You are on page 1of 99


BS Information


Division of Science and Technology

University of Education, Lahore
Table of Contents
Sr. No. Content Page. No.

1 Mission Statement 2

2 Rationale 2

3 Program Objectives 2

4 Program Design 3

5 Eligibility Criteria 3

6 Program Template 4

7 Program Layout 5

8 Scheme of Studies 9

9 Detail of Courses 14

Page 1 of 98
BS Information Technology
Mission Statement:

The primary aim of the program is to prepare students with broad, integrated IT
knowledge and teaching skills including programming, computer networking, database
management, software development and software engineering.


BSIT program is designed to equip the students with firm foundations of Information
Technology to face the challenges and evolution of Information Technology in
organizations. It also fulfills the need of professional teachers in the field of Information

Program Objectives:

The main objectives of the BS Information Technology program are:

1. To nurture software development and problem-solving skills, clarity of thought, and


2. To hone the skills that facilitates learning and integrating new tools and

3. To build a strong foundation in theoretical concepts in computing and software


4. To cultivate skills that caters to organizational needs, such as system maintenance,

management of data, and secure access.

5. To prepare students for effective oral and technical communication.

6. To foster a sense of professional and ethical responsibilities.

7. To prepare students for graduate studies, as well as for careers in the industry.

8. To develop the teaching skills through specialized curriculum.

Page 2 of 98
Program Design:

Duration: 4 Years (8 Semesters)

Semester Duration: 16-18 Weeks

Total Credit Hours: 138 Credit Hours

Eligibility Criteria: Intermediate or Equivalent with Mathematics / Computer Science

/ Information Technology course as per UE rules.

Page 3 of 98
Program Template
Sr. No. Categories No of Courses Credit Hours

1 Compulsory Courses 10 28

2 General Courses from other Disciplines 5 15

3 Foundation Courses 10 33

4 Major Courses 12 35

5 IT Elective Courses 7 21

6 IT Capstone Project 1 6

Total 45 138

* IT Elective courses will be chosen from the list of elective courses depending upon the

availability of the experts.

Page 4 of 98
Program Layout
Compulsory Courses
Sr. No. Course Title Credit Hours

1 Functional English 3

2 Communication Skills 3

3 Technical Writing and Presentation Skills 3

4 Calculus-1 3

5 Introduction to Statistics and Probability 3

6 Elementary Linear Algebra 3

7 Electronics 3

8 Digital Logic and Design 3

9 Pakistan Studies 2

10 Islamic Studies 2

Total 28

Page 5 of 98
General Courses from other Disciplines

Sr. No. Course Title Credit Hours

1 Foundations of Education 3

2 General Methods of Teaching 3

3 Educational Assessment 3

4 Curriculum Design and Instruction 3

5 Human Resource Management 3

Total 15

Page 6 of 98
Foundation Courses
Sr. No. Course Title Credit Hours

1 Information Systems 3

2 Programming Fundamentals 4

3 Discrete Mathematics 3

4 Software Engineering 3

5 Object Oriented Programming 4

6 Data Structures and Algorithms 3

7 Database Systems 4

8 Operating Systems 3

9 Computer Communications and Networks 3

10 Technology Management 3

Total 33

Page 7 of 98
Major Courses
Sr. No. Course Title Credit Hours

1 Web Engineering 3

2 Database Administration and Management 3

3 Human Computer Interaction 3

4 Multimedia Systems and Design 3

5 System and Network Administration Windows Based 3

6 Object Oriented Analysis and Design 3

7 System and Network Administration Linux Based 3

8 Internet Architecture and Protocols 3

9 IT Project Management 3

10 Professional Practices 2

11 Network Security 3

12 Cloud Computing 3

Total 35

Page 8 of 98
Scheme of Studies
Credit Hours
Sr. No. Course Code Course Title Page. No.
Theory Lab Total
1 ENGL1114 Functional English 3 0 3 14

2 ISLA1111 Islamic Studies 2 0 2 15

3 EDUC3111 Foundations of Education 3 0 3 17

MATH1111 Calculus-1 3 0 3 19

5 PHYS1113 Electronics 3 0 3 20

6 ITEC1111 Information Systems 3 0 3 21

Total 17

Sr. No. Course Code Course Title Credit Hours Page. No.
Theory Lab Total
1 ENGL1119 Communication Skills 3 0 3 23

2 PAKS1111 Pakistan Studies 2 0 2 24

3 EDUC1112 General Methods of Teaching 3 0 3 25

4 MATH2113 Discrete Mathematics 3 0 3 27

5 PHYS4129 Digital Logic and Design 2 1 3 28

6 COMP1112 Programming Fundamentals 3 1 4 29

Total 18

Page 9 of 98
Credit Hours
Sr. No. Course Code Course Title Page. No.
Theory Lab Total
1 ENGL2115 Technical Writing and 3 0 3 30
Presentation Skills
2 EDUC3143 Educational Assessment 3 0 3 32

3 Introduction to Statistics and 3 0 3 34

4 MATH2114 Elementary Linear Algebra 3 0 3 35

5 COMP2111 Object Oriented Programming 3 1 4 36

6 COMP2112 Software Engineering 3 0 3 38

Total 19


Credit Hours
Sr. No. Course Code Course Title Page. No.
Theory Lab Total
1 EDUC2118 Curriculum Design and Instruction 3 0 3 39

2 COMP2113 Data Structures and Algorithms 2 1 3 41

3 COMP2114 Database Systems 3 1 4 43

4 COMP2115 Operating Systems 3 0 3 45

5 COMP3112 Computer Communications and 3 0 3 47

6 ITEC2111 Technology Management 3 0 3 49

Total 19

Page 10 of 98

Sr. No. Course Code Course Title Credit Hours Page. No.
Theory Lab Total
1 ITEC3111 Web Engineering 2 1 3 50

2 ITEC3112 Database Administration and 2 1 3 51

3 COMP3113 Human Computer Interaction 3 0 3 54

4 ITEC3113 Multimedia Systems and Design 3 0 3 55

5 ITEC3114 System and Network 2 1 3 56

Administration Windows Based

6 ITEC3115 Object Oriented Analysis and 3 0 3 57

Total 18

Credit Hours
Sr. No. Course Code Course Title Page. No.
Theory Lab Total
1 ITECXXXX IT Elective I 3 0 3 69-98

2 ITEC3116 System and Network 2 1 3 58

Administration Linux Based
3 ITECXXXX IT Elective II 3 0 3 69-98

4 ITEC3117 Internet Architecture and Protocols 3 0 3 59

5 ITEC3118 3 0 3 60
IT Project Management

Total 15

Page 11 of 98
Credit Hours
Sr. No. Course Code Course Title Page. No.
Theory Lab Total
1 ITECXXXX IT Elective III 3 0 3 69-98

2 ITEC4111 Network Security 3 0 3 62

3 ITECXXXX IT Elective IV 3 0 3 69-98

4 BUSA2115 Human Resource Management 3 0 3 64

5 ITEC4112 Professional Practices 2 0 2 66

6 COMP4111 IT Capstone Project 3 0 3 67

Total 17


Credit Hours
Sr. No. Course Code Course Title Page. No.
Theory Lab Total

1 ITECXXXX IT Elective V 3 0 3 69-98

2 ITECXXXX IT Elective VI 3 0 3 69-98

3 ITEC4113 Cloud Computing 3 0 3 68

4 ITECXXXX IT Elective VII 3 0 3 69-98

5 COMP4111 IT Capstone Project 3 0 3 65

Total 15

Note 1: Six credit hours teaching practice (Non-Creditable) will be mandatory to fulfill the
requirements of the degree.
Note 2: Teaching practice comprising of three weeks will be mandatory before the start of third
and fifth week.

Page 12 of 98
IT Elective Courses
Sr. No. Course Code Course Titles Credit Hours Page No.

1 ITEC4114 Enterprise Resource Planning Systems 3 69

2 ITEC4115 Formal Methods in Software Engineering 3 70

3 ITEC4116 Advance Web Application Development 3 71

4 ITEC4117 Network Design and Management 3 73

5 ITEC4118 Distributed Database Systems 3 74

6 ITEC4119 Artificial Intelligence 3 76

7 ITEC4120 Electronic Commerce 3 78

8 ITEC4121 Data Warehousing 3 80

9 ITEC4122 Software Quality Assurance 3 81

10 ITEC4123 Geographical Information System 3 83

11 ITEC4124 Data Mining 3 84

12 ITEC4125 Design Patterns 3 86

13 ITEC4126 Business Process Management 3 87

14 ITEC4127 Software CASE Tools and Applications 3 88

15 ITEC4128 Computer Graphics 3 90

16 ITEC4129 Software Design and Architecture 3 91

17 ITEC4130 Mobile Application Development 3 93

18 ITEC4131 Distributed Computing 3 95

19 ITEC4132 Computer Architecture 3 96

20 ITEC4133 iOS Applications Development 3 97

Page 13 of 98
Detail of Courses
Course Title: Functional English
Course Code: ENGL1114
Credit Hours: 3
Objectives:To enhance language skills and develop critical thinking
Course Outline:
Use of grammar in context: Parts of speech, Tenses: meaning and use, Use of active
and passive voice, Use of articles and prepositions, Different sentence patterns,
combining sentences
Oral Communication Skills (Listening and Speaking): Express ideas/opinions on
topics related to students' lives and experiences, Participate in classroom discussions on
contemporary issues.
Reading and Writing Skills: Skimming, Scanning, Identifying main idea/topic
sentence, Inference and prediction , Recognizing and interpreting cohesive devices, Note
taking and note making, Generating ideas using a variety of strategies e.g. brainstorming
.Developing a paragraph outline (topic sentence and supporting details): Vocabulary
building skills
To develop the ability to use a dictionary

Recommended Books:
 Collins COBUILD Students' Grammar. London: Longman
 Eastwood, J. 2004. Oxford Practice Grammar.New Ed., with tests and answers. O UP
 Fisher, A. 2001. Critical Thinking. C UP 16
 Goatly, A. 2000. Critical Reading and Writing: An Introductory Course. London:
Taylor & Francis
 Hacker, D. 1992. A Writer's Reference. 2nd Ed. Boston: St. Martin's
 Hewing, M. Advanced Grammar in Use. New Ed. C UP
 Murphy, Raymond. Grammar in Use. C UP
 Swan, M. and Walter C. How English Works. Oxford: O UP
 Thomson & Martinet. Practical English Grammar. O UP
 Wallace, M. 1992. Study Skills. C UP
 Yorky, R Study Skills

Page 14 of 98
Course Title: Islamic Studies
Course Code: ISLA1111
Credit Hours: 2

The main objectives of this course are to:

 Provide basic information about Islamic studies.
 Enhance understanding of the students regarding Islamic civilization.
 Improve student’s skill to perform prayers and other worships.
 Enhance the skill of the students for understanding of issues related to faith and
religious life.
Courses Outline:

Introduction to Quranic Studies: Basic concepts of Quran, History of Quran, Uloom-

Study of Selected Text of Holy Quran: Verses of Surah Al-Baqrarelated to faith (Verse
No-284-286), Verses of Surah Al-Hujratrelated to Adab Al-Nabi (Verse No-1-18),
Verses of Surah Al-Mumanoonrelated to characteristics of faithful (Verse No-1-11),
Verses of Surah Al-Furqanrelated to social ethics (Verse No.63-77), Verses of Surah Al-
Inamrelated to ihkam (Verse No-152-154).
Study of Selected Text of Holy Quran: Verses of Surah Al-Ihzabrelated to AdabAl-
Nabi (Verse No.6,21,40,56,57,58.), Verses of Surah Al-Hashar (18,19,20) related to
thinking, Day of Judgment, Verses of Surah Al-Safrelated to tafakar, tadabar (Verse No-
Seerat of Holy Prophet (S.A.W) I: Life of Muhammad Bin Abdullah (Before Prophet
Hood), Life of Holy Prophet (S.A.W) in Makkah, Important lessons derived from the life
of Holy Prophet in Makkah.
Seerat of Holy Prophet (S.A.W) II: Life of Holy Prophet (S.A.W) in Madina,
Important events of life Holy Prophet in Madina, Important lessons derived from the life
of Holy Prophet in Madina.
Introduction to Sunnah: Basic concepts of Hadith, History of Hadith, Kinds of Hadith,
Uloom –ul-Hadith, Sunnah& Hadith, Legal position of Sunnah.
Selected Study from Text of Hadith:
Introduction to Islamic Law &Jurisprudence: Basic concepts of Islamic law
&jurisprudence, History &importance of Islamic law &jurisprudence, Sources of Islamic
law &jurisprudence, Nature of differences in Islamic law, Islam and sectarianism.

Page 15 of 98
Islamic Culture & Civilization: Basic concepts of Islamic culture &civilization,
Historical development of Islamic culture &civilization, Characteristics of Islamic
culture &civilization, Islamic culture &civilization and contemporary issues.
Islam & Science: Basic concepts of Islam &science, Contributions of Muslims in the
development of science, Quran&science.
Islamic Economic System: Basic concepts of Islamic economic system, Means of
distribution of wealth in Islamic economics, Islamic concept of Riba, Islamic ways of
trade &commerce
Political System of Islam: Basic concepts of Islamic political system, Islamic concept of
sovereignty, Basic institutions of Govt. in Islam.
Islamic History: Period of Khlaft-e-Rashida, Period of Ummayyads, Period of
Social System of Islam: Basic concepts of social system of Islam, Elements of family,
Ethical values of Islam.
Recommended Books:
 Nawaz, M. TafheemIslamiyaCompulsory.Qureshi Brothers Publishers.
 Akhtar, H. M. MehyariIslamiyat Compulsory.
 DrTahir-Ul-QadriSeeriat-ai-Rasool.
 DrTahir-Ul-Qadri, Minhajussavi.
 Prof GhulamRasulIslamkaTaleemiNizam.
 Dr Khalid Naqvi, Islamic Social System.
 Prof Khursheed ,Islamic Nazria Hayat.
 Hafiz Jalundri ,Shahnama Islam.
 Hameedullah Muhammad, Emergence of Islam, IRI,Islamabad.
 Hameedullah Muhammad, Muslim Conduct of State.
 Hameedullah Muhammad, Introduction to Islam.
 Hussain Hamid Hassan, An Introduction to the Study of Islamic Law, leaf
Publication Islamabad, Pakistan.
 Ahmad Hasan, (1993). Principles of Islamic Jurisprudence, Islamic Research
Institute, International Islamic University, Islamabad.
 Mir Waliullah, (1982) Muslim Jurisprudence and the Quranic Law of Crimes,
Islamic Book Service.
 H.S. Bhatia, (1989).Studies in Islamic Law, Religion and Society, Deep & Deep
Publications New Delhi.
 Dr. Muhammad Zia-ul-Haq, (2001).Introduction to Al Sharia Al Islamia.
AllamaIqbal Open University, Islamabad.

Page 16 of 98
Course Title: Foundations of Education
Course Code: EDUC3111
Credit Hours: 3
The main objectives of this course are to:
 Understand and analyze the elements and the processes of Education.
 Comprehend the process of education in philosophical, psychological, sociological
and economical perspectives.
 Discuss the philosophical thoughts of educational thinkers.
 Discuss the significant educational initiatives from 2002 to date.

Course Outline:

Concept, Types and Process of Education: Concept of education meaning, Scope and
importance, Modes of education informal, Formal and non-formal, Elements of the
process of education, Aims and objectives, Curriculum, Pedagogy, Evaluation.

Philosophical Perspective: What is Philosophy? Explaining Educational Philosophy,

Branches of Philosophy, Metaphysical, EpistemologyandAxiology.
Educational Philosophies: Assumptions, Curriculum, Role of teacher and student,
Classroom management and evaluation, Perennialism, Progressivism, Essentialism,
Psychological Perspective: Educational psychology, Concept and meaning, Role of
Psychology in selecting content, Role of Psychology in pedagogy.
Socio-economic Perspective: Educational Sociology, Concept and meaning,
Sociological roles in education (conservative, critical and creative), Economic
foundations of education, Education as investment, Education and national development,
Pakistani perspective.
Significant Educational Initiatives: Education sector reform, Current education
Policyand vision 2025.
Teaching and Learning Strategies: In general Collaborative and interactive
approaches. Discussion/assignments/presentations, Projectsusing “learner-centered”
methods, “Reflective Journals” on each session, Maintaining course portfolios.

Page 17 of 98
Recommended Books:
 Ahmed, K. (1972). Principles of Islamic Education. Islamic Publications Ltd.
 Canestrari, A. (2009). Foundations of Education. New York: Sage Publications.
 Goldblatt, P.F., & Smith, D. (2005). Cases for teacher development. New York: Sage
 Gutek, G. L. (2004). Philosophical and Ideological Voices in Education. Boston:
 Government of Pakistan, Ministry of Education (2002). Education Sector Reforms
Action Plan. Islamabad.
 Government of Pakistan. (2009). National education policy. Islamabad.
 Mangal, S.K. (2012). Advanced Educational Psychology.PHI learning: New Delhi.
 Ornstein, A.C and Levine, D.U (1995). An Introduction to the Foundations of
Education. Boston: Houghton Mifflin Company.
 Semel, S. F. (2010). Foundations of education: The essential texts. USA: Routledge.

Page 18 of 98
Course Title: Calculus-I
Course Code: MATH1111
Credit Hours: 3

The main objectives of this course are to:
 Apply the definition of limit to evaluate limits by multiple methods and use it to
derive the definition and rules for differentiation and integration.
 Use derivatives to analyze and graph algebraic and transcendental functions.
 Apply the definition of definite integral to evaluate basic integrals.

Course Outlines:

Preliminaries: Intervals, Inequalities, Functions, Graphs of Functions, Lines, Circles,

Parabolas, Shifting and Scaling of Graphs
Limits and Continuity: The Precise Definition of a Limit, Calculating Limits Using the
Limit Laws, One-Sided Limits, Limits at Infinity, Infinite Limits and Vertical
Asymptotes, Continuity
Differentiation: Secant and Tangent Lines, Rates of Change, The Derivative, Physical
and Geometric Interpretation of a Derivative, Techniques of Differentiation, The Chain
Rule, Implicit Differentiation, Linearization, Differentials
Applications of Derivatives: Extreme Values of Functions, Monotonic Functions and
the First Derivative Test, Concavity, Rolle’s Theorem, The Mean-Value Theorem, Curve
Sketching: Graphs of Polynomials and Rational Functions, Applied Optimization
Problems, Indeterminate Forms and L’Hôpital’s Rule
Derivatives of Transcendental Functions: Logarithmic and Exponential Functions,
Derivatives of Logarithmic and Exponential Functions, Graphs Involving Logarithmic
and Exponential Functions, Inverse Functions, Derivatives of Hyperbolic and Inverse
Hyperbolic Functions, Derivatives of Inverse Trigonometric Functions

Recommended Books:
 Anton, H. (2012). Calculus. Laurie Rosatone
 Stewart, J. (2015). Calculus.Cengage Learning

Page 19 of 98
Course Title: Electronics
Course Code: PHYS1113
Credit Hours:3
The main objectives of this course are to:

 Understand the working of active and passive components in electronic circuits

 Understand the designing of rectifiers, amplifiers, oscillators, and multi-vibrators
Course Outline:
Special Diodes: Zener diodes, zener regulators, Schottky diodes, light emitting diodes,
photo diodes, tunnel diodes and their applications.
Transistor Circuits: Junction transistors, the volt ampere curve of a transistor, the
current amplification factors, relations between the amplification factors, the load line
and Q point, the basic transistor amplifiers, simplification of the equivalent C-E circuit,
the Transconductance common meter amplifier, the conversion of the h parameter, the
common collector amplifier
DC bias for the transistor: Choice of the Q point, variation of the Q point, fixed
transistor bias, the four resistor bias circuit, voltage feedback bias, emitter follower bias
FET: Field effect Transistors, Junction FET, and MOSFET, Operation, construction,
Biasing, Common source and common drain amplifiers.
Operational Amplifiers: Parameters of Op- amp, non inverting and inverting circuit,
Op- amp. Applications, comparators, summing, subtractor, integrator and differentiator.
Frequency response RC Amplifiers: Cascaded amplifier, the amplifier pass band low
frequency response, the low frequency limit, the unpassed emitter resistor, miller effect,
high frequency response, the frequency limit of the transistor.
Oscillators: Armstrong, Hartely, Colpit’s, Phase shift oscillators.

Recommended Books:
 Kasap, S. O. (2006). Principles of electronic materials and devices. McGraw-Hill.
 Floyd, T. L. (2008). Electronic devices: conventional current version. PEARSON
Prentice hall.
 Peebles, P. Z., Read, J., & Read, P. (2001). Probability, random variables, and
random signal principles (Vol. 3). Boston, Mass, USA: McGraw-Hill.
 Ryder, J. D. (1980). Electronic fundamentals and applications. Prentice-Hall.
 Boylestad, R. L., &Nashelsky, L. (2002). Electronic Devices and Circuit Theory,
Eight Edition. Prentice Hall (Pearson Education Inc.).

Page 20 of 98
Course Title: Information Systems
Course Code: ITEC1111
Credit Hours: 3
The main objectives of this course are to:
 Explain to students why information systems are so important today for business
and management.
 Evaluate the role of the major types of information systems in a business
environment and their relationship to each other.
 Assess the impact of the internet and internet technology on business electronic
commerce and electronic business.
 Identify the major management challenges to building and using Information
Systems and learn how to find appropriate solutions to those challenges.
 Define an IT infrastructure and describe its components.
 Learn the core activities in the systems development process.
 Cultivate skills and experience in the development and implementation of
information systems projects.
Course Outline:
Systems Theory and IT Concepts:
Introduction to information systems, Information System Resources, Fundamental role of
I.S. in Business Types of information systems, Components of IS, System processing
and hardware Input devices, Output devices, Understanding Systems and application
softwares, Elements of computer based information system (CBIS),Telecommunication
and networks, devices and structure, The internet, Intranet and extranet, Systems
performance and standards.
Roles of Information and Information Technology:
Decision Making, Marketing and Business Growth, Customer Support and Satisfaction,
Resource management and globalization.
Information Systems and Organizational System:
Understanding organizations and their environment. Management levels of organization,
Structure of organizations, Organizational pressures and responses, System model of
organization. Role of MIS in enterprise, Value of MIS function, Competitive advantage,
Understanding MNC Integrating IOS and GIS in organizations. Value chain models,
Supply chain management, End user computing. Knowledge management Decision
making and problem solving. Strategic planning for information resources.
IS planning and Change Management: Change management, Implementation,
Information systems, Organizational changes, Organizational culture.
Electronic Commerce:
Electronic Commerce and its infrastructure,. Types of Ecommerce, Scope of e-commerce
in businesses, Understanding Internet structure and internet services, Introduction to M-

Page 21 of 98
commerce, URL, protocols and IP addresses, Infrastructure of e-commerce.
IS Development Process:
System users and system development. System development life cycle, Prototyping.
System oriented and problem oriented approach of system development.
Evaluation of System Performance: Types and levels of monitoring and evaluation
activities, What are indicators, Methods and tools for monitoring and evaluation, System
monitoring and evaluation process.
Organizing data in organization:
Database Management,Dimensions of information, Understanding File system and
DBMS, Business intelligence, Database types centralized and distributed database
concepts, Data ware housing and data mining, ER-Modeling ,Relational database model,
Creating Database in MS Access,
Information systems in action:
Decision Support systems, EIS, TPS, FIS, AIS, HRIS and Expert systems, MKIS,
Customer relationship management systems. Executive information systems. Intelligent
systems and office automation systems (OIS)
Strategic planning for information resources:
Introduction,Wiseman’s strategic perspective view.
Information system security:
Understanding Information security, types of IS security, Elements if IS security,
Objectives of IS security, Types of threats on information and their countermeasures,
Risk management, Backup process and RAID, Information security policy.
Cryptography. IPR, Copyrights, privacy and protection, Access control,
Societal and Ethical Issues related to IS design and Use:
Moral ethics and laws, piracy and infringement, Software patent and legislation.
Professional responsibility. Ethics and the information services, Codes of Ethics, Some
Global issues.
Recommended Books:
 Raymond Mcleod . Management Information Systems 10th Edition.
 Laudon, Kenneth C. & Laudan Jane P. Management Information System: (latest
 Kelly. R., Rainer, J. & Turban,. F, Introduction to Information Systems: Supporting
and Transforming Business, Publisher: Wiley; 2ndedition, 2008.
 Lewis.P, Information Systems Development, Pitman Publishing.
 Jessup.L, & Joseph.V, Information Systems Today: Managing in the Digital World,
Prentice Hall; 3rdedition, 2007.

Note: in addition to the above, any other text or book referred by Instructor may
also be included

Page 22 of 98
Course Title: Communication Skills
Course code: ENGL1119
Credit Hours: 3
The main objective of this course is to enable the students to meet their real life
communication needs.
Course Outline:
 Oral presentation skills (prepared and unprepared talks)
 Preparing formal letters
 Writing different kinds of applications (leave, job, complaint, etc.)
 Preparing a Curriculum Vitae (CV), (bio-data)
 Writing short reports
Recommended Books:
 Ellen, K. 2002. Maximize Your Presentation Skills: How to Speak, Look and Act on
Your Way to the Top
 Hargie, O. (ed.) Hand book of Communications Skills
 Mandel, S. 2000. Effective Presentation Skills: A Practical Guide Better Speaking
 Mark, P. 1996. Presenting in English. Language Teaching Publications.

Page 23 of 98
Course Title: Pakistan Studies
Course Code: PAKS1111
Credit Hours: 2

The main objectives of this course are:

 To impart an understanding of the fundamental principles and teaching of Pakistan studies.
 To take an analytical view in the history and development of Muslim society and culture in
the subcontinent, emergence of Pakistan and its constitutional development.
 To develop an appreciation of the issues of challenges currently being faced in Pakistan.
 To look at the strengths of its people and strategies to deal with the impediments to
 To have a view on International Relations of Pakistan.

Course outline:

Historical Perspective:Ideological rationale with special reference to Sir Syed Ahmad

Khan, Allama Muhammad Iqbal and Quaid-i-Azam Muhammad Ali Jinnah, Factors
leading to Muslim separation, Indus civilization, Muslim advent, Location and geo-
physical features.
Government and Politics in Pakistan: Political and constitutional phases: 1947-58;
1958-71;1971-77; 1977-88; 1988-99; 1999 onward.
Contemporary Pakistan: Economic institutions and issues, Society and social structure,
Ethnicity, Foreign policy of Pakistan and challenges, Futuristic outlook of Pakistan.

Recommended Books:

 ShahidJavedBurki.(1980)The State and Society in Pakistan.The Macmillan Press

 Akbar Zaidi,(2000),Issue in Pakistan’s Economy, Oxford University Press, Karachi.
 S.M. Burke and Lawrence Ziring.(1993)Pakistan’s Foreign Policy: An Historical
analysis, Oxford University Press.
 SafdarMehmood, (1994). Pakistan’s Political Roots and Development.
 AnsarZahid. (1980).History and Culture of Sind, Royal Book Company, Karachi.
 Khali Bin Sayeed,(1967) Political System of Pakistan by Boston, Houghton Mifflin.

Page 24 of 98
Course Title: General Methods of Teaching
Course Code: EDUC1112
Credit Hours: 3
The main objectives of this course are to:
 Describe the importance of the efficient teaching methodology in the overall
teaching learning process.
 Appreciate the characteristics of various methods of teachings.
 Select a suitable method or strategy to make his/her teaching effective in local
 Apply various teaching methods and strategies during teaching of their subjects.

Course outline:

The Concept and Principles of Teaching: Concept of teaching, Features of teaching,

Planning for teaching, Principles of teaching.
Teaching Methods/ Strategies and their selection: Concept of methods, Strategies,
tactics and techniques, Criteria for selection of a method/ strategy, Selection of method /
Methods of Teaching: Lecture method, Text book method, Discussion method, Team
teaching, Demonstration method, Project method, Activity method, Assignment method,
Problem solving method, Inductive &deductive method, Drill method, Socratic method,
Simulated teaching, Programmedinstruction, Computer assisted instruction, Personalized
system of instruction.
Lesson Planning: Introduction to lesson planning, Steps of lesson planning, Types of
lesson planning, Evaluation of lesson planning, Instructional objectives in behavioral
terms (Blooms Taxonomy).
Planning Instruction in the relevant Content Area: The students will learn to teach
different topics in their relevant subject. For example, BS Mathematics students will
learn and plan how to teach numbers, geometry, fraction etc. The students will also
micro teach before going for teaching practice.
Teaching Learning Strategies: Lecture method followed by discussion and question,
Answer method, Cooperative learning, Students are required to prepare and maintain
course portfolio, Assignments and presentations / quizzes based on the content of the
course outline and project using “do-it-yourself” or “learner-centered” methods.

Page 25 of 98
Recommended Books:

 Westwood, P. (2008). What Teachers Need to Know about Teaching Methods,

Australia .Camberwell, Vic: ACER Press.

 Mukalel,J.C(2003). Creative Approaches to Classroom Teaching, Delhi: Discovery

Publishing House.

 Smith, B.O (1983). Elements of Teaching. Columbia Teacher’s College Press.

Page 26 of 98
Course Title: Discrete Mathematics
Course Code: MATH2113
Credit Hours: 3


The main objectives of this course are to:

 Identify and apply basic concepts of set theory, arithmetic, logic, proof
techniques, binary relations, graphs and trees.
 Produce convincing arguments, conceive and/or analyze basic mathematical
proofs and discriminate between valid and unreliable arguments.
 Apply the knowledge and skills obtained to investigate and solve a variety of
discrete mathematical problems.
 Reflect on your own learning and that of peers.

Course Outline:

Combinatorics:The basics of counting, Pigeonhole principle, permutation,

combinations, recurrence relations, inclusion-exclusion principle
Elementary Logic: Logics of order zero and one, Propositions and connectives, truth
tables, conditionals and bi-conditionals, quantifiers, methods of proofs, proofs involving
Graph Theory: Graphs and Sub-graphs, Complete Graphs, Regular Graphs, Bipartite
Graphs, Trees, Planar Graphs, Isomorphic Graphs, Paths, Euler and Hamilton Graphs,
Labeled and Weighted Graphs, Graph Coloring

Recommended books:
 Rosen, K. H. (2012). Discrete Mathematics and Its Applications. New York,
McGraw-Hill Companies.
 Ross, K. A. and Wright C. R. B. (2003). Discrete Mathematics. Englewood
Cliffs, Prentice Hall,
 Lipschutz, S. and Lipson, M. (2007). Discrete Mathematics. New York,

Page 27 of 98
Course Title: Digital Logic and Design
Course Code: PHYS4129
Credit Hours: 2+1
The students will be able to understand:
 Digital circuits using Boolean algebra and to implement digital circuits with
different logic gates and capable of designing both sequential and combinational
circuits for microprocessor based systems.
 Design considerations for the telecommunication systems using analog integrated
Course Outline:

Review of number systems: Binary, octal and hexadecimal number system their inter
conversion basic logic gates.

Boolean algebra: Demorgan theorem, simplification of Boolean expression by Boolean

postulates and theorem, K maps and their uses, don’t care condition, different codes
(BCD, ASCII, Gray etc). Parity in codes.

Combinational logic circuit: Logic circuits based on AND-OR, OR-AND, NAND,

NOR Logic gates design, addition, subtraction, 2’s compliments, half adder, full adder,
half subtractor, full subtractor in coder, decoder, multiplexer and demultiplexer.

Sequential logic circuit: Flip- flop, latches, J, K T and D flip flops, Master- slave flips-

IC logic families: Basic characteristics of a logic family. (Fan in/out, Propagation delay
time, dissipation, noise margins etc. Different logic based IC families (DTL, RTL, TTL,

List of Experiments:
1. Design and study of a half and full with different Boolean expression
2. Construct and study RS, JK, T, D Flip Flops by using IC’s
3. To construct and understand an operation of arithmetic logic unit and study
different operation of it.
4. Design and study the application of operational amplifier (current to voltage
converter, voltage clamp, integrator and differentiator)
Recommended Books:
 Nashelsky, L. (1972). Introduction to digital computer technology.
 Debenham, M. J. (2013). Microprocessors: principles and applications. Elsevier.
 Mano, M. M. (1988). Computer engineering hardware design. Prentice-Hall, Inc.
 Tokheim, R. (2007). Digital Electronics. 7th ed McGraw Hill.

Page 28 of 98
Course Title: Programming Fundamentals
Course Code: COMP1112
Credit Hours: 3+1
The main objectives of this course are to:
 Introduce students with the concepts of programming using the industry standard
 Understand fundamentals of programming such as variables, conditional and
iterative execution, methods, etc.
 Have the ability to write a computer program to solve specified problems.
 Use the selected programming language to create, debug and run programs.
Course Outline:
Introduction to Programming: Problem solving, Introduction to programming and
programs, Types of languages, Compiler vs. Interpreter.
Overview of Programming: Structure of Program, indentation and coding conventions,
Program output, Syntax rules, Common errors, Language keywords.
Data Types: Identifiers, Constants, Types of variables, Type conversion and casting,
Type promotion rules.
Operators: Arithmetic operators and punctuations, Precedence, Associations, Equality
and relational operators.
Control Statements: Selection structure (if/, if/else), Multiple selection structure (switch
and break), break and continue, Loops.
Arrays: Declaring arrays; Initialization, Multidimensional arrays, Two dimensional
array, Example (Matrix manipulation), Assignments, Mini Project.
Methods/Functions: Library functions, Modular Approach, Functions, Function
definitions. Function prototypes.
Class Fundamentals: Class syntax, General form of class, Object declaration.
Recommended Books:
 D.E. Stevenson. (2006). Programming Language Fundamentals by Example,
Auerbach Publications; 1st edition.
 Herbert Schildt. (2010).The java 2 Complete Reference. JBD Press.
 Donald E. Knuth, (1997). Art of Computer Programming, -Wesley Professional; 3rd
Note: in addition to the above, any other text or book referred by Instructor may
also be included

Page 29 of 98
Course Title: Technical Writing and Presentation Skills
Course Code: ENGL2115
Credit Hours: 3
The main objective of this course is to:
 Enhance language skills and develop critical thinking
Course Outline:
Presentation skills : Elements of an effective speech, Getting ready for presentation
(organizing data), During the Presentation. (gaining attention, presenting data, working
with visuals etc.), After the presentation (revision, question answer session, feedback),
Presentation ethics
Essay writing: Descriptive, narrative, discursive, argumentative, Parts of essay
Academic writing: How to write a proposal for research paper/term paper, How to write
a research paper/term paper (emphasis on style, content, language, form, clarity,
Report Writing: Types of Reports, Formats
Note: Extensive reading is required for vocabulary building
Recommended books:
 Technical Writing and Presentation Skills
 Essay Writing and Academic Writing
 Writing. Advanced by Ron White. Oxford Supplementary Skills. Third
Impression 1992.ISBN 0194354073 (particularly suitable for discursive,
descriptive, argumentative and report writing).
 College Writing Skills by John Langan. McGraw-Hill Higher Education. 2004.
 Patterns of College Writing (4th edition) by Laurie G. Kirszner and Stephen R.
MandelLSt.-Martin's Press
 The Mercury Reader. A Custom Publication compiled by norther Illinois
University. General Editiors: Janice Neulib; Kathleen Shine Cain; Stephen
Ruffus and Maurice Scharton. (A reader which will give students exposure to the
best of twentieth century literature, without taxing the taste of engineering
Advanced Academic Writing
Advanced writing skills and strategies building on English I & II in semesters I and II:
 Writing summaries of articles
 Report writing
Page 30 of 98
 Analysis and synthesis of academic material in writing
 Presenting an argument in assignments/term-papers and examination answers
Recommended Readings:
 Aaron, J. 2003. The Compact Reader. New York: Bedford
 Axelrod, R. B and Cooper, C.R. 2002. Reading Critical Writing Well: A Reader
and Guide
 Barnet, S. and Bedau, H. 2004. Critical Thinking, Reading and Writing: A Brief
Guide to Writing. 6th Edition.
 Behrens & Rosen. 2007. Reading and Writing Across the Curriculum.
 Gardner, P. S. 2005. New Directions: Reading Writing and Critical Thinking
 George, D. and Trimbur, J. 2006. Reading Culture: Context for Critical Reading
and Writing. 6th Edition
 Goatly, A. 2000. Critical Reading and Writing: An Introductory Course. London:
Taylor & Francis
 Grellet, F., Writing for Advanced Learners of English. CUP
 Jordan, K. M. and Plakans, L. 2003. Reading and Writing for Academic Success
 Jordon, R. R. 1999. Academic Writing Course.CUP.
 Smith, L. C. 2003. Issues for Today: An Effective Reading Skills Text
 Withrow J., Effective Writing. CUP

Page 31 of 98
Course Title: Educational Assessment
Course Code: EDUC3143
Credit Hours: 3
The main objectives of this course are to:
 Understand different concepts used in educational assessment.
 Differentiate between the various forms of assessment.
 Understand classification of the types of assessment and their usability.
 Design and construct assessment that measures a variety of learning outcomes.
 Apply principles of assessment in planning a classroom assessment.
 Apply strategies to construct valid and reliable test items.
 Recognize both the potentialities and the limitations of the various types of tests &
assessment procedures used in the schools.
 Interpret assessment results effectively.

Course Outline:

Introduction to Educational Assessment: Introducing the concepts; Test,

Measurement, Assessment and evaluation, Instructional process and role of assessment,
Assessment of and assessment forlearning, Principles of assessment, Classification of
assessment on the basis ofnature of assessment, Purpose of assessment, Forms of
assessment, Methods of interpreting results, Teacher made vs. standardized test.
Planning Classroom Assessment: Instructional aims, Goals and objectives, General vs.
Specific Learning Outcomes, Taxonomy of education objectives, Developing assessment
framework, Developing test specifications, Selecting appropriate type of test items.
Types of Achievement Test: subjective Vs objective: Constructing objective test items,
Characteristics, Different types, Rules to construct, Scoring, Advantages and limitations,
Constructingsubjective test items, Characteristics, Different types, Rules to construct,
Developing scoring rubrics and scoring, Advantages and limitations.
Assessment Techniques in Affective and Psychomotor Domains: Observation, Self-
reports, Questionnaire, Interview, Rating scales, Anecdotal record, Checklists, Peer
Test Appraisal: Qualities of good test, Validity, Reliability, Usability, Item analysis
forachievement test, Item discrimination, Item difficultly, Building item bank.

Page 32 of 98
Interpreting Test Scores: Functions of grading and reporting,Types of grading and
reporting, Relative vs.absolute scoring, Assigning letter grades, Record keeping and
grading software, Use of feedback of assessment.
Teaching Learning Strategies: Lecture method followed by discussion and question
answer method, Cooperative learning, Students are required to prepare and maintain
course portfolio, Assignments and presentations / quizzes based on the content of the
course outline and project using “do-it-yourself” or “learner-centered” methods,
Development of test items.

Recommended Books:

 Ebel, Robert (2004). Essentials of Educational Measurement. India: Prentice hall.

 Freeman, Richard, (2004). Planning and Implementing Assessment. New York:
Rout ledge Flamer.
 Linn, R. L. (2008). Measurement and assessment in teaching. Pearson Education

Page 33 of 98
Course Title: Introduction to Statistics and Probability
Course Code: STAT2111
Credit Hours: 3
The main objectives of this course are to:
 Understand the statistical models graphically and mathematically.
 Realize the handling of data and to manipulate the data as per the requirements.
 Illustrate the averages, i.e., mean, median, mode, variance and standard deviation
 Understand the concept of basic probability and probability distribution.

Course Outline:

Preliminaries: Frequency distribution, Histogram, Pie-Chart, Multiple bar graph,

Cumulative frequency curve and polygon, Mean , Mode, Median, Variance and standard
Deviation, Quartiles, Deciles, Percentiles, Coefficient of variation, Scatter plots,
Correlation coefficient, Methods of least squares, Regression line, Curve fitting.
Probability: Sample Space, Event, Mutually exclusive events, Exhaustive events,
Equally likely events, Axioms of probability, Tree diagram, Law of complement, Law of
addition, Conditional probability, Law of multiplication, Dependent and independent
Events, Bayes’ formula, Repeated independent trials, Binomial, and normal distributions.

Recommended Books:

 Lipschutz, L. Introduction to Probability and Statistics. McGraw-Hill.

 Freund, J. E. Mathematical Statistics, Prentice-Hall.

Page 34 of 98
Course Title: Elementary Linear Algebra
Course Code: MATH2114
Credit Hours: 3
The main objectives of this course are to:
 Set up and solve systems of linear equations.
 Perform matrix operations as appropriate Evaluate determinants and use their
 Understand and use linear transformations.
 Perform LU decompositions.
 Evaluate and apply eigenvectors and eigenvalues.
Course Outline:
Vectors in Rn and Cn: Vectors in Rn, Linear combination of Vectors, Dot (Inner)
Product, Angle Between Vectors, Projections, Cauchy-Schwarz Inequality, Minkowski
Inequality, Hyperplanes, Lines, Vectors in R3(Spatial Vectors), Cross Product,
Lagrange’s Identity, Solving Vector Problems using a Computer Algebra System (CAS):
Maple, Mathematica or Matlab
Algebra of Matrices: Matrices, Squares of Matrices, Trace, Powers of Matrices,
Polynomials in Matrices, Invertible Matrices, Orthogonal Matrix, Normal Matrix,
Hermitian Matrix, Unitary Matrix, (Complex) Normal Matrix, Block Matrices; Dealing
Matrices with Maple, Mathematica or Matlab.
Systems of Linear Equations: System of Linear Equations and Its Solutions, Equivalent
Systems, Elementary Operations, Gaussian Elimination, Echelon Matrices, Row
Equivalence, Homogeneous System of Linear Equations, Elementary Matrices, LU
Decomposition; Solving Linear Systems with Maple, Mathematica or Matlab
Determinants: Determinants, Properties of Determinants, Minors and Cofactors,
Classical Adjoint, Cramer’s Rule, Principal Minors, Block Matrices and Determinants
Recommended Books:
 Lipschutz, S. and Lipson, M. (2009). Linear Algebra. New York, McGraw-Hill
 Kolman, B. (2007). Elementary Linear Algebra with Applications. Toronto,
 Anton, H. (2005). Elementary Linear Algebra. John Wiley & Sons

Page 35 of 98
Course Title: Object Oriented Programming
Course Code: COMP2111
Credit Hours: 3+1

The main objectives of this course are to:

 Develop student’s knowledge and programming skills about object-oriented

paradigm for developing error free reliable programs.
 Understand fundamentals of object-oriented programming in Java, including
defining, classes, invoking methods, using class libraries, etc.
 Write and enhance classes, arrays, inheritance and polymorphism, abstract classes
and interfaces, I/O streams, exceptions.
 Use the Java SDK environment to create, debug and run simple Java programs.

Course Outline:

Basic of Object Oriented Programming: Evolution of object oriented Paradigm,

Object oriented concepts and principles, problem solving in object oriented paradigm,
Object oriented program design process.
Class Fundamentals; Classes, methods, objects and encapsulation; constructors and
destructors, operator and function overloading, virtual functions.
Inheritance: Derived classes, Member access, Super, Types of inheritance.
Polymorphism: Methodoverriding, Dynamicmethod dispatch, Abstract classes and
variables, Final keywords.
Interfaces: Define interface, Implements and apply interfaces,Variable in interfaces and
extent interface.
Exception Handling:Exception fundamental, Exception types, Built-in and User defined
File Handling: I/O and file processing,Practical, Assignments and mini project.

Recommended Books:

 Cay S. Horstmann& Gary Cornell, (2007) Core Java(TM), Volume I--Fundamentals,

Prentice Hall PTR; 8 edition.
 Ira Pohl(1997), “Object-Oriented Programming Using C++”, 2ndedition., Addison
Wesley, ISBN: 0-201-89550-1.
 Sunil K. Pandey (2007),.THINKING IN C++, S.K Kataria& Sons.

Page 36 of 98
 Herbert Schildt. (2010).The java 2 Complete Reference, JBD Press.
 Stanley B. Lippman (2000); “Essential C++”, Addison Wesley, ISBN: 0-201-
 Budd, Addison Wesley. Understanding Object Oriented Programming. Addison
 Deitel and Deitel, (2009). Java: How to Program, 5/e, Prentice Hall, International
 Deitel and Deitel. C++: How to Program, 4/e, Pearson.

Page 37 of 98
Course Title: Software Engineering
Course Code: COMP2112
Credit Hours: 3
The main objectives of this course are to:
 Build understanding about various aspects of software engineering.
 Acquire knowledge required for building anddelivering high-quality maintainable
 Deliver software projects on time and within budget.

Course Outline:

Introduction to Software Engineering:Scope of Software Engineering (SE), Software

lifecycles; Alternative techniques, Extreme programming.
Software Standards and Processes: Process types and models along with their
Capturing Users Requirements: System and Software requirements, Documenting
requirements, Structured and object-oriented approach, Managing requirements,
Traceability and change control.
Roles of Analysis and Design: Structured and Object-Oriented analysis and design,
Alternatives approaches, Language; Platform and database issues.
Verifying And Validating Results: Dynamic testing; traceabilitymetrics, Software
Quality Assurance (SQA), Quality and process standards and guidelines, Project And
risk management, CASE tools, Software Engineering ethics.

Recommended Books:

 Ian Sommerville (2000), “Software Engineering”, 6th /ed., Addison-Wesley, ISBN:

 Roger S. Pressman,(2001)Software Engineering: A Practitioner's Approach, 5th /ed.,
McGraw-Hill,, ISBN: 0072496681.
 Craig Larman (2001), “Applying UML and Patterns: An Introduction to Object-
Oriented Analysis and Design and the Unified Process”, 2nd /ed., Prentice Hall PTR,
ISBN: 0130925691.
 Robert L. Glass (2002), “Facts and Fallacies of Software Engineering”, Addison
Wesley, ISBN: 0321117425.

Page 38 of 98
Course Title: Curriculum Design and Instruction
Course Code: EDUC2118
Credit Hours: 3
The main objectives of this course are to:
 Explain the concept of curriculum and instructions.
 Understand models of curriculum.
 Know the existing school curriculum components.
 Implement curriculum in real context.

Course Outline:

Introduction to Curriculum and Instruction: Curriculum as product, Process,

Program, Intended learning and experience of learner, Difference between course,
Syllabus and curriculum, Elements of curriculum, Concept of instruction, Relationship
between curriculum and instruction.

Designs of Curriculum: Subject centered curriculum, Learner centered curriculum,

Core curriculum, Activity based curriculum, Integrated curriculum, Hidden curriculum.

Processes of Curriculum Development and Implementation: Need assessment,

Foundations of curriculum, Philosophical, Psychological, Sociological, Economic
objectives of curriculum, Content selection, Implementation strategy, Evaluation

Composition of National School Curriculums: Competencies, Standards, Benchmarks,

Student Learning Outcomes (SLO), Analysis of current National curriculum documents
of relevant subjects.

Selecting and Implementing Strategies of Instruction: Styles of teaching and learning,

Selection of instructional strategies, Organization, Presentation and implementation of

Teaching Learning Strategies: Lecture method followed by discussion and question

answer method, Cooperative learning, Students are required to prepare and maintain
course portfolio, Assignments and presentations / quizzes based on the content of the
course outline and project using “do-it-yourself” or “learner-centered” methods.

Page 39 of 98
Recommended Books:

 Oliva, P. F., & Gordon II, W. R. (2012). Developing the curriculum. Pearson Higher
 Marsh,C.J.(2010).Key Concepts for Understanding Curriculum( 4thedition.)
London: Routledge Taylor and Francis Group.
 Prattg D.(2009). Curriculum Design and Development. New York: Harcourt Brace
Jovandovich, INC.
 Chaube, S.N.( 2011).Curriculum Planning And Instruction. NEW Delhi Wisdom

Page 40 of 98
Course Title: Data Structures and Algorithms
Course Code: COMP2113
Credit Hours: 2+1
The main objectives of this course are to:
 Develop student’s knowledge & skills about different data structures that help them
to write programs to efficiently manipulate, store, and retrieve data.
 Learn about the concepts of time and space complexity of computer programs.
 Familiar with basic techniques of algorithm analysis.
 Familiar with writing recursive methods, linked data structures,advanced data
 Familiar with several sorting algorithms. Graph algorithms such as shortest path and
minimum spanning tree.

Course Outline:

Introduction: Data structure, Types of data structure, Algorithm, Properties,

Analysis of Algorithms: Performance analysis and measurement, Big Oh notation,
Static Data Structures:Arrays operations with memory representation, Stacks, Queues,
Priorityqueues, Recursion and their applications.
Sorting and Searching: Linear search, Binary search, Bubble sort, Selection sort,
Insertion sort, Merge sort, etc.
Dynamic Data Structures: Linked lists, Trees, and Graphs. Hashing table, Storage and
retrieval properties and techniques for the various data structures.
Classes of Efficient Algorithms: Polynomial andintractable algorithms divide and
conquer technique, Optimization, Dynamic programming, Greedy approach.

Recommended Books:

 Frank M. Carrano, (2006). Data Abstraction & Problem Solving with C++, Addison
Wesley; 5thedition.
 Ellis Horowitz, SartajSahni and D. Mehta(1995), “Fundamentals of Data Structures
in C++”, 2nd /ed., Computer Science Press, ISBN: 0716782928.

Page 41 of 98
 Adam Drozdek (2008), Data Structures and Algorithms in Java, Cengage Learning
Asia; 3rd edition.
 Tenenbaum, M. Augenstein, and Y. Langsam (1999), “Data Structures using C and
C++”, 2nd /ed., Prentice Hall, ISBN: 0130369977.
 D. Samanta. (2001) “Classic Data Structures”, 2nd /ed., Prentice Hall.
 H. Deitel, P. Deitel (1999) “C++ How to Program”, 3rd /ed., Prentice Hall.
 Lafore, Sams(1999). Data Structures and Algorithms (SAMS teach yourself,
 Standish, (2000) ,Data Structures in JAVA, Addison Wesley.

Page 42 of 98
Course Title: Database Systems
Course Code: COMP2114
Credit Hours: 3+1
The main objectives of this course are to:
 Equip the student with the knowledge related to a variety of design, implementation
of relational databases.
Course Outline:
Introduction to Databases: Introduction, Application &history of database systems,
Traditional file system, The database, Database environment, Database management
System (DBMS), User roles in database environment, Advantages &disadvantages of
Database Environment: Three level ANSI-SPARC Architecture, Schemas, Mappings
and instances, Data independence, Database languages, Data models & Conceptual
modeling, Functions of DBMS, Mutli-user DBMS architecture.
The Relational Model: History of Relational Model, Basic terminologies, Entity,
Attribute, Relationship, Relational data Structure, Mathematical relations, Database
relations, Relations properties, Relational keys, Integrity constraints, Nulls, Entity
Integrity, Referential integrity, General constraints, Views.
Relational Algebra: Unary operations, Set operations, Join operations, Division
operations, Aggregation &grouping operations.
Entity Relationship (ER) Modeling: Entity types, Relationship types, Attributes &type
of attributes, Strong &weak entities, Structural constraints, One to One (1:1) relationship,
One to many (1: N) Relationship, many to many (M: N) relationship, Cardinality
&multiplicity constraints, ER Notations, UML notation, Chen notation, Crow’s Feet
Enhanced Entity Relationship (EER) Model: Specialization, Generalization,
Superclass, Subclass, Attribute inheritance, Aggregation, Composition.
Mapping of Entity Relationshipto Relational Model: Relational database design
UsingER-to-Relational mapping, Mapping of regular entity types, Mapping of weak
entity types, Mapping of binary 1:1 relationship types, Mapping of binary 1: N
relationship types, Mapping of binary M:N relationship types, Mapping of multivalued
attributes, Mapping of n-aryrelationship types.
Normalization: Purpose of normalization, Data redundancy and update anomalies,
Insertion anomaly, Deletion anomaly, Modification anomaly, Functional dependency,

Page 43 of 98
Inference rules for functional dependencies, Identifying the primary key for a relation
using functional, dependencies, Process of Normalization, First Normal Form (1NF),
Second Normal Form (2NF), Third Normal Form (3NF), Boyce Codd Normal Form
Introduction to SQL: Introduction to SQL, History &Objectives of SQL, Simple
queries, Sorting, Grouping, Aggregate functions, Sub-queries, Join, Inner Join, Left join,
Right, Full join, Set operations, Union, Intersection, Except, Database update queries,
SQL Data Definition: Table creation, Data types, Views.
Introduction to Commercial DBMS: Microsoft SQL Server 2012 Express Edition/ MY
SQL/ Microsoft Access 2012
Security Concepts: Security Threats, Authentication &authorization, Users &roles
Transaction Management: Basic concept of transaction, Transaction properties.
Distributed Database Management System (DDBMS): Introduction, Concepts of
DDBMS, Advantages &disadvantages of DDBMS.
Object Oriented Database Management Systems (OODBMS): Introduction, concepts
of OODBMS, Advantages &disadvantages of DDBMS.

Recommended Books:

 Connolly&Begg (2001), Database Systems: A Practical Approach to Design,

Implementation, And Management, Pearson Education ISBN: 0-201-70857-4.
 Elmasri&Navathe (2010), Fundamentals of Database Systems, sixth edition,
Pearson Education ISBN-13: 978-0-136-08620-8.
 J Hughes (1991), Object-Oriented Databases, Prentice-Hall.
 Ceri and Pelagatti, Distributed Databases, McGraw Hill.

Page 44 of 98
Course Title: Operating Systems
Course Code:COMP2115
Credit Hours: 3


The main objectives of this course are to:

 Gaingeneral understanding of the principles and concepts governing the functions of

operating systems.
 Help students to acquaint the layered approach that makes design, implementation
and operation of the complex OS possible.

Course Outline:

History and Goals: Introduction about computer system structure, Introduction about
process management and memory management activities.
Evolution of multi-user systems: Introduction about OS activities, System call, OS design
and its implementation, Introduction about VM architecture.
Process Management: Process states, Process scheduling, Process control block.
CPU Management: Process scheduling techniques, Introduction about CPU scheduler and
Multithreading: Multithreaded server architecture, Multithreading models, Process
synchronization, Introduction to critical section problem and its solution.
Kernel and User Modes: Protection, OS services, User OS interfaces.
Problems of Cooperative Processes: Systemprogram and communication in client service
Synchronization: Introduction about sockets and socket communication.

Deadlocks: Introduction about deadlock problem, Introduction about deadlock

characterization, Deadlock presentation and deadlock avoidance techniques.
Memory Management: Virtual memory, Address binding, Swapping, logical and Physical
Relocation: Externalfragmentation metabolism, Virtual address space.
Paging:Demand Paging, Page replacement algorithms.
Secondary Storage: Security and protection, Security plan and security violation methods,
Program threats, Introduction about cryptography.

Page 45 of 98
File systems: File attributes, File operations, I/O systems, Interrupts, Direct Memory
Access, Blocking and non-blocking I/O, I/O protection.

Introduction to distributed operating systems: Scheduling and dispatch, Introduction to


Recommended Books:

 Silberschatz A., Peterson, J.L., & Galvin P.C(2004). AppliedOperating Systems

Concepts, 7th Edition.
 Tanenbaum A.S. (2008). Modern Operating Systems, 3rd Edition.

Page 46 of 98
Course Title: Computer Communications and Networks
Course Code: COMP3112
Credit Hours: 3
The main objectives of this course are to:
 Gain general understanding of the principles and concepts of data
Communication Network.
 Help students to acquaint the analog and digital communication, TCP/IP layer
and OSI reference model.
 Develop understanding about transmission media, types of networks,
multiplexing techniques and error detection as well error correction techniques.
 Develop understanding about IP addressing, circuit and packet switching.

Course Outline:

Data Communication: Data Communication System, Networks (LAN, WAN, MAN),

Data Representation, Direction of flow ( Simplex, Half-duplex, full- duplex).
Protocols&Standards: Protocols, Key elements of protocols, Standards, Standard
creation committees.
Networks: Networks, Network criteria, Network topologies, Physical topologies (Bus,
Ring, Star, Hybrid or tree and Mesh),Advantages and disadvantages, Logical topology,
Computer Network Model: Layered tasks, OSI Model, Internet model (TCP / IP Suite)
Physical Layer Introduction: Signals, Transmission impairment, Transmission media,
Channel capacity, Multiplexing, Switching.
Digital Transmission: Digital-to-digital conversion, line coding, Unipolar encoding,
Polar encoding, Bipolar encoding, block coding, Analog- to -digital conversion (PAM,
PCM), Sampling, Quantization, Encoding, Transmission modes.
Analog Transmission: Digital –to- analog conversion (ASK,PSK,FSK,QAM ), analog-
to- analog conversion.
Transmission Media: Guided and unguided media.
Multiplexing: FDM, TDM, WDM.
Switching: Circuit switching, Message switching and packet switching.
Data Link Layer Introduction: Functionality of data link layer.
Error Detection and Correction: Types of errors, Error detection, Error correction.

Page 47 of 98
Data Link Control and Protocol: Flowcontrol, Error control.
Network Layer and Network Addressing: TCP/IP Overview, Network Layer (IP),
Addressing, Sub-Netting TCP and UDP.
Network Layer Protocols:ARP, ICMP, IPv4, IPv6.
Transport Layer Protocol: TCP &UDP, Client server model.
Application Layer Protocol: Simple Mail Transfer Protocol (SMTP); SNMP; HTTP;
WWW; WLAN, Bootstrap Protocol (BOOPT) and Dynamic Host Configuration
Protocol (DHCP); Domain Name System (DNS); Telnet; FTP; Trivial File Transfer
Protocol (TFTP).

Recommended Books:

 William Stallings, Data and Computer Communications, Prentice Hall; 8th Edition,
 Andrew S. Tanenbaum, (2002).Computer Networks, Prentice Hall PTR; 4th
 Behrouz A. Forouzan, Data Communications and Networking, McGraw-Hill Higher
Education, Latest Edition.
 James F. Kurose and Keith W. Ross,(2007).Computer Networking: A Top-Down
Approach (4th Edition), Addison Wesley; 4 edition.
 Gilbert Held (2000), Understanding Data Communications: From Fundamentals to
Networking, 3rd /ed., Wiley.

Page 48 of 98
Course Title: Technology Management
Course Code: ITEC2111
Credit Hours: 3
The main objectives of this course are to:
 Introduce basic management functions with focusing on technology management
 Get knowledge of business change and technology challenges, technology strategy,
technology goals and objectives.
 Get understanding about hurdles to deploy technology and technology transfer
 Understand IT as a change enabling technology, technology assessment, change
management issues and case study to appraise student’s real problems.

Course Outline:

Introduction: Introduction to issues in technology management.

Basic Management Functions: (Planning, Control, Decision making, organizing etc.);
Risk Analysis: Businesschange and technology challenges and issues; Technology
strategy, Goals and objectives, Common hurdles.
Technology Transfer Issues: Related to hardware, Software, Communications, Human
resources.etc, IT as change enabling technology, Assessment and selection of
technology, Training planning, Equipment and systems acquisition processes,
Implementation processes, Common challenges in change management, Small case

Recommended Books:

 Gerard H. Gaynor, Handbook of Technology Management,1st Edition.

 R. Ray Gehani, Management of Technology and Operations.
 Richard C. Dorf, The Technology Management Handbook.
 Robert Burgelman , Clayton Christensen, Steven Wheelwright, (2009). Strategic
Management of Technology and Innovation.

Page 49 of 98
Course Title: Web Engineering
Course Code: ITEC3111
Credit Hours: 2+1
The main objectives of this course are to:
 Introduce the methods and techniques used in Web-based applications development.
 Understand the concepts, principles, strategies, methodologies and processes involve
in Web applications development.

Course Outline:

Web Basics: Overview of protocols: TCP/IP, Network programming, Overview, HTTP,

Overview of 3-tier architecture, Web based applications architecture.
Front End Development Tools: HTML, DHTML, CSS, Client side scripting, Java
Server Side Development: Web server and server Side development, Javaservlet,
Request types, Life Cycle of servlet. JDBC by servlet, Requestredirecting, Data
persistency. By request dispatching, session and cookies. Context and its relevantissues.
Server side scripting by JSP.JSP built-in objects. Scripting elements. Lifecycle of JSP.

Recommended Books:

 Marty Hall, Larry Brown. Core Servlets and Java server Pages: Core Tech.
 Perl,Web enabled Commercial Application Development Using…HTML, DHTML,
JavaScript, CGI. BPB Publications.
 Guy W. Lecky-Thompson, Just Enough Web Programming with XHTML, PHP, and
MySQL, Course Technology PTR; 1st edition, 2008.
 Dana Moore, Raymond Budd, Edward Benson, Professional Rich. Internet
Applications: AJAX and Beyond (Programr to Programr).
 Wrox, Chris Bates, Web Programming: Building Internet Applications, Wiley,
3rd edition.

Page 50 of 98
Course Title: Database Administration and Management
Course Code: ITEC3112
Credit Hours: 2+1
The main objectives of this course are to:
 Give the database administrator (DBA) a firm foundation in basic administrative tasks.
 Gain the necessary knowledge and skills to setup, maintain, and troubleshoot of latest
versionof ORACLE database server.

Course Outline:

Introduction: Introduction to oracle family, Relational DBMS concepts, Exploring

SQL,Role of DBA in organization.
Exploring the Database Server: Database architecture, Single instance vs. multi
instance database architecture, Memory structures, Process structures.
Oracle Installation and Database Creation: Install the Oracle software by using the
Oracle Universal Installer (OUI),Create a database by using the database configuration
assistant, The instance, The Database, and the data dictionary.
Managing the Oracle Instance: Stages of Database startup and shutdown, Database
initialization parameters, Alert log and trace files, Data dictionary and dynamic
performance views
Configuring the Oracle Network Environment: Configure and manage the Oracle
network, Use the Oracle shared server architecture.
Managing Database Storage Structures: Understand tables paces and data files, The
Oracle data storage model, Segments, Extents, Blocks and rows, Automatic Storage
Management (ASM), Create and manage tablespaces, Create, Alter and drop tablespace,
Manage space in tablespaces.
Administering User Security: Create and manage database user accounts, Grant and
revoke privileges, System privileges, Object privileges, Create and manage roles, Create
and manage profiles.
Managing Schema Objects: Create and modify tables, Users, User accounts, Schemas,
and Schema Objects, Naming schema objects, Object namespaces, Data types, Creating
tables, Manage constraints, Create indexes, Create and use temporary tables.

Page 51 of 98
Managing Data and Concurrency: Manage data using DML, Database transactions,
Executing SQL statements, Transactioncontrol, COMMIT, ROLLBACK, SAVEPOINT,
Monitor and resolve locking conflicts.
Managing Undo Data: Explain the purpose of undo, Understand howtransactions
generate undo, Manage undo, Flashback Query, Creating and managing undo table
Implementing Oracle Database Security: Database security and principle of least
privilege, Work with standard Database auditing.
Database Maintenance: Use and manage optimizer statistics, Use and manage the
automatic workload repository, Use the advisory framework, Manage alerts and
Performance Management: Use automatic memory Management, Use memory
Advisors, Troubleshoot invalid and unusable objects.
Backup and Recovery Concepts: Types of failure, Ways to tune instance recovery,
Importance of checkpoints, Redo log files, Flash recovery area.
Performing Database Backups: Create consistent Database backups, Backup your
Database without shutting it down, Create incremental backups, Automate database
backups, Managebackups, View backup reports, and monitor the flash recovery area.
Performing Database Recovery: Overview of data Recovery advisor, Use data
Recovery advisor to perform recovery.
Moving Data: Describe and use methods to move data (SQL Loader, Directory objects,
External Tables), Explain the general architecture of Oracle Data pump, Use data pump
export and import to move data between Oracle Databases.

Recommended Books:

 John Watson, (2008) OCA Oracle Database 11g: Administration I Exam Guide,
McGraw-Hill Osborne Media,1st edition.
 Craig S. Mullins (2002), Database Administration: The Complete Guide to
Practices and Procedures, Addison Wesley, ISBN: 0201741296 .
 Donald K. Burleson(2002),Oracle9i UNIX Administration Handbook, McGraw-Hill,
ISBN: 007222304.
 C. J. Date (1994), Database Systems, Addison-Wesley.
 Korth and Silberschatz (2007), Database Systems Concepts, McGraw Hill.Peter
Rob, Course Technology; 8th edition.

Page 52 of 98
 Dan Wood, Chris Leiter, Paul Turley, (2006).Beginning SQL Server 2005
Administration, Wrox.
 Peter Rob, Carlos Coronel.(2007). Database Systems: Design, Implementation, and
Management, Course Technology, 8th edition.

Page 53 of 98
Course Title: Human Computer Interaction
Course Code: COMP3113
Credit Hours: 3
The main objectives of this course are to:
 Introduces the human issues of usability and its importance.
 Consider the implications of human understanding on the usability of computer
systems and the importance of understanding the context of use.
 Describe guidelines for use of different media and interface styles.

Course Outline:

The Human: Input-output channels, Human memory, Thinking, Reasoning, Problem

solving, Emotions, Individual differences, Psychology and design of interacting systems.
The Computer: Introduction, Text entry devices, Positioning, Pointing, and drawing,
Display devices, Devices for virtual reality and 3D interaction, Physical controls, Sensors
and special devices, Paper printing and scanning, Memory, Processing and networks.
The Interaction: Models of interaction, Frameworks and HCI, Ergonomics, Interaction
styles, Elements of the WIMP interfaces, Interactivity, Context of interaction, Experience.
Usability Paradigm and Principles: Introduction, Paradigms for interaction.
Interaction Design Basics: Introduction, What is design, Process of design, User focus,
Navigation design, Screen design and layout, Iteration and prototyping.
HCI in Software Process: Introduction, Software life cycle, Usability engineering,
Iterative design and prototyping, Design rationale.
Design rules, Prototyping, Evaluation techniques, Task analysis, Universal design
and User support and Computer Supported Cooperative Work: Guidelines, Golden
rules and heuristics, HCI patterns, Choosing an evaluation method, Requirements of user
support, Applications, Design user support systems.
Introduction to Groupware, Pervasive and Ubiquitous Applications: Introduction,
Groupware systems, Implementation of synchronous groupware, Ubiquitous computing.

Recommended Books:

 Janet E. Finlay, Leeds Metropolitan.(2000).Human-Computer Interaction, Alan Dix,

Computing Dept, Lancaster University, Birmingham Publisher: Prentice Hall.
 Ben Shneiderman, University of Maryland Catherine Plaisant. (2010).Designing the
User Interface: Strategies for Effective Human-Computer Interaction, 4/E, University
Maryland. Publisher: Addison-Wesley.
Page 54 of 98
Course Title: Multimedia Systems and Design
Course Code: ITEC3113
Credit Hours: 3
The main objectives of this course are to:
 Introduce students to the complete process of multimedia system specification,
design, testing, and prototyping, including the tools and techniques for integrating
multimedia content (text, graphics, images, sound, animation, motion video and
virtual reality) into a product.
 Present design principles and techniques to maximize the effectiveness of such
products, and to give the students practice in the production using a variety of media
and tools.

Course Outline:

Multimedia: What is Multimedia? Multimedia authoring tools, Multimedia authoring,

Multimediaproduction, Multimedia presentation, Automatic authoring.
Editing and Authoring Tools: (Proprietary/open Source), VRML.
Making Multimedia: Handling images, Sound, Animation and video, Planning &
costing, Designing and producing. Multimediaskills and talent.
Internet and Multimedia: Designing for the World Wide Web. Delivering multimedia

Recommended Books:

 Tay Vaughan (2010). Multimedia: Making it Work,8thEdition.ISBN-10:7170048466.

 Z. M. Li and M. S. Drew, (2004). Fundamentals of Multimedia Prentice Hall.
ISBN: 0-13-127256-X.
 Shuman, James,(2002).Multimedia Concepts, Cengage Learning.
 Lake, Susan and Karen Bean, (2007). Digital Multimedia: The Business of
Technology, Cengage Learning.
 Z. M. Li, M. S. Drew (2004).Fundamentals of Multimedia. Prentice Hall. ISBN: 0-
 N. Chapman; J. Chapman (2004).Digital Multimedia. (2nd ed.), Wiley, ISBN: 0-470-
 Villalobos, Ray,(2007).Exploring Multimedia for Designers, Cengage Learning.

Page 55 of 98
Course Title: System and Network Administration Windows Based
Course Code: ITEC3114
Credit Hours: 2+1
The main objectives of this course are to:
Guide studentsstep-by-step in creating custom build windows server based network from

Course Outline:

Introduction to Operating Systems: Operatingsystems and utility programs, Windows

Installation and User Management: Installation of windows, Using windows control
panel, File system &introduction to disk management, Setting up user accounts and
groups, Users and hardware profile, Sharing folders, Permissions, Local security policy,
Backup and restore strategies.
Windows 2012 Server: Networkprotocols &installation of windows 2012 server,
Implementing an active directory infrastructure, Managing and maintaining an active
directory implementation, Managing users, groups and computers in active directory,
Planning, Implementing and troubleshooting group policy, Planning, Implementation.
DHCP and DNS Servers: Managing and troubleshooting DHCP and DNS servers.
Security: Securing network communication, Creating and managing digital certificates.
DisasterRecovery: Managing and implementing disaster recovery.

Recommended Books:

 William R. Stanek, (2012). Windows Server.

 Rand Morimoto, Michael Noel, Guy Yardeni ,(2012). Windows Server.2012.
 Dan DiNicolo(2012). Windows Server 2012 Managing, Maintaining, Planning &

Page 56 of 98
Course Title: Object Oriented Analysis and Design
Course Code: ITEC3115
Credit Hours: 3
The main objectives of this course are to:
 Teach Unified Modeling Language (UML), software development methodologies,
requirements gathering and analysis, system architecture and design, implementation,
testing, and deployment.
 Expose students with other proven OOAD practices.

Course Outline:

Introduction:UML notation, Review of Object-Oriented concepts, Unified process.

Capturing System Behavior: Domain object model,Refining classes and associations,
Achieving reusability, Generating the behavioral model use case realization.
Implementing Memory in Objects: State machines, Analyzing object behavior.
Oriented Design at the Object Level: System Design; Component design;
Design Patterns: Introduction to design patterns using design patterns; Assignments and

Recommended Books:

 Craig Larman (2001), Applying UML and Patterns: An Introduction to Object-

Oriented Analysis and Design and the Unified Process, 2nd /ed., Prentice Hall PTR,
ISBN: 0130925691.
 Wendy Boggs, Michael Boggs (2002), Mastering UML with Rational Rose 2002,
Sybex, ISBN: 0782140173.
 Timothy Lethbridge, Robert Laganiere (2002), Object-Oriented Software
Engineering: Practical Software Development using UML and Java, McGraw-Hill,
ISBN: 0072834951.

Page 57 of 98
Course Title: System and Network Administration Linux Based
Course code: ITEC3116
Credit Hours: 2+1
The main objectives of this course are to:
 Guide you step-by-step in creating your own custom build Linux system from
scratch, using nothing but the sources of software that are needed.
 Learn more about the inner workings of Linux and how the various pieces of the
operating system fit together.

Course Outline:

Introduction to Operating Systems:What is an operating system, History of Linux,

Comparison between linux&windows, System requirements, Mount points.
Linux Installation: Linux Installation, Dual boot with Windows XP.
File System Structure:DOS to Linux cheat sheet, Linux file systems, nodes, Data
storage layout in ext4.File systems hierarchy standards, File system structure.
Directory Structure and Basic Commands: TheDirectory treestructure, Basic
commands, Logging in, Logging out, Shutting down, Changing your password,
etc.Permissions:Permissions, Symbols used between levels & Permissions, Adding
rights to a file, Removing rights from a file, Changing permissions with numbers
Linux Devices: Hard and floppy drives, Serial Devices, CD and tape drives, Device
commands, Adding device. Working with /dev Directories, Managingpartitions. Drives
managing memory Devices, Managing printer devices, Managing SCSI devices.
Networking Server Configuration: DNS and DHCP server configuration, Linux
Apache, PHP with MYSQL configuration, Samba, Telnet, SSH, The quota service,

Recommended Books:

 H, Matthew & K. JosephThe Official Ubuntu Book (8th Edition).

 M. Peter,The Definitive Guide to Cent OS1st Edition.

Page 58 of 98
Course Title: Internet Architecture and Protocols
Course Code: ITEC3117
Credit Hours: 3
The main objectives of this course are to:
 Provide students basic concepts of Internet architecture, Internet technologies, ISP
architecture, TCP/IP protocol suit, QoS techniques, multimedia concepts, real time
interactive application, bridging and switching and wireless LAN.

Course Outline:

Internet:Introduction about Internet architecture, Basics, History, Internet service

providers, Internet backbones.
Internet Technologies: Frame relay, ATM, ISDN, DSL, Cable modem, SONET,Point
to point protocols
Internet Service Provider:ISP, Architecture and components.
Protocols: Detail discussion including headers of protocols, IPv4, IPv6, ARP, RARP,
Quality of Service: Techniques, Integrated Services, Differentiated Services,
Multimedia, Concepts, Real time interactive applications.
Bridging and Switching: VLANs and spanning Tree. Multiple access
techniques,CSMA, CSMA/CD, CSMA/CA, Framing, MAClayer protocols, Ethernet,
Token ring, Wireless LANs.

Recommended Books:

 Behrouz A. Forouzan, (2002). TCP/IP Protocol Suite,2nd Edition, McGraw-Hill.

 Uyless D. Black , UylessBlack.Internet Architecture: An Introduction to IP
 Byrav Ramamurthy, George N. Rouskas, Krishna MoorthySivalinga, Next-
generation Internet architectures and Ptotocols.

Page 59 of 98
Course Title: IT Project Management
Course Code: ITEC3118
Credit Hours: 3
The main objectives of this course are to:
 Define and highlight importance of software project management.
 Describe the software project management activities.
 Train software project managers and other individuals involved in software project,
planning and tracking and oversight in the implementation of the software project
management process.

Course Outline:

Introduction to Project Management:Management, Project?, Project attributes, Project

vs. operations, Project management, Project stakeholders, Project management office,
Project management software, Project management certification, Ethics in project
Project Management in IT Context:, System approach, system analysis, system
philosophy, 3-Sphere Model, Globalization, key issues in Globalization, Outsourcing,
virtual team, Advantages and disadvantages of virtual team.
Different phases or Steps in the Planning of a Project: Projectlife cycle, Seven core
software, Project Phases, Project Phase deliverable, Key project stakeholders, PMO.
Project Management Group of Processes: Project Processes, Project management
process group, Creating feasibility study report, Identify the business needs, Creating
project charter, Analyzing stakeholders.
Project Integration Management: Project charter, Purpose of project charter, Skills
required, Project charter sample, Statement of work, Strategic Planning and Project
Selection (SWOT analysis), Considering enterprise environmental factor, Benefit
measurement methods, Adopting project plan methodology, Project Management
information system, Financial analysis of projects ( NPV, ROI, payback analysis),
Preliminary project scope statement, Project management plans.
Project Scope Management: Scope, deliverable, Project Scope management processes,
WBS, Approaches for developing WBS, WBS Dictionary, defining and verifying scope
and controlling scope.

Page 60 of 98
Project Time Management: Schedules, Activity definition, activity sequencing, Project
network diagrams, CPM, PERT,ADM and PDM, Task dependency.
Project Cost Management: Cost, Cost management, Direct cost, Indirect cost, Fixed
cost, Variable cost, EV, PV, AC, CV, SV, EAC, BAC, CPI, SPI, Basic principles of cost
Management, Cost estimation, Cost estimation tools and techniques, Cost budgeting and
cost control.
Project Quality Management: Theimportance of Project Quality Management, Quality
Management Processes ( Quality planning, Quality assurance, Quality control).
Project Procurement Management: What is procurement? Why we outsource?
contracts, Project procurement management process.
Project Human Resource Management: Human resource management? Extrinsic and
intrinsic motivation, Maslow hierarchy of need, Power and its type, Resource
assignments, Resource loading and resource leveling, Coveys 7 Habits, Human resource
planning, Acquiring the project team, Developing the project team, Managing the project
Project Risk Management: Risk, Risk management process, Risk management cycle,
Why IT Project fail?
Project Management Body of Knowledge: Overview and basic understanding.
Introduction to MS Project 2010:WBS creation tools, Calendaring features,
Scheduling abilities, Work authorization tools, Quality control charts ( PERT charts,
Gantt charts, and other calendaring features), Calculations for the critical path, EVM,
target dates based on the project schedule, resource tracking and leveling, reporting

Recommended Books:

 B. Hughes and M. Cotterell, Software Project Management, 3rd Ed.

 J. Greene and A. Stellman.Applied Software Project Management.
 Kathy Schwalbe.Information Technology Project Management.
 P. Jalote.Software Project Management in Practice.

Page 61 of 98
Course Title: Network Security
Course Code: ITEC4111
Credit Hours: 3
The main objectives of this course are to:
 Introduce computer and network security concepts.
 Understand basic cryptography concepts.
 Get the knowledge about VPNs,Firewalls, Viruses.

Course Outline:

Introduction: ComputerSecurity, Networksecurity, Information security, Security

Trends, OSI Security architecture.
Security Basics: Security attacks, Services, Mechanisms, Model.
Classical Cryptography: Symmetriccipher model, Substitution and transposition
Technique, Cryptography and cryptanalysis, Modular arithmetic. Caesercipher,
Vigenerecipher.Monoalphabetic and polyalphabetic ciphers,Playfaircipher, Hill cipher
Stream Ciphers and Block Ciphers:Data Encryption Standard (DES), General
depiction of DES algorithm.
Firewalls: What is firewall, Access control policy, Firewallfunctions, Firewalltypes,
Windowsbased firewalls, Linux based firewalls.
Virtual Private Network: VPN basics and theory, How VPN works.VPN
configuration and testing on windows operatingsystem.
IP Security:IP Security, Applications of IPSec, Benefits of IP Sec, IP Security
architecture. IP security services, Transport and tunnel modes.
Advance Encryption Standard (AES):How AES works, Placement of encryption
functions, link versus End-to-End encryption., Traffic confidentiality
Key Distribution: Key distribution, Different key distribution approaches.
Message Authentication: Authentication requirements, Authentication functions,
MAC and hash functions.
Public Key Cryptography: Public key cryptosystems, RSA Algorithm, Key
management in Cryptographic systems, Diffie-Hellman Key Exchange,
Digital Signatures: Digital Signature requirements, Direct and arbitrated digital
Signatures, Mutual and One-way authentication, Digital Signature Standard (DSS).
Authentication Applications: Kerberos, How Kerberos works?

PKI, Authentication Service:X.509 Certificates, Public key infrastructure.

Page 62 of 98
Email Security: PGP, S/MIME.
Web Security: SSL, TLS, SET.
Operating System Checklists: Operatingsystem security checklists, Disaster
prevention and recovery.
Viruses: Viruses, Trojans andworms, Types of viruses, Antivirus approaches.

Recommended Books:

 W. Stallings,(2003).Cryptography and Network Security, Prentice Hall PTR, Upper

Saddle River, NJ.
 D. Stinson,(1995).Cryptography: Theory and Practice, CRC Press, Boca Raton, FL.
 Richard A. Mollin,(2001).An Introduction to Cryptography, Chapman and
 B. Schneier, (1996). Applied Cryptography, John Wiley and Sons, NY.

Page 63 of 98
Course Title: Human Resource Management
Course Code: BUSA2115
Credit Hours: 3
Objectives:The main objectives of this course are to:
 Demonstrate an in-depth knowledge of the activities and decisions that inform the
employment relationship and management.
 Develop and design different forms and memos for recruitment, selection, TNA and
performance appraisal of employees.
 Identify and discuss ethical implications of situations and decisions, and develop
appropriate professional stances.
 Participate in selection of personnel using psychometric assessment techniques.
 Conduct internal research on HR-related problems at work, and communicate results
effectively to colleagues and peers.
 Understand the difference between HRM theories, their relevance and application
from indigenous context.
Course Outline:
Human Resource Management: A Strategic Function: Definition, Types of HR
managers, Human resource functions, Who performs HR functions, Organizational
performance and HR manager, Communicating HR programs.
Job Analysis and Job Design: Definition, Products of job analysis, Job analysis
methods, Problems with job analysis, Job design, Job scope and depth, Socio technical
approach, Alternative work schedules and arrangements, Assignment case study.
Human Resource Planning: Definition, Strategy linked HRP, Steps in HRP process,
Tools and techniques of HRP, HRIS intro only.
Recruiting Employees: Definition, Personnel requisition form demo, Sources of
qualified personnel, Effectiveness of recruitment methods, Job preview Organizational
inducements EEO and recruitment intro only, Assignment case study, Selecting
employees, Complete selection process, Validation of selection procedure.
Orientation and Training: Definition, Orientation responsibility, Orientation length
timing, Follow up, Training definition, Steps in training process, Methods of training,
Evaluating training, Assignment case study.
Management Development Definition: Needs assessment, Methods used in
management development, Evaluation of management development, Assessment center,
Organizational development steps defined only

Page 64 of 98
Career Development: Definition, Who is responsible, Implementing career
development, Reviewing career progress, Career development continued, Dealing with
career plateaus, The impact of dual career couples, Outplacement, Breaking the glass
ceiling, Student presentation on case.
Performance Management System: Definition, Determinants of performance,
Environmental factors as performance ,Obstacles, HRs responsibility,
Performance Appraisal: Definition, Performance appraisal methods, Student
presentation case, Potential errors in performance appraisal, Overcoming errors,
Providing feedback through performance appraisal interview, Developing improvement
The Organizational Reward System: Definition, Selection of rewards, Compensation
defined, Compensation policy, Paysecrecy, Impact of comparable worth, Pay equity, Pay
satisfaction model, HRs role defined briefly

Recommended Books:
 Human resource management by Lloyd L. Byars and Leslie W. Rue (Latest
 Human resource management, by Gary Desler(Latest Edition)

Note: In addition to the above, any other text or book referred by Instructor can
also be included

Page 65 of 98
Course Title: Professional Practices
Course Code: ITEC4112
Credit Hours: 2
The main objectives of this course are to:
 Determine and identify ethical procedures and behaviors in the organization.
 Get the information about computer and internet crimes.
 Understand the issues related to intellectual freedom, intellectual property, and
copyright law.
 Understand the ethical issues associated with gathering, storing and accessing
information in databases.

Course Outline:

Introduction: Historical, Social, and economic context of computing (Software

engineering, Computer science, Information Technology), Definitions of computing,
subject areas and professional activities, Professional societies; Professional competency
and life-long learning; uses, misuses, Risks of softwares.
Overview of Ethics: Overview of Ethics, Ethics for IT professionals and IT Users
Association for Computing Machinery (ACM) code of Ethics and professional conduct
Association of Information Technology Professionals (AITP) code of Ethics, Software
Engineering Code of Ethics and Professional Practice, Sysadm, Audit, Network, Security
(SANS) IT code of Ethics. PMI member ethical standards and member Code of Ethics.
Ehics and social networking.
Computer and Internet Crime: What is cybercrime?, Computer misuse and criminal
law, Computing fraud, Unauthorized access to computer, Unauthorized removal of
information from computer, Data protection and privacy, .Freedom of expression.
Intellectual Property and Software Law: Intellectual Property, The nature of
intellectual property. The law relating to different types of intellectual property
(confidential information, copyright, trademarks, and patents) and the relevance of each
type to the software industry, Social responsibilities, Software related contracts, Software
house organization.

Recommended Books:

 M.F. Bott et al. (2000). Professional Issues in Software Engineering. CRC Press.
 Todd G. Shipley. Investigating Internet Crimes.

Page 66 of 98
Course Title: IT Capstone Project
Course code: COMP4111
Credit Hours: 6
The main objectives of this course are to:
 Plan and develop a real and substantial project related to computer science.
 Provide an opportunity to the students to crystallize their acquired professional
competence in the form of a demonstrable software product.
Course Outline:
The final project report should generally contain the following deliverables:
Deliverable 1: Project Proposal.
Deliverable 2:Software Requirements Specification
Deliverable 3:Methodology and Work Plan
Deliverable 4:Design Document 1
Deliverable 5:Design Document 2
Deliverable 6: Final Project Report
The above organization is a general guideline. With approval of the faculty supervisor,
the student may alter this structure to best meet the Capstone Project goals.
Textbooks, Software, Resources, and Required Materials: Reading materials and
resources will be determined by the student’s capstone supervisor. Materials may include
selected textbooks or their chapters, periodicals, government reports, company reports,
online databases, Web resources, and other reading and case studies. In consultation with
the instructor, the student will design a reading and research program.

Recommended Books:

 Jalote, Pankaj,(2002).Software Project Management in Practice, Addison-Wesley

 Andrew Stellman and Jennifer Greene,(2005).Applied Software Project
Management, O'Reilly Media, Inc.
 Richard Bechtold,(2007).Essentials of Software Project Management, 2ndedition.

Page 67 of 98
Course Title: Cloud Computing
Course Code: ITEC4113
Credit Hours: 3
The main objectives of this course are to:
 Understand cloud computing.

 Evaluate various cloud delivery models.

 Specify security threat exposure within a cloud computing infrastructure.

Course Outline:

Cloud Computing Basics: Overview of distributed computing, Emergence of cloud

computing, Global nature of the cloud, Cloud-Based service offerings, Grid computing,
Reliability of cloud model, Benefits of cloud model, Legal issues,

Cloud Computing Characteristics:

Cloud Computing Challenges &Evolution: Challenges for the cloud. The evolution
ofcloud computing.

Cloud Computing Services: Web services delivered from the cloud, Communication-
as-a-Service (CaaS), Infrastructure-as-a-Service, Monitoring as-a-Service (MaaS),
Platform-as-a-Service (PaaS), Software-as-a-Service(SaaS), Infrastructure as a Service
(IaaS), Platform as a Service (PaaS),Software as a Service (SaaS).

Virtualization: Building Cloud networks, Virtualization, Federation, Presence, Identity,

and Privacy in the cloud. Security in the cloud. Common standards in cloud computing.
End-User access to cloud computing, Mobile internet devices and the cloud.

Recommended Books:

 John .W. R., James F&Ransome,(2010),Cloud Computing Implementation,

Management, and Security, by Taylor & Francis Group:ISBN 978-1-4398-0680-7.
 J.Rhoton.(2009).Cloud Computing Explained: Implementation Handbook for
Enterprises. Recursive Press. ISBN-10: 0956355609.
 Winkler,(2011),Securing the Cloud: Cloud Computer Security Techniques and
Tactics, 1st Edition (2011). ISBN-10: 1597495921.

Page 68 of 98
Course Name: Enterprise Resource Planning Systems
Course Code: ITEC4114
Credit Hours: 3
The main objectives of this course are to:
 Prepare students to understand this vastly important technology.
 Examine enterprise software in general and learn how ERP software can improve
the functions of a company, how it can streamline operations, and how the
functional areas of any package relate to each other.

Course Outline:

Enterprise Resource Planning (ERP) Systems: The evolution of software systems for
planning and control in manufacturing companies, Material requirements planning,
Manufacturing resource planning, Enterprise Resource Planning (ERP) Systems, Basic
methods and common features of ERP Systems, The market for ERP Systems, Selected
functions of the SAP system.
Supply Chain Management (SCM) systems: Basic methods and common features of
SCM systems,The market for SCM systems selected procedures of the mySAP SCM
system APO.
Customer Relationship Management (CRM) systems: Basic methods and common
features of CRM systems,The market for CRM systems, Selected functions of the
mySAP CRM system, Information warehouses Architectures, interfaces, and integration
issues, Present state of ERP, SCM, and CRM applications and possible developments in
the near future case studies.

Recommended Books:

 Wagner,.B& Ellen, .M,(2008), Enterprise Resource Planning, Course Technology,

3rd, edition.
 Ellen F. Monk &Bret J. Wagner.(2009).Concepts in Enterprise Resource

Page 69 of 98
Course Title: Formal Methods in Software Engineering
Course Code: ITEC4115
Credit Hours: 3
The main objectives of this course are to:
 Introduce formal methods in software engineering.
 Get knowledge about formal mechanisms for specifying and verifying the
correctness, reliability and efficiency of software systems.
 Introduce the concepts related to finite state machines, regular expression,
assertions, algebraic and model based specification techniques including case

Course Outline:

Introduction to formal methods: Developing and acquiring formal methods, Using and
applying formal methods, Brief introduction to logic and set theory,
Introduction to Hoare's Logic: Logic and theorem proving, Modeling software
systems, Sequential, Concurrent and reactive systems, States, State spaces, Transition
systems, Combining state spaces, Fairness, Partial order view.
Modeling formalism: Formal specifications linear temporal logic, Automata on infinite
words, Specifications using Buchi-automata, completeness of specification;
Types of verification: State space verification, Representing states, Automata
framework, Combining buchi-automata, Checking emptiness, Translating LTL into
Model checking: Checking examples, checking complexity of model checking, safety
properties, state space explosion problem. Z-Specification, Structure and schema

Recommended Books:

 Doron A. Peled , (2001), Software Reliability Methods, Springer-Verlag.

 Michael Huth, (2004), Logic in Computer Science Modeling and Reasoning about
Systems 2ndEdition, Imperial College of Science, Technology and Medicine, London
Mark Ryan, University of Birmingham.
 ChristelBaier and Joost-Pieter Katoen, (2008), Principles of Model Checking,MIT

Page 70 of 98
Course Title: Advance Web Application Development
Course Code: ITEC4116
Credit Hours: 2+1
The main objectives of this course are to:
 Describe the Microsoft web technologies stack and select an appropriate technology
to use to develop any given application.
 Describe how to develop and deploy an ASP.NET MVC web applications

Course Outline:

Exploring ASP.NET MVC: Overview of Microsoft Web Technologies, Overview of

ASP.NET, Introduction to ASP.NET MVC.
Designing ASP.NET MVC: Web Applications planning in the project design phase
designing models, Controllers, and views module, Developing ASP.NET MVC models,
Creating MVC, Models working with data.
Developing ASP.NET MVCControllers: Writing controllers and actions, Writingaction
Developing ASP.NET MVC Views: Creating views with Razor Syntax, Using HTML
helpers, Reusing code in views.
Testing and Debugging ASP.NET MVCWeb Applications: Unit testing MVC
components, Implementing an exception handling strategy
Structuring ASP.NET MVC Web Applications: Analyzing information architecture,
Configuring routes, Creating a navigation structure.
Applying Styles to ASP.NET MVC Web Applications: Using template views,
Applying CSS to an MVC application, Creating an adaptive user interface.
Building Responsive Pages in ASP.NET MVC Web Applications: Using AJAX and
partial page updates, Implementing a caching strategy.
Using JavaScript and jQuery for Responsive MVC Web Applications: Rendering
and executing JavaScript code, Using jQuery.
Controlling Access to ASP.NET MVCWeb Applications: Implementing
authentication and authorization, Assigning roles and membership.
Building a Resilient ASP.NET MVC Web Application: Developing secure sites, State

Page 71 of 98
Using Windows Azure Web Services in ASP.NET MVC Web Applications:
Introducing windows Azure, Designing and writing windows Azure Services,
Consuming windows Azure Services in a web application.
Implementing Web APIs in ASP.NET MVC Web Applications: Developing a web
API, Calling a web API from mobile and web Applications.
Handling Requests in ASP.NET MVC Web Applications: Using HTTP modules and
HTTP handlers, Using Web sockets.
Deploying ASP.NET MVC Web Applications: Deploying a Web Application,
Deploying an MVC 4 Application.

Recommended Books:

 Matthew MacDonald, ASP.Net: The Complete Reference.

 George Shepherd, Microsoft® ASP.NET 4 Step Publisher: Microsoft Press.

Page 72 of 98
Course Name: Network Design and Management
Course Code: ITEC4117
Credit Hours: 2+1
The main objectives of this course are to:
 Focus on the technological aspects of existing business needs, routing protocols
concepts, and technology and device selection.
 Understand LAN and WLAN designing strategies, Network monitoring, traffic
metrics, performance Management, fault Management, network security
management, Network management protocols and broadband network management.

Course Outline:

Network Design: Business goals and needs , Characterizing QoS, Selection of bridging,
switching and routing protocols, Physical layer network design, Network design
methodology, Network structure models, Enterprise LAN design, Designing basic
campus and data centre networks, Designing remote connectivity,VLSM, Designing IP
Network Management: Need for monitoring and management in an IP network design,
Understanding through router delay and packet congestion, Traffic matrices, inferences,
modeling and estimation using SNMP link counts, Network performance, Fault, Security
accounting, Management, RMON services estimating traffic caused by network
management, Introduction to routers, Routing basics, Network management
Protocols(ICMP, SNMP, RIP, IGRP, NDP, GDP, EIGRP), Broadband network
Management. Access control lists: MPLS, Network management tools: MRTG, PRTG,
Wireshark, Port Scanner.

Recommended Books:

 Anthony Bruno, CCIE; Steve Jordan, CCIE, CCDA 640-864 Official Cert Guide,
Premium Edition eBook and Practice Test, 4th Edition.
 P. Oppenheimer, (2011), Top-down Network Design, CISCO Press, 3rd ed.
 J.D. McCabe, (2003)Network Analysis, Architecture, and Design, Morgan-
Kaufmann,2nd ed.

Page 73 of 98
Course Title: Distributed Database Systems
Course Code: ITEC4118
Credit Hours: 3
The main objectives of this course are to:
 Understand concepts and technical issues of distributed database systems.
 Understand the principles of distributed database systems within the framework of
distributed data processing.

Course Outline:

Introduction: Concepts of RDBMS,What is DDBS and distributed data processing,

Advantages &disadvantages of DDBS, Problem areas &network concepts,
Transparencies in a DDBMS, Alternative design strategies.
Distributed Database Design: Distributed design issues fragmentation, Data allocation
in distributed DBMS, Semantic data control, andsemantic datacontrol.
Database Integration: Bottom-up design methodology, Schema matching, Schema
integration, Schema mapping, Data cleaning
Data and Access Control: View management, Data security, Semantic integrity control,
Query Processing: Layers of query Processing, Query decomposition, Localization of
distributed data, Factors governing query optimization, Centralized query optimization,
Ordering of fragment queries, Distributed query optimization
Transaction Management: The Transaction concept; Transaction properties, Goals of
transaction management.
Distributed Concurrency Control: Concurrency control in centralize database system,
Distributed concurrency control, Dead lock management.
Distributed DBMS Reliability: Reliability concepts, Failure and faults of DDBMS,
Reliability protocols, Network partitioning, Parallel architecture.
Data Replication: Consistency of related databases, Update management strategies,
Replication protocols, Replication failures.
Web Data Management: Web graph, Web search, Web querying.
Current Issues: Streaming Data and Cloud Computing: Data stream management,
Cloud data management.

Page 74 of 98
Recommended Books:

 M. Tamer Özsu, Patrick Valduriez (2011), Principles of Distributed Database

Systems, Third Edition, Prentice Hall, ISBN 978-1-4419-8833-1.
 Angelo R. Bobak (1996), Distributed and Multi-Database Systems, Artech
House. ISBN: 0890066140.

Page 75 of 98
Course Name: Artificial Intelligence
Course Code: ITEC4119
Credit Hours: 3
The main objectives of this course are to:
 Have an appreciation for and understanding of both the achievements of AI and the
theory underlying those achievements.
 Have an appreciation for the engineering issues underlying the design of AI
 Have an understanding of the basic issues of knowledge representation and blind
and heuristic search.

Course Outline:

Introduction: What is AI, Foundations of AI, and History of AI.

Intelligent Agents: Agents and environments, Structure of agents.
Problem Solving by Searching: Problem solving agents, Searching for
solutions.Uninformed Search Strategies: Breadth-first search, Depth-first search,
Depth-limited search, Iterative deepening depth-first Search, Comparison of uninformed
search strategies.
Informed (Heuristic) Search Strategies: Greedy best-first Search, A* search, Heuristic
functions, Local search algorithms and Optimization problems.
Constraint Satisfaction Problems: Backtracking Search for CSPs, Local Search for
Adversarial Search: Games, Minimax algorithm, Alpha-beta pruning.
Reasoning and Knowledge Representation: Introduction to reasoning and knowledge
Representation, propositional logic, First orderlogic, Semantic nets, Other knowledge
representation schemes.
Reasoning with Uncertainty & Probabilistic Reasoning: Acting under uncertainty,
Bayes’ rule, Representing knowledge in an uncertain domain, Bayesian networks.
Learning: Forms of learning, Decision trees and the ID3 algorithm, Statistical learning,
Summary of other approaches.

Page 76 of 98
Recommended Books:

 Russell and Norvig, Artificial Intelligence: A Modern Approach, 2ndedition, Prentice

 Robert Wilensky, LISP Craft, W.W. Norton.
 Jones & Bartlett Learning, 2004.
 Jones & Bartlett Learning, (2004), Ben Coppin, Artificial Intelligence Illuminated,
1st edition.
 Stuart Russell and Peter Norvig, (2009),Artificial Intelligence: A Modern Approach,
3rd edition, Prentice Hall.
 George F. Luger, (2008),Artificial Intelligence: Structures and Strategies for
Complex Problem Solving, 6th edition, Addison-Wesley.
 Nils Nilsson, Morgan Kaufmann, (1998), Artificial Intelligence: A New Synthesis.
 Patrick Henry Winston, (1992),Artificial Intelligence, 3rd edition, Addison-Wesley.

Page 77 of 98
Course Title: Electronic Commerce
Course Code: ITEC4120
Credit Hours: 3

The main objectives of this course are to:

 Discuss the e-commerce process.
 Describe an example of system architecture for an e-Business.
 List the seven major elements of web design.
 Identify the major electronic payment issues and options

Course Outline:

Introduction to Electronic Commerce: Define electronic commerce, Identify the four

stages of e-commerce, Examine revenue models, Identify revenue models, Identify value
chains, Evaluate SWOT techniques.
Technology Infrastructure: Internet, World Wide Web, Networks, ISPs, Markup
Selling On the Web: Revenue models, Revenue strategies.
Marketing On The Web: Identify the major marketing strategies used in e-commerce,
Discuss marketing issues related to e-commerce, Examine the differences between
product-based and customer-based marketing strategies, Discuss effective
communication methods used in e-commerce, Define market segments, Examine
methods for reaching differentiating market segments, Examine customer relationship
life cycle as it relates to e-commerce, Compare advertizing methods used in traditional
commerce and e-commerce, Name the advertising options.
Business-To-Business Online Strategies: Define business-to-business marketing,
Examine strategies used by businesses use to improve purchasing, logistics, and other
support activities, Discuss electronic data interchange, Compare electronic data
interchange techniques and internet techniques used in e-eommerce, Define supply chain
management, Examine why businesses are moving to database driven, Supply chain
management systems, Examine the effective use of electronic portals and marketplaces
Online Auctions, Virtual Communities, and Web Portals: Define auctions, Web
portals and virtual communities, Examine auction techniques, Discuss the differences
between the seven (7) major auction types, Discuss the advantages of electronic auctions,
Discuss the disadvantages of electronic auctions, Identify the major obstacles of

Page 78 of 98
consumer acceptance of electronic auctions, Discuss the significance of virtual
Environment of Electronic Commerce: Legal, Ethical, and Tax Issues: Examine
laws that govern Electronic Commerce activities, Examine laws that govern the use of
intellectual property by online businesses, Discuss online crime, terrorism, and warfare,
Discuss ethics issues that arise for companies conducting electronic commerce, Examine
the conflicts between companies desire to collect and use data about their customers and
the privacy rights of those customers, Discuss issues concerning the taxes that are levied
on electronic commerce activities, Discuss the increasing pressure by States to regulate
and issue taxes based on e-commerce
Web Server Hardware and Software: Examine the equipment used with web servers,
Examine and discuss software packages for web servers, Discuss email options, Discuss
spam and methods for controlling spam, Discuss internet and web site software packages
Electronic Commerce Software: Web-hosting services, Electronic commerce software.
Electronic Commerce Security: Define and discuss security issues surrounding online
activities, Examine security techniques for securing client computers, Examine security
techniques used for securing communication channels between computers, Examine
security techniques for securing server computers, Evaluate organizations that promote
security for computer, network, and Internet.
Payment Systems for Electronic Commerce: Discuss electronic payment issues,
Contrast the different e-payment options, Identify on-line payment services, Explain
activities performed by a transaction-processing service.
Planning for Electronic Commerce: List some international issues that must be
addressed for on-line international sales, List at least three pros and cons regarding
electronic signatures.

Recommended Books:

 Janice Reynolds, (2004), The Complete E-Commerce Book, (Second Edition).

 Kenneth Laudon &Carol GuercioTraver, (2012), E-commerce (9th Edition)
 Ian Daniel, (2011), E-commerce: Get It Right.

Page 79 of 98
Course Title: Data Warehousing
Course Code: ITEC4121
Credit Hours: 3
The main objectives of this course are to:
 Manage large database systems.
 Monitor the processing of database system.

Course Outline:

Introduction: Introduction to data warehousing and decision support systems.

Datawarehouse constructs and components, Differences between TPS and DSS
Data Warehouse Architecture: Exploring data sources, Exploring and ETL process,
Exploring a data warehouse, Popular ETL tools, Informatics, DGT studio, Oracle data
warehouse builder, Microsoft SQL integration, etc.
Data Marts: Differentiate data marts and data warehouse, Evaluation of data warehouse,
Data warehouse design methodology, Enterprise data warehouse
Dimensional Modeling of Data Warehouse: Data warehouse design overview,
Designing dimension tables, Designing fact tables, Physical design for a data
Warehouse, Star schema, Snowflake schema, Time dimension
Online Transaction Processing: OLAP in data warehousing and different types of
Indexing Techniques Used in Data Warehousing: B-Tree Index, Pure bit map index,
Encoded bitmap index, Projection index. Hardware and software systems consideration
for data warehousing.

Recommended Books:

 PaulrajPonniah, Data Warehousing Fundamentals, John Wiley & Sons Inc., NY.
 W.H. Inmon, Building the Data Warehouse,(Second Edition), John Wiley & Sons
Inc., NY.
 Ralph Kimball &Margy Ross, The Data Warehouse Toolkit,(Second Edition), John
Wiley & Sons Inc., NY.

Page 80 of 98
Course Title: Software Quality Assurance
Course Code: ITEC4122
Credit Hours: 3
The main objectives of this course are to:
 Understand quality assurance.
 Assure and verify quality using different techniques.

Course Outline:

Introduction to Software Quality Assurance: What is quality, quality assurance,

Quality in the project manager’s triangle, The Quality challenge, Quality control v/s
Quality assurance, Testingconcepts and issues?
Quality Assurance in Software Projects: Software phases, Principles and practices,
Quality management, Quality assurance and standards, Quality planning and quality
Verification and Validation: Planning verification and validation, Critical system
Validation, Reliability validation, Principles of software validation, Software
Safety Assurance: Security assessment, Inspections and reviews.
Software Quality Assurance: Planning for Software Quality Assurance, Software
Quality Assurance (SQA) Plans, SQA-Organizational level initiatives, SQA planning
(Observations, Numbers, Results),
Software Testing: Specification based test construction techniques, Black box, White-
box and grey-box testing etc.
Tools and Framework for software testing: Jtest, JUnit, J Walk, PowerMock, Test NG
Comprehensive Software Testing Techniques for SDLC:Control flow oriented test
construction techniques, Data flow oriented test construction techniques, Clean-room
approach to quality assurance.
Product Quality and Process Quality: Standards for process quality and standards for
product quality.
Testing Documents: Walkthroughs and Inspections, Structure, Checklist, Audits, Roles
and responsibilities (Reviews, Inspections, etc), How to make reviews and inspections
most effective.

Page 81 of 98
Recommended Books:

 Nina S. Godbole, (2004),Software Quality Assurance: Principles and Practice

(Hardcover), published by Alpha Science.
 Jeff Tian, (2005), Software Quality Engineering: Testing, Quality Assurance, and
Quantifiable Improvement, published by John Wiley & sons.
 Kit, Edward, (1998), Software Testing in the Real World: Improving the Process,
Addison & Wesley.

Page 82 of 98
Course Title: Geographical Information System
Course Code: ITEC4123
Credit Hours: 3
The main objectives of this course are to:
 Understand the fundamental concepts of Geographical Information System(GIS)
 Understand data formats, structures, functions, importance and applications of GISs
in various fields like environmental monitoring, vehicle navigation.

Course Outline:

Introduction: Introduction to GIS, History of GIS.

Architecture of GIS: Coordinate systems, Geographic information, Maps; Scales and
projections, Topology.
Formats for GIS Data: Exchanging data; Analog-to-digital maps, Extracting and
reading map data, digitizing and scanning, Field and image data, Data entry, Editing and
validation, Spatial data modeling, Attribute data management, Data input and editing,
Data analysis.
Analytical Modeling in GIS: Output from new maps to enhanced decisions basic
database management, Searches by attribute, Searches by geography, Query interface,
Describing attributes, Statistical analysis, Spatial description, Spatial analysis, Searching
for spatial relationships, GIS and spatial analysis.
Making Maps with GIS: Evolution of GIS software, GIS and operating system, GIS
software capabilities, GIS software and data Structures, Development of computer
methods for spatial data, Data quality issues, Future data; Future hardware, Future
software, Some future issues and problems.

Recommended Books:

 Keith C. Clarke (2000), Getting Started with Geographic Information Systems,

3rdedition, Prentice Hall.
 D. Ian Heywood, Ian Heywood, Sarah Cornelius, Steve Carver (1999), An
Introduction to Geographical Information Systems, Prentice Hall. ISBN:

Page 83 of 98
Course Title: Data Mining
Course Code: ITEC4124
Credit Hours: 3
The main objectives of this course are to:
 Understand Data Mining(DM) principles and techniques:
 Introduce DM as a cutting edge business intelligence method and acquaint the
students with the DM techniques for building competitive advantage through
proactive analysis, predictive modeling, and identifying new trends and behaviors.

Course Outline:

Data-Mining Concepts: What is data mining and knowledge discovery process? Data
mining and the business intelligence, Data mining functions.
Preparing the Data: Data objects and attribute types; nominal, ordinal, binary etc,Data
cleaning, Data integration and handling redundancy by binning and correlational
analysis, Data transformation by normalization.
Basic Statistical Descriptions of Data: Mean, Median, Mode, Variance, Standard
Deviation, Quartile, Preparing the five number Summery.
Visualization Methods: Box Plot, Histograms, Scattered plots, Pixel oriented
visualization techniques, Geometric visualization projection.
Data Reduction: What are the methods of data reduction? Cube reduction,
Dimensionality reduction,etc.
Decision Trees: Decision trees, Building a decision tree
Association Rules: Building association rules, multilevel association rules, Apriority
algorithm, FPtree growth.
Clustering: Supervised vs. Unsupervised learning, What is clustering? Types of
clustering, K mean algorithm, Visualization of clustering
Classification: Classification process, Bayesian classification, Decision tree induction,
Visualization of classification.
Other Related Terms and Technologies: Artificial neural networks, Ensemble
learning, Web mining and text mining, Genetic algorithms, Fuzzy sets and fuzzy logic,
Data Mining Tools: Weka, CBA and Yale, etc.

Page 84 of 98
Recommended Books:

 Kantardzic,M.(2011),Data Mining: Concepts, Models, Methods, and Algorithms,

Wiley-IEEE Press; 2nd Edition. ISBN-10:0470890452
 Han,J,Kamberand,.M., Pei, J., &Kaufmann, M. (2011), Data Mining: Concepts and
Techniques, Third Edition (The Morgan KaufmannSeries in Data Management
Systems), 3rd Edition. ISBN-10: 0123814790
 Hand, D., Mannila, H. &Smyth,P., (2001), Principles of Data Mining (Adaptive
Computation and Machine Learning) A Bradford Book. ISBN-10: 026208290X165.

Page 85 of 98
Course Title: Design Patterns
Course Code: ITEC4125
Credit Hours: 3
Course Objectives:
The main objectives of this course are to:
 Demonstrate a thorough knowledge of the different design patterns.
 Draw a high level class diagram in UML for each Pattern.

Course Outline:

Introduction: Overview of object-oriented design, Overview of UML &OCL.

Introduction to design patterns. Coupling and cohesion. Why design patterns?.
Creational Patterns: Singleton, Abstract factory, Builder, Prototype.
Structural Patterns: Facade, Composite, Bridge, Proxy, Adapter, Decorator.
Behavioural Patterns: Chain of responsibility, Visitor, Observer, Iterator, Command,
mediator, Strategy, Interpreter, Memento.
Patterns for Concurrent and Distributed Systems: Event handling patterns,
Synchronization and concurrency patterns. Concurrency controller pattern.
Antipater’s: Common pitfalls and antimatters examples, Recovering from bad designs,
Refactoring to patterns, Introduction to aspect-oriented design: Aspects, Themes,

Recommended Books:

 E. Gamma,R. Helm, R. Johnson, and J. Vlissides, (1995), Design Patterns:

Elements of Reusable Object Oriented Software, Addison -Wesley Professional.
 Tony Bevis,(2012),Java Design Pattern Essentials, Ability First Limited; 2nd
Edition ISBN-10: 0956575846175
 Mark Grand,(2002),Patterns in Java: A Catalog of Reusable Design Patterns
Illustrated with UML, 2nd Edition, Volume 1, Wiley. ISBN-10: 0471227293
 B.Bruegge and A. H. Dutoit, (2003),Object-Oriented Software Engineering: Using
UML, Patterns, and Java, 2nd Edition , Prentice Hall. ISBN-10:0136061257.
 J. Kerievsky, (2004),Refactoring to Patterns, Addison-Wesley. ISBN-

Page 86 of 98
Course Title: Business Process Management
Course Code: ITEC4126
Credit Hours: 3
The main objectives of this course are to:
 Understand BPM, Business process lifecycle, flow between different processes.

Course Outline:

Introduction: BPM, Motivation and definitions, Business process lifecycle,

Classification of business processes, Goals, Structure and organization.
Evolution of Enterprise Systems Architectures: Traditional application development,
Enterprise applications and their integration, Enterprise modeling and process
Orientation, Workflow management, Enterprise services computing
Business Process Modeling Foundation: Conceptual model and terminology,
Abstraction concepts, From Business functions to Business Processes, Activity models
and activity instances, Process models and process instances, Process interactions,
Modeling process data , Modeling organization, Modeling operation, Business process,
Architecture of process execution environments.
Process Orchestrations: Control flow patterns, Petri nets, Event-driven Process Chains,
Workflow nets, Graph-based workflow language, Business process model and notation.
ProcessChoreographies: Motivation and terminology, Development phases, Process
choreography design, Process choreography implementation, Service interaction
Patterns, Choreography modeling in BPMN.
Properties of Business Processes: Data dependencies, Object lifecycle conformance,
Structural soundness, Soundness, Relaxed soundness, Weak soundness, Lazy soundness,
Soundness criteria overview.
Business Process Management Architectures: Workflow management architectures,
Flexible workflow management, Web services and their composition, Advanced service
Business Process Management Methodology: Dependencies between processes,
Methodology overview, Phases.
Recommended Books:
 Mathias,W., (2012), Business Process Management: Concepts, Languages,
Architectures, Springer; 2nd Edition. ISBN-10:3642286151.
 Jörg, B., Martin,K. & Michael .R.,(2011), Process Management: A Guide for the
Design of Business Processes, Springer; 2nd Edition. ISBN-10: 3642151892168.

Page 87 of 98
Course Title: Software CASE Tools and Applications
Course Code: ITEC4127
Credit Hours: 3
The main objectives of this course are to:
 Understand CASE tools.
 Explain three different perspectives for CASE tools classification.
 Evaluate existing CASE tools.
 Compare and contrast the fitness of existing CASE tools to the needs of specific
software development context.

Course Outline:

Introduction:CASE, Types of CASE Tools, Case environment, Expectations about

CASE and the need for tool integration, Example of CASE tool integration.
Approaches CASE tool integration, Conceptual model of integration, Evolution of
integrated CASE environment architectures, Integration as a design activity.
Service Based Model of a CASE Environment: Overview of PSE reference
Model, Description of reference model services, Uses of reference model.
Properties and Types of Integration Mechanism: The Relationship between data
and control model, Presentation integration.
The Role of Process in Integrated CASE Environments: Nature of process
integration, Process integration and CASE Tools and environments, Examples of
process and CASE tool interactions
Replacing the Message Service in a CASE Integration Framework: Background,
Adding the tool talk interface, Running the experiment scenario, Replacing the
tool talk in the emulation framework.
Integration of CASE Tools with CM Systems: Key concepts related to CM and
CASE Tools integration, CASE tool integration scenarios involving CM.
CASE Environments in Practice: Background and studies, Observations, An
example of transitional CASE environment, CASE environment progress over the
past decade.
Object-Oriented Analysis & Design Modeling: Business process models, Design
reuse, E-Commerce, ISO, Comparison of popular CASE tools, Practice real life
problem for development through CASE tools.

Page 88 of 98
Recommended Books:

 Alan W. Brown,(1994), Principles of CASE Tool Integration, Oxford University

Press,USA; 1st Edition.ISBN-10: 0195094786.
 Hausi A. Muller, Ronald J. Normanand Jacob Slonim,Computer,(2011),Aided
Software Engineering, Springer; Soft cover reprint of the original 1st Edition. ISBN-
10: 1461286263.
 Most popular software CASE tools documentation.

Page 89 of 98
Course Title: Computer Graphics
Course Code: ITEC4128
Credit Hours: 2+1
The main objectives of this course are to:
 Have a basic understanding of the core concepts of computer graphics.
 Be capable of using OpenGL to create interactive computer graphics.
 Understand a typical graphics pipeline.
 Understand the core concepts of computer graphics.
 Create interactive computer graphics.

Course Outline:

Introduction: History of computer Graphics, Graphics architectures and software,

Imaging, Pinholecamera, Human vision, Synthetic camera, Modeling vs. rendering.
OpenGL: Architecture, Displaying simple two-dimensional geometric objects,
Positioning systems, Working in a windowed environment.
Color: Color perception, color models (RGB, CMY, HLS), color transformations. Color
in OpenGL. RGB and indexed color.
Input: Working in a network environment, client-server computing; input measure,
event, sample and request input, using callbacks, picking.
Geometric transformations: Affine transformations (translation, rotation, scaling,
shear), homogeneous coordinates, concatenation, current transformation and matrix
stacks. Three Dimensional Graphics: Classical three dimensional viewing, Specifying
views, Affine transformation in 3D, Projective transformations. Ray tracing.
Shading: Illumination and surface modeling, Phong shading model, Polygon shading.
Rasterization:Line drawing via Bresenham's algorithm, clipping, polygonal fill, BitBlt.
Introduction to hidden surface removal (z buffer).
Discrete Techniques: Buffers, bitblt, reading and writing bitmaps and pixel maps,
texture mapping, compositing.
Recommended Books:
 Hughes, Van Dam, et al.(2014).Computer Graphics Principles and Practice(3rd.ed),
 OpenGL Programming Guide, Addison-Wesley, 2004.
 OpenGL Reference Manual, Addison-Wesley, 2004.
 E. Angel, (2004) OpenGL: A Primer Addison-Wesley.
 P Shirley,(2005)Fundamentals of Computer Graphics,( 2nded).
 Hearn & Baker (2004) Computer Graphics with OpenGL,3e, Prentice Hall.

Page 90 of 98
Course Title: Software Design and Architecture
Course Code: ITEC4129
Credit Hours: 3
The main objectives of this course are to:
 Design and motivate software architecture for large-scale software systems.
 Recognize major software architectural styles, design patterns, and frameworks.
 Identify and assess the quality attributes of a system at the architectural level.

Course Outline:

Introduction to Software Design: Introduction to software architecture, Introduction to

software design, Design Vs architecture.
Software Architecture Core Concepts: Define software architecture, Architecture
address NFR, Architectures and technologies.
Software Architecture Business Cycle: Where do architecture comes from, Software
process and architecture business cycle, What makes a good architecture?
Software Architecture Business Cycle: Activities in software process and architecture
business cycle, Architectural structures and views.
Quality Attributes in Software Architecture: Motivation, What are the different
Quantity attributes, Performance, Scalability, Modifiability, Security, Availability,
Robustness, How to achieve quality attributes at architectural level.
Software Architecture Process: Process outline, Architecture Design, Validation.
Architecture patterns, Structural view, Behavioural view, Implementation issues.
Documenting Software Architecture: Architecture requirements, Solution,
Architecture analysis.
Introduction to Design: Introduction to Unified Modeling Language (UML), Structural
and behavioural diagrams.
Introduction to Software Product Line engineering: Overview, What makes SPL
works? Architectures for product lines.
Aspect Oriented Architecture: Introduction to aspect-oriented programming (basic
concepts), Aspect oriented architecture, Aspect oriented modeling using UML, Aspect
oriented modeling tools.
Model-Driven Architecture: What is MDA?, Why MDA?State of the art practices and

Page 91 of 98
Recommended Books:

 Kai Qian, Xiang Fu, LixinTao, Chong-Wei Xu, Jorge L. Diaz-Herrera, Jones &
Bartlett, (2009), Software Architecture and Design Illuminated(1st Edition).
 Christopher.F.,(2006), Introduction to Software Engineering Design: Processes,
Principles and Patterns with UML2,Addison-Wesley.
 Carlos, O., (2012),Software Engineering Design: Theory and Practice,CRCPress.
 Sacha .K.,(2006),Software Engineering Techniques: Design for Quality, Springer.

Page 92 of 98
Course Title: Mobile Application Development
Course Code: ITEC4130
Credit Hours: 2+1
The main objectives of this course are to:
 Develop mobile applications on a popular mobile platform.
 Evaluate development with another mobile platform.
 Explain mobile devices, including their capabilities and limitations.
 Use current mobile platforms and their architectures.

Course Outline:

Android development platform: Development platform architecture, Installing the

Android ADT (Android Development Tools), Installing the Android SDK (Software
Development Kit),Creating AVDs (Android Virtual Devices),Using ADT tools from the
command line.
Activities, Intents, Fragments: Using styles and themes, Displaying dialog windows,
Displaying progress bars, Using intents and intent filters, Fragment life cycle.
Android User Interface: Creating views and view groups, Making layouts, Linear,
Absolute, Table, Relative, Frame, Scroll view, Changing screen orientation, Using action
bars, Creating UI controls with Java.
Android Views: Basic views, text view, button, edit, checkbox, radio, List views, List
fragments, Image views, Using menus with views.
Database and Data Persistence: Saving and loading user preferences, Persisting data to
files, Creating and using a database.
Content Providers: Creating and using content providers.
Messaging:Creating and using SMS messages.
Google Maps API: Getting location data, Displaying maps.
Networking:Working with web services using HTTP, Socket programming
Apache Cordova (Phonegap) : Cordova architecture, Creating UI with HTML and
CSS, Controlling the UI with JavaScript.
Publishing Android Apps :Deploying Android packages (APKs)

Page 93 of 98
Recommended Books:

 Lee,W.M., (2012), Beginning Android 4 Application Development.JohnWiley&

 Allen,G., (2011),Beginning Android 4,Apress. ISBN: 1430239840.
 Zechner.M. Beginning Android game.(2011).Apress, ISBN:1430230428.
 Satya, Maclean.D,(2012).Pro Android 4,Apress,ISBN:1430239301.
 Meier.R&Reto.(2012) Professional Android 4 Application Development, Wiley,

Page 94 of 98
Course Title: Distributed Computing
Course Code: ITEC4131
Credit Hours: 3
The main objectives of this course are to:
 Get the knowledge of the principles and practice underlying the design of distributed

Course Outline:

Advanced Processors and Interconnects: Multicore Processors and high-bandwidth

Scalable Multiprocessors and Multicomputers: Distributed CC-NUMA and cluster
scalability. Machine virtualization for distributed computing: CPU, Memory, I/O, and
System virtualization.
Physical and Virtual Clusters: Server clusters, high availability, and disaster recovery
Peer-to-Peer Computing Systems: P2P systems, Overlay networks, and content
Computational Grids and Applications: National or global computing, Grids and
Internet Cloud Computing Platforms: Upgraded Web services and elastic
Recommended Books:
 K. Hwang & Z. Xu(1998).Scalable Parallel Computing. McGraw-Hill.
 F. Berman, G. Fox, & T. Hey.(2003).Grid Computing. Wiley.
 Tanenbaum, A.S.&Steen,.M.V.(2002)Distributed Systems: Principles and
Paradigms. Prentice-Hall.
 Michael P.&Papazoglou.(2007). Web Services: Principles and Technology. Pearson
Prentice Hall.

Page 95 of 98
Course Name: Computer Architecture
Course Code: ITEC4132
Credit Hours: 3
The main objectives of this course are to:
 Get a deeper understanding of how computers work.
 Understand working knowledge of various subsystems and the general principles that
affect their performance.

Course Outline:

Digital Hardware Design: Transistors, Digital logic, Hardware description languages

Instruction Set Architecture: Instruction types and mixes, Addressing, RISC vs. CISC,
Scalar Pipelines: Data dependencies, Static scheduling, Performance.
VLIW Pipelines: Local scheduling, Loop unrolling, Software pipelining, Trace
scheduling, Deferred exceptions, Predicated execution, IA64.
Dynamic Pipelines: Dynamical scheduling, Register renaming, Speculative execution,
Trace cache.
Thread-Level Parallelism: Cache coherency, Sequential consistency, Multithreading,
Symmetric multiprocessing, Transactional memory.
Data-Level Parallelism: GPGPU programming.
Recommended Books:
 Dubois et al. (2012). Parallel Computer Organization and Design, Cambridge
University Press.
 Shen,J.P. &Lipasti.H.M. (2005). Modern Processor Design: Fundamentals of
Superscalar Processors.(1st edition).McGraw-Hill.
 Hennessy, Patterson, Morgan & Kauffman.(2006)Computer Architecture: A
Quantitative Approach by Series.(4th. Edition).
 Patterson & Hennessy, Morgan & Kauffman Series (2008).Computer Organization
&Design. (4th. Edition).

Page 96 of 98
Course Title: iOS Applications Development
Course Code: ITEC4133
Credit Hours: 2+1

The main objectives of this course are to:

 Build iOS native applications for iPhone and iPad using different frameworks.

Course Outline:

Creating an iOS App: Understanding Xcode, Using the Xcodeinterface builder, Using
the Xcodeobjects library, Understanding view hierarchy, Creating a custom app icon,
Creating a custom splash screen.
Outlets, Actions, and Views: Understanding outlets and Actions, Using text fields,
Buttons, Labels, WebViews, and page controllers, Using Views along with sub Views,
Creating Views using code.
Using ViewControllers: Working with the single View template, Exploring the app
delegate, Adding new View Controllers, Transitioning between multiple View,
Controllers, Using animations.
Application Templates: Working with the tabbar application, Template, Understanding
the masterdetail, Application template.
The iOS Keyboard: Customizing the iOS keyboard for different inputs, Adjusting text
field behaviors, Methods for dismissing the keyboard, Detect keyboard activities with the
notification center, Using the scroll view, Responding to keyboard activities
programmatically using scrolling views.
Working with Different iOSDevices; iPhone & iPad: Programmatically detecting
device hardware, Dynamically adjusting graphical layouts, Working with multiple
devices, Creating apps that work universally.
Using TableViews: Understanding the UITable View, Using UITable ViewCell Classes,
Working with UITable View datasource and delegate, Using Table View and
TableViewCell, The masterdetail template, Creating drill-down menus, Navigation to
other views, Using Property lists for data persistence, Creating multisection tables.
Supporting Screen Rotations: Portrait &landscape modes, Handling device rotation
setting preferred device orientation, forcing specific orientation usingno Rotations,
Dynamically adjusting graphical layouts based upon rotation.

Page 97 of 98
Working with Databases: Importing the sqlite3 library. Creating a database, writing
tables and inserting records into tables, Bundling a database with your app. Checking for
database existence. Reading and displaying database data.
Using Animations &Video: Using the NSTimer Class. Animating objects on the screen
using transformation, Rotation, Scaling and Translation, Animating image arrays
Playing video within an app.
Accessing integrated iOS Apps: Using the email appaccessing Safari. Sending SMS
text messages, Working with the camera, Using with the Photo Library.
Using Web Services within an iOS app: Consuming a Web Service, Parsing XML
consuming and parsing JSON, Web Services, Integrating common Twitter and
Facebook with iOS apps.
Working with iOS Maps and Location Services:Using the MapKit and UIMapView
getting and displaying user location, Getting directional information, Displaying map
annotations. Displaying disclosure buttons onannotations performing reverse Geocoding.
Working with iCloud: Storing documents in iCloud, Setting project entitlements,
Managing iCloud documents, Using the UIDocument Class, Storing Key Value files in
Working with the Accelerometer:
Using the Gyroscope, Using the Accelerometer, Outputting Sensor Data, Using the
Shake API.
Recommended Books:
 Keur, C. &Hilllegass, A., iOS Programming:The Big Nerd Ranch,(5th ed.)
 Nahavandipoor, V.,iOS 7 Programming Cookbook,(1st, ed.), Vandad.
 Ray, J. iOS 7 Application Development in 24 HoursSams Teach Yourself,(5th ed.).

Page 98 of 98