Examination)
2. Quizzes
3. Participation/Recitations (Reflections)
*All exams must follow a Table of Specifications (TOS) and Rubrics for evaluation of student’ performance or projects.
GRADING SYSTEM
Lecture: Midterm / Final Exam (Comprehensive Examination) - 60%
Quizzes - 30%
Class Participation (Reflections) - 10%
-------
100%
STANDARD TRANSMUTATION TABLE FOR ALL COURSES
96.7 – 100.0 1.00
93.4 – 96.6 1.25
90.1 - 93.3 1.50
86.7 – 90.0 1.75
83.4 – 86.6 2.00
80.1 – 83.3 2.25
76.7 – 80.0 2.50
73.4 – 76.6 2.75
70.00 – 73.3 3.00
50.0-69.9 4.00
Below 50 5.00
INC Passed the course but lack some requirements.
Dropped If unexcused absence is at least 20% of the Total Class Hours.
Total Class Hours/Semester: 3 unit Lec – 54 hrs
For lecture with 1 hour (18 hours)
For lecture with 2 hours (36 hours)
For laboratory with 3 hours (54 hours)
For lecture with laboratory with 5 hours (90 hours)
For lecture with laboratory with 6 hours (108 hours)
For lecture with laboratory with 7 hours (126 hours)

CLASS POLICIES
A. Attendance
Students are not allowed to have 20% or more unexcused absences of the total face to face class hours; otherwise, they will be

V02-2020-07-01
graded as “DROPPED”.
B. Classroom Decorum
During face to face mode
Students are required to:
1. wear identification cards at all times;
2. wear face mask at all times
3. observe physical/social distancing at all times
4. clean the classroom before and after classes;
5. avoid unnecessary noise that might disturb other classes;
6. practice good manners and right conduct at all times;
7. practice gender sensitivity and awareness inside the classroom; and
8. come to class on time.
During distance mode
Students are required to:
1. sign an honor system pledge;
2. avoid giving or receiving unauthorized aid of any kind on their examinations, papers, projects and assignments,
3. observe proper netiquette during on-line activities, and
4. submit take home assignments on time.
C. Examination/ Evaluation
1. Quizzes may be announced or unannounced.
2. Mid-term and Final Examinations are scheduled.
3. Cheating is strictly prohibited.A student who is caught cheating will be given a score of ”0” for the first offense. For the
second offense, the student will be automatically given a failing grade in the subject.
4. Students who will miss a mid-term or final examination, a laboratory exercise or a class project may be excused and
allowed to take a special exam, conduct a laboratory exercise or pass a class project for any of the following reasons:
a. participation in a University/College-approved field trip or activity;
b. due to illness or death in the family; and
c. due to force majeure or natural calamities.
REFERENCES & SUPPLEMENTARY READINGS
References:
A. Required Textbook/Workbook

B. Reference Books
Delfs, H. & Knebl, H.,. Introduction to Cryptography
Berisa, A., (2020). Information Assurance and Security Handout

V02-2020-07-01
Shiralkar, T & Grove, B, ( 2009), Guidelines for Secure coding
Websites
https://www.slideshare.net/vijipriyacse/ipt-chapter-
5?from_action=save https://www.c-
sharpcorner.com/UploadFile/84c85b/net-code-access-security-cas/
www.lynda.com
https://www.freecodecamp.org/news/the-basic-design-patterns-all-developers-need-to-know/
https://www.dotnettricks.com/learn/oops/understanding-inheritance-and-different-types-of-inheritance

*Reference must be available to library incase not available faculty must provide the e-books to library to make it available

REVISION HISTORY
Revision
Date of Revision Date of Implementation Highlights of Revision
Number
1 September 2021 1st Semester 2021-2022 Content
Prepared by: Evaluated by: Recommending Approval: Approved:

MARIE ANGELIE GERIOS ARIES M. GELERA MARILOU P. LUSECO JOSE P. LISAMA, EdD
Instructor I Department Chairperson Director, Instructions Campus Administrator
Marieangelie.geriost@cvsu.edu.p Department of Computer Studies CCAT Campus CCAT Campus
h aries.gelera@cvsu.edu.ph Date Recommended: Date Approved:
Department of Computer Studies Date Evaluated: _____________ ___________________ ___________________
Date Prepared: June 2022

V02-2020-07-01

You might also like