Documente Academic
Documente Profesional
Documente Cultură
· O'' 'I' A
,,,, "'0;
·,;:? ~
Republic of the Philippines
OFFICE OF THE PRESIDENT
f OFFICIAL i.
(5 RELEASE g
COMMISSION ON HIGHER EDUCATION ~ CHED ce,rtral Olfice ~:
·,;, RECORDS SECTIOl< ,,,~·
"'" C/i:9 ·'X><':-"'
4,e .. IJ,1'. 0'
--'"
ARTICLE I
INTRODUCTION
Section 1 Rationale
Based on the Guidelines for the Implementation of CMO 46 s 2012, this PSG
implements the "shift to learning competency-based standards/outcomes-
based education." It specifies the 'core competencies' expected of graduates
of Bachelor of Science in Computer Science (BSCS), Bachelor of Science in
Information Systems (BSIS), and Bachelor of Science in Information
Technology (BSIT), "regardless of the type of HEI they graduate from "
However, in "recognition of the spirit of outcomes-based education and .. of
the typology of HEls," this PSG also provides "ample space for HEls to
innovate in the curriculum in line with the assessment of how best to achieve
learning outcomes in their particular contexts and their respective
missions ... "
Higher Education Development Center Bull~ing, C.P. Garcia Ave .. UP Campus, Dil;man, Quezon City, Jhilipplnes
Web Site www.ched.gov.ph Tel. Nos. 441-1177, 385-4391, 441-1169, 441-1149, 441-1170, 441-1216, 392-5296
ARTICLE II
AUTHORITY TO OPERATE
ARTICLE Ill
GENERAL PROVISIONS
Section 3 The succeeding articles provide minimum standards and other requirements
and prescriptions. The minim um standards for each program are expressed
as minimum sets of desired program outcomes which are given in Article IV
Section 6, The Commission designed sample curricula to attain such
outcomes and these are shown in Article V Section 9, The total number of
units for each program is here prescribed as the "minimum unit requirement"
under Section 13 of RA 7722. In designing the curricula, the Commission
employed curriculum maps which are shown in Article V Section 10 as
sample curriculum map.
Based on the curricula and the means of their delivery, the Commission
determined the physical resource requirements for the library, laboratories
and other facilities and the human resource requirements in terms of
administration and faculty, as indicated in Article VI.
Section 4 The HE ls are allowed to design curricula suited to their own contexts and
missions provided that they can demonstrate that the same leads to the
attainment of the required minimum set of outcomes, albeit by a different
route In the same vein, they have latitude in terms of curriculum delivery and
in terms of specification and deployment of human and physical resources as
long as they can show that the attainment of the program outcomes and
satisfaction of program educational objectives can be assured by the
alternative means they propose.
The HEls can use the CHED Implementation Handbook for Outcomes-
Based Education (QBE) and the Institutional Sustainability Assessment
(ISA) as a guide in complying with Sections 16, 17 and 22 of Article VII,
hereof.
This PSG is based on the 10-year basic education system and on the existing
General Education (GE) program. It reflects the reform towards outcomes-
based education as well as international trends in computer science,
infonmation systems and information technology curricula. However, this does
not yet include necessary changes as a consequence of the K-12 reform. The
latter shall be addressed subsequently.
ARTICLE IV
PROGRAM SPECIFICATIONS
The program also includes the study of the standards and practices in
Software Engineering. It prepares students to acquire skills and
disciplines required for designing, writing and modifying software
components, modules and applications that comprise software
solutions.
3jPdf',:
Graduates are able to help an organization determine how information
and technology-enabled business processes can be used as strategic
tool to achieve a competiti11e advantage. As a result, IS professionals
require a sound understanding of organizational principles and
practices so that they can serve as an effective bridge between the
technical and management/users communities within an organization.
This enables them to ensure that the organization has the information
and the systems it needs to support its operations.
41P:1~c
• Solutions Specialist
• Systems Analyst
• IS Project Management Personnel
• QA Specialist
• Systems Analyst
• Computer Programmer
• Applied Mathematics
• Computer Engineering
• Electrical Engineering
• Electronics Engineering
• Entertainment and Multimedia Computing
• Mathematics
• Physics
• Statistics
• Applied Mathematics
• Industrial Engineering
• Information Management
• Library and Information Science
• Statistics
• Informatics
• Computer Engineering
• Electrical Engineering
• Electronics Engineering
• Informatics
• Information Management
The minimum standards for the BSCS, BSIS, and BSIT programs are
expressed in the following minimum set of graduate outcomes. The graduate
outcomes common to all programs, and those common to the discipline are
further mapped into the expanded graduate outcomes specific to the sub-
disciplines of CS, IS, and IT, as outlined in Section 6 3
The graduates of BSCS, BSIS, and BSIT must have the ability to
a) analyze complex problems, and identify and define the
computing requirements needed to design an appropriate
solution (Graduate Outcomes:CS02, 1S02-03. IT03)
b) apply computing and other knowledge domains to address
real-world problems (Graduate Outcomes: CS01, IS01, IT01)
c) design and develop computing solutions using a system-level
perspective (Graduate Outcomes: CS03-05, 1S04-05, IT0S)
d) utilize modern computing tools (Graduate Outcomes: CS06,
IS06, IT07)
61P:i",:
',----
6.3 Specific to a sub-discipline and a major
Graduate
Graduate Attribute Outcomes Graduate Outcomes
Code I
Apply knowledge of computing fundamentals, knowledge of a
Knowledge for ' computing specialization, and mathematics, science, and domain
Solving Computing CS01 knowledge appropriate for the computing specialization to the
Problems abstraction and conceptualization of computing models from defined
problems and requirements.
Identify, analyze, formulate, research literature, and solve complex
computing problems and requirements reaching substantiated
Problem Analysis CS02
conclusions using fundamental principles of mathematics, computing
sciences, and relevant domain disciolines
An ability to apply mathematical foundations, algorithmic principles
and computer science theory in the modeling and design of computer•
CS03
based systems in a way that demonstrates comprehension of the
tradeoffs involved in desiqn choices
Design/Development Knowledge and understanding of information security issues in :
CS04
of Solutions relation to the design, develo=nt and use of information sv1'fems
I · Design and evaluate solutions for complex computing problems, and
design and evaluate systems, components, or processes that meet
CS05
specified needs with appropriate consideration for public health and
safetv, cultural, societal, and environmental considerations.
Create. select, adapt and apply appropriate techniques, resources
Modem Tool Usage CS06 and modem computing tools to complex computing activiUes, with an
understandina of the limitations to accomolish a common aoal
Individual & Team Function effectively as an individual and as a member or leader in I
CS07
Work diverse teams and in multidisciolinarv settinas
Communicate effectively with the computing communrty and with
society at large about complex computing activities by being able to
Communication CS08
comprehend and write effective reports, design documentation, make
effective presentations, and aive and understand clear instructions
An ability to recognize the legal. social, ethical arid professional
Computing
issues involved in the utilization of computer technology and be
Professionalism and CS09
• guided by the adoption of appropriate professional, ethical arid legal
Ethics
• practices
Lile-Long Leaming • Recognize lhe need, and have the ability, to engage in independent
CS10
I leamina for continual development as a comoutina orofessional
Graduate
Graduate Attribute Outcomes Graduate Outcomes I
Code
I I
Knowledge for
Solving Computing Apply knowledge of business processes, computing, mathematics and •
IS01
social sciences appropriate to Information Systems
Problems
71P"~',
Analyze a problem, identify and define the computing requirements
1
IS02
· with respect to organizational factors appropriate to its solution and
Problem Analysis e-----+= Dlla::.:n~stra=t=ea,ie::.:s:..:ic:or:..;t::.:he"'i'--rsc.:o:.::luti:.::·.:con"----------------1
Evaluate information systems in terms of general quality attributes
1$03
. and possible trade-offs presented within the given requirement
, Design implement and evaluate information systems processes
i ' ' ' '
IS04 : components. or programs and to source cost-benefit efficient
• Design/Development ! alternatives to meet desired needs, ooals and constraints
of Solutions
Use knowledge and understanding of enterprises in modelling and
IS05
design of information systems
Deploy and use effectively skills, tools and techniques necessary for
Modem Tool Usage , 1$06
!
information svstems practice
Function effectively on teams(recognizing the different roles within a
I Individual and Tearn I ISO? , team and different ways of organizing teams) to accomplish a
Work·
i , common ooa
I · Communicate effecbvely with a range of audiences. Communication
Communication 1S08 skills includes techincal writing, presentation and neogitation, and
numeracv.
Recognize the legal, social, ethical and professional issues involved in i
Computing I
; the exploitation of computer technology and be guided by the
Professionalism and 1$09
i adoption of appropnate professional, ethical and legal practices both
Ethics in the Society
i in the local and global communitv
I
j Recognize the need for and engage in an independent and life-long
i Life-Long Learning Ii IS10 . leamingp 1
, lanning self-leaming and im proving performance as the
I foundation for on-going professional development
C. Bachelor of Science in lnfonnation Technology (BSIT)
Graduate
Graduate Attribute Outcomes Graduate Outcomes
Code
Knowledge for I Apply knowledge of computing, science, and mathematics appropriate
IT01
Solving Computing : to the disci line
Problems IT02
Analyze complex problems, and identify and define the computing
i IT03
I reo uirements aonropriate to its solution
i Problem Analysis Identify and analyze user needs and take them into account in the
IT04 selection, creation, evaluation and administration of computer-based
i
svstems
I :
Design/Development
of Solutions
IT05
Design, implement, and evaluate computer-based systems,
processes. components, or programs to meet desired needs and
reouirements under various constraints
IT06 , lnteorate IT-based solutions into the user environment effectively i
' Apply knowledge through the use of current techniques, skills, tools
Modern Tool Usage IT07
and practices necessarv for the IT profession
: Function effectively as a member or leader of a development team
Individual and Team : IT08 i recognizing the different roles within a team to accomplish a common
Work i i goal
i IT09 Assist in the creation of an effective IT oroiect plan
i
i Communicate effectively with the computing community and with I
Communicat10n I IT10 , society at large about complex computing activities through logical
I wliting, presentations, and clear instructions
8jP.,cc
Analyze the local and global impact of computing information
Computing I. IT11
Professionalism and•_----+_te_c_h_no_lo~g~y_o_n_in_d_iv_id_u_al_s._o_rg~a_n_iz_ati_·o_n_s,_a_n_d_soc_ie_ty_ _ _ _ _~
s · 1R ·br1 , Understand professional, ethical, legal, security and social issues and I
ocia espons, ity !1Tl 2 responsibilities in the utilization of information technoloov. :
I Recognize the need for and engage in planning self-learning and
Life-Long Leaming IT13
II , improving performance as a foundation for continuing professional
. development
!
Knowledge for Solving • Completed and successfully defended Capstone Project frhesis in line with
Computing Problems the discipline.
Documented software/hardware requirements specifications following
Problem Analysis
computinQ industrv standards.
: '
:
DesigniDevelopment of Designed and developed a computing solution using object-oriented
Solutions • approach.
Modem Tool Usage i Used an integrated development environment.
: Individual & Team Work i Worked in a group to develop a machine project.
Communication Presented a proposed solution in class or in a public forum.
Computing i
I
Professionalism and Immersed/exposed in an actual working environment in industry.
Ethics •
Lile-Long Leaming I Created a report on a conducted independent learning activity.
9 I I'" ,· ·
ARTICLE V
CURRICULUM
The curricula for BSCS, BSIS, and BSIT shall include the required GE
courses, six (6) core courses common to all programs, professional courses
required for each program, and electives as well as domain specific courses
when needed. The students are also required to undertake practicum work
and complete a thesis or capstone project
The minimum total number of units is 146. For the Centers of Excellence
(COEs), the Professional Courses and Electives, and Additional Math
Requirement may have a minimum of 48 units (instead of 60) as long as the
learning outcomes of the knowledge areas are met, resulting to a minimum
total number of 134 units
The General Education courses for the BSCS, BSIS, and BSIT programs
shall be as follows
• Introduction to Computing
• Computer Programming 1 (Fundamentals of Programming)
• Computer Programming 2 (Intermediate Programming)
• Data Structures and Algorithms
• Information Management
• Applications Development and Emerging Technologies
HEls shall comply with the minimum requirements prescribed in this PSG, In
addition, they may enrich the prescribed curricula with additional courses
based on their institutional and program goals and objectives.
CC101 - PROGRAMMING 1
The course covers the use of general purpose programming language to solve
problems. The emphasis is to train students to design, implement, test, and
debug programs intended to solve computing problems using fundamental
programming constructs.
CC102 -- PROGRAMMING 2
The course covers the standard data representation and algorithms to solve
computing problems efficiently (with respect to space requirements and time
complexity of algorithm). This covers the following Stacks, Queues, Trees,
11 ! I' ., , .·
Graphs, Maps, and Sets. Thorough discussion of sorting and searching
algorithms and hashing is covered.
1. Fundamentals of IS
2. Professional Issues in Information Systems
3. IT Infrastructure and Network Technologies
4. Systems Analysis, Design and Development
5. Enterprise Architectures
6, IS Project Management
7. IS Strategy, Management and Acquisition
~ acm,org
I .)' I ,I• d f (
• Fundamentals of IAS
• Advanced Topics of IAS
4. Information Management
• Fundamentals of IM
• Fundamentals of Database Systems
• Advanced Database Systems
5. Integrative Programming and Technologies
• Fundamentals of Programming
• Intermediate Programming
• Data Structures and Algorithms
• Object Oriented Programming
• Event Driven Programming
6. Networking
• Fundamentals of Networking
• Advanced Networking
7 _ Platform Technologies
• Intangible Technologies
• Tangible Technologies
8. Systems Administration and Maintenance
9. Systems Integration and Architecture
• Fundamentals of SIA
• Advanced SIA
10. Social and Professional Issues
11. Web Systems and Technologies
15 I i' ,
Section 9 Sample Curriculum
9.1. Components
General Education. Core Courses, Electives, etc.
i Required Courses
CC101 I cc Introduction to Computing 3.0
CC102 SDF Fundamentals of Programming 3.0
CC103 SDF Intermediate Programming 3.0
CC104 SDF I Data Structures and Algorithms 3.0
CC105 IM i Information Management 3.0
CC106 IM , Applications Development and Emerging Technologies 3.0
DS101 DS i Discrete Structures 1 3.0
08102 OS I Discrete Structures 2 3.0
SDF 104 SDF I Object-oriented Programming 3.0
AL 101 AL I Algorithms and Complexity I 3.0
AL102 AL Automata Theory and Formal Languages 3.0
AR101 AR Architecture and Organization 3.0
IAS101 IAS . Information Assurance and Security 2.0
HCl101 HCI 1
Human 8omputer Interaction 1.0
NC101 NC 1 Networl<s and Communications 3.0
0S101 OS i Operating Systems 3.0 I
PL101 I PL i Programming Languages 3.0
PRC101 PRC i Practicum 3.0
SE101 :
SE i Software Eng,~eering 1 3.0 :
SE102 SE Software Engineering 2 3.0
SP101 SP Social Issues and Professional Practice 3.0 i
THS102 THS I CS Thesis Writing 1 3.0 :
THS103 I THS i CS Thesis Writing 2 3.0
Recommended Electives
CN101 CN Computatlona1 Science 3.0
• GV101 GV Graphics and Visual Computing 30
PD101 PD I Parallel and Distributed Computing 30 I
IS101 IS I Intelligent Systems 3.0
SF101 '
SF I System Fundamentals 3.0
16l1'"i,
Bachelor of Science in Information Systems (BSIS)
17 P ~\
! ~ ~
HCl101 HCi Introduction to Human Computer Interaction 3
IAS101 IAS Information Assurance and Seculity 1 3
IAS102 IAS . lnformaticn Assurance and Security 2 3
! IM101 IM • Fundamentals of Database Systems 3 :
AL102'
Automata
Thoory an,
;orrnal
Coo, !el(I ~a/l~>-'$-i-----+----,---+--l---__j
AR10~•
Arc~•tecture
ard
AS
CS102" '"""""
os,01· Ol:,.:rere
i OS Dlscrnte StrJcil.lres 1 Stur::wres 2
HCI
IAS
18 I ;j'
'
(l
p
;:- '~
'
Assurance
and Secuntv
CC105
(IM101) ..
lnloonabon
IM Mana-n1
NC10
1"
"'""
"'
"'
C=
unica\1
NC oes
0S101 ..
Operalm
g
OS ' Svstems
Pl101 ..
Programming
PL Lanouaaes
SDF104 ..
Otliect·
oriented
Programmm
Q
SDF CC102 CC104
(SOF101t• (SDF103j++
Fundament CC(103) SDF102""' Das
a1s oi 1nmned1ale Programmng slfUctures
programm1n
Q "'
ala0f1thms
SE102'"'
I
SE101 .. Sottwa,,
Software Engmeen
SE Eno1neenno 1 eo 2 i
I
SF
SP101'
Social Issues
SP
'"'
Professional
Pracbce 1
'
!
'
THS1
THS1Q1• or-
cs
- cs
Thesis
THS Thesis 1 2 I
PRC
-
PRAC101'
PracOCum
'
CS Elec
Elective Math E~ctive' CS E!ec1 .. CS Elec 2.. 3"
cc 100-
Application
Development
and Emerging
cc Technoloo1es f !
Pure Lecture
•• 2 hours lecture, 3 hours lab per week
Supervised Independent Study
ITF lntroducbon
to CompL1lmg
CC104..
PIF Data
Structures
~.
1911';; h'. l'
I.~-...
,~\
l, I•
":·.:::::;;:::'
"''
.,,""""'",ms
I :
CC105"'
DIM infOl'!Mlr,)n !
!
M~~~-n\
1$102"
15101'
ProfeSS1Cnal
PIS
Fuodamoo:ats Issues in i
ol lnlct'rtatKm I
I s,-,, lnfolmati<:111
S.vsfems
1
18103" I
I .
NlT 1imawnicture
J,~d NilbM:irk
i ~ech/10;,..,._,,,. i
:s104"
!
j
Systems
SAG
Anaiys1:; and
I De•-
1s;c:-
I
"
i I Enterpnse
Arehltectuae
CC10?" CC103..
Conw.rter i
PF
""""'
Frngr,:il'l¥nmg Prngraml'l'llng
_,
1
i 2 I tSi(!(':'
I
I
i lS Pro.iec!
,pM
ManugeMent
1
1$107'
·SS!!atei'I}
ISMA I
ane A,.,,...,fSioor
CC106"'
Ii
Applicaboo
UE Dcvetoprrl€!l'r..
and Emergmg
~ectmoloo,es i
' OM101'
I I D"110J' DM1J4'
DEC
(>gan.zalin OM10?'
F nanc1a1
BJS/fleSS EvalJabon o1 I
'"
Managerre'l1 Ma1ag~nt
P,oois,
Ma1~1
Business
Performance
I
Conceot<.
QUAMET" I i
~A"H Ouantita!r.-'l?
i
Melhc-ds
CAP101- CAP10Z-
CAP
-,
Ca,- Caps10ne
Pro1ect2
PRAC101-
I ?racilcum io.
PRC
i I
I lnformatoo
s,"""'
i
i
AfJV {EiocM) !
PROFEL 1
I PROFEL 2 PROFEL 3 PROfEL 4
I I
Pnr<.: Le<:tut.:
"'
,. ....... 1&1
Total
GE
21.>
12 9
21.5
6
21
" 9
6
• i 9
ITF
-1c: 101 ..
WlttOOUCboo
HGi tn liurnari
""-'
lnterac:ion
20 It' a_
IAS
i IAS1W"
lnformabon
IAS 102""
lnformabon I
''i
Assurance Assurance and
and Secuntv 1 Secut#v 2
CC105"
IM101 ..
lnlOrmanon Aclvanced
I
IM '
ManagerMnt 1 Database
Systems
MS1W MS102'
MS Discrete Quantitative
Mathematics Methods '
i
NET 101 .. NET102..
NET
Networl\mQ 1 Ne\v.Qrking 2
CC104" !
CC102""
Dara
Computer
Sln.lctures
Programming
PF
1 '"'
Aloonthms
'
i
cc 10r PF 101-
Computer Object I
Programming Oriented '
2 Prooramm1no
'
SA 101 ..
Syslems
SA Adm1n15trabon
'"'
Maintenance
SIA 101 ..
Systems
SIA. integrabon
aed
Architecture 1
SP101'
Social and
SP
ProlessioncM
l:.SUes
CC106"
Applicallon
' ws Deveklpment
and Emerging
Techru'W"V'>ies
CAP 101- CAP102""
THS Capslone Capstone
Proiect 1 Pro1ect 2
PRAC
'
PR 101-
Pracllcum
SIA102""
IPT 101 ..
PT 101 .. PF 101 .. Systems
lntegratrve
ADV lntegrat10n
Platform Programming Event Driven
(Elective)
Technologies
'"'
Technoio;lies
Programming '"'
Architecture
2 I
Courae
Code .
Know
,,,
ledge Coul'lile Title
Pn,-
Requisite
Units
Sample Leaming Outcomes ~
N
:. :.
~
Intermediate
CC103 SDF SDF101 3 Assess and recommend revIsIons to another I I
Programming
programmer's code (1) regarding appropriateness of
chosen data structure, (2) reg~ding appropriateness of
L01
chosen conditional and IteratIve constructs given a
programming task, and (3)regardmg thoroughness m
applymg procedural abstr~hon
221 p :If
I I !
I ,o, Compare ar,d contrast prooedurai!funclicnal approach to
i
I
'
I
objec!,orl$fl!ed programming approa;n I I
SDF
ot,ec1- i
SDF oriented
104
Pr~raml'l'llrg
SOf102 3
I
Design. irrr,ilerrient, lest and detug programs !.Sing OOP
E E E E I
I
! I :.OZ concepts li.~e anstr.ncr- e1capsulati0fl, ir.hSrif31'1ce anc
i I i
i polymorphism
I '
I
!
I
' I
I
i
LO'• and Reiaticns, and relate '."Iese operations to ::ompu!l?r
program-r:ing i I
I Discrete
log;c bf applymg appn:,:mate Mes o1 infe,-ence I
Co:1slruc! sound arg,Jnents in proposlftO~a! and
!
DS101 C<S Structures 1
ALF~IG 3 L02 I predicate I i
I
!
given samole iniell.genl scltwm i i
I i i ! I
Cooslwcl 1,a,I0 rr.a!hematicai proofs usmg nat>terna\JcBI
~c:i I
I
I !
I
: 1ndccboo. d,rect prOOf .and proof by contrad!Ction to
sir1phfy progra'ts and prove program correct~ess I I
Solve real~ co11pu\mg probklris !hat requ,re
LOi 1r,appifiS lo oerrm.1talt0ns, combmahons of a sel, and
mQdular aritt1met1c
Discrete
DS102 OS Stmc:!ures 2 05101 Compute !he e11ent vobabllfhes usmg COJfllJlQ ood
L02
Bayes 1heo!'em of a sample corni::i,;lmg p;obiern
L03
()e(J(;ribe the bet.av,or 300 nmnin{; time of ~arkus I
I searching, son,ng, and graoh algorithms.
i i
!
i
i ! ! I i
I
I
! LO".
Design finne-stale mac.~mes. regularexpressioos,
i context-free gram Tia', push-d;:,wn ai1tomata and :ur<rg
maeriines for mooeling a 9'V&11 languaGa: .ato define tt.e
I i
AJIOtTlata I
classes P and NP a:id exp:a,n their s grilicance !o
:"hoofy W'C
A:..102 Al I ;::orrra· AL10' 3 ! CCl"'IPUl\l'lg appilcat10:,s E E E E '
_angu;:ges ! !
i
i
I Apply tile cor.cept of state rr.;.ch1nes in the design atm
r I l02 rrnplement;!Wn c: software
!
i i ' i i i I i
I
l l
i I ,.D1
irnplement a s1mote chent-server soe;t;et-based
a:;iplication thal mee'.s il1e needs ot an organ1:talio1
! '
.gamst sec,mty lhraats-
i I I
t-.etwi'Y';,s aoo
NC101 NC Comrrun1ca!i;1
"'
SDF1C2 3 L02
I
Design and 1mploowml a Slmple telia::ile network orctocol
through lhe diagnosis and fixing Of common network
oroolems.
i
E E
' E I E E
El
!
Compare and contras: the fixed ano ctyr,amic allocation
cC3 I
i let"INques I
! I
l 01 Analyze lhe tiaoeo& nrerent in OS design
I I
!
-
'
!
i Cotnpare and CGJ;trast the algonims used ror processor
:)oera11ng I l.02 sehedullflS aM the differer.: ways of a~ocating memory lo
OS101 OS &rstems
SDF103 3 E E E E E E E i
! i
I L03
8esig n ard cre.i\e COOCJl'ertl p;ograrns cc:r.s,denr,g
syneh.romzati01 issues I
I '
I Ces19n lhe 03$IC ouildmg blocks O' a ,:;omwier·
arilhmettc-•ogk: l)()il (ga!e.Je.,el). registm \gate-~vel).
I
LO"
Architecture cerrral processing ur11t !~er trapsfer.1evei) mermry
DSHli
ARtC· AR Md 3 \reg1Ster transfer -le~el; E E E
SDF103
Orgarnza110n
I
LO? w,1te simple i;:rograms m asse'T'biy ian~Jage
l i .
I
I
Froc:t1ce 1
! 1
LOZ
baluate profess,cra eih!Cal allC sccial issues of
cOl"'lputing rjecistO'lt
I 1
! I
Drscuss !he difference between the w.a!erlal!"bssea !
l01 roo:iels and agile-based mOQe,s ar<d iden!ify !he
i
strengths al1d weaknesses of l:lese J'l'IIXk:ls
i
l '
Design ar over-all ar:;h1tet1me ct rie system, anc 1uslify
I i
L03
:tt aopropriate~ess
So!twme
i
-3£102 SE SE10I 3 Llestgn tes! case docvmenls- apply mg goo:i :estmg D D D D D D D
~ngineru1t19 2 D D D
L03 praclices. run the exiS!:ri~ program <J,Jair>s1 these tesl
cases, aoo mpori 1Y09ram defects properly
I '
I uix,a1e a scftwara Iha! -e,:;u:<es cteiect fix,ng or ~as
i
i
' L04
urdergone some charges m specifications
I I I i I
241 I'll!'
Describe the sat of contm!s and procS$$Q& bolh ieehrncal I
~01
an:1 policy nlern;led to protect and dere<'lc mformetkm and :
information systems by ensurmg their availabihly.
irtegrity, ~lhen'.lC811or. arid confidermaMy and
: I
lr.format1ro providing !or non-copudim(ln
IAS101 IAS Assurance and IM101 2 E E E E E E
Secunry
Articulate the strengltis and weakne,sser, associated will'
LC2 different app•oaches to secun\y to the validity ot current
and pao;\ processes and data
I I
::.eve oa aop"():trale JSer 1rterlaces !or domain specific
I to1
~plica:ions
c.O'
::ormtfale the researcb cbjec!wes, scope and limilalJOn!,,
a'ld eva:uatiO'l rnetnc for a chOsen tooic
I
'
L02 Coilect and compare related 11ta.ralure re.:aled lo tile topic
PRCiC
ooc:.imant a software system as ap:,had t: a rea,-w::rld
PRC Practicum
3" ) L01 prob.em, as par! of a lean v1 an octua: compa,1y D D D ) D ) D D D [
1 Slandmg
enworunenl lbeieby also deve!Oping personal and
inrorperoonal wol)Jng s~ills ir. tne process
c...m,
Cod, COllmiTltle
1'n,.
Requle.tte
c••,..
Units
Sample Wmin9 Outcome, . .
0 a ,.a Ii !!
Ill ,.i!l
I
.:; l!l
!.!!
, l!l
!:!:!
I~ !::;
I
!
Explain fundamental pMC!;lles arid
cooceptS
L01 e>'OlJlion of computing sys!ems as :ney relate to
different fields
:ntmdvel,or IO 2
CC'01
GonpLi,flg
"'"" L02
Expmmo on me reeen! 1Jevelopment5 m the
differeni computi~ Knowledge areas
I I I
.· 25 I f' :i ~
Design, 1mpleme11l tes1, and dobug a program, ! I
based on a given specifical;on, that uses ea-;ti ol
the followmg f',indamentai programming
l01 components: (1j primltve dala types \2; b.m:
Ccmpi,ier 3 computaton, (3) silll)le !/0, (4) coOO!botlal 800
CC102 Programmhg 1
''"'
'.eralive struchFes (5} definition cf tJnciKlf'S and
Oal'ameter oassmg anct(6: •ecurs!Of'
I I I I I I
I
'
An,ljyze- and simulate results. of algorithms lhal
L02 may be 1mpleme111ed as a solut10n to a giveti
I problem
i I i I
I
!
Desig11 1npleroer::. test and .Jetlug a prog:rarr,
based on a given spee,ticat,or !ha! \JSes (1\ !
I
i
Design, impiemer,t tasl aid debug a program
riased on a giver soecif1ca:.ons Iha! 1.s.es aid
L01 E E E i
D'llplernen: abstract data types (stocks, que~es,
pnOrity qlleues. sets, 'fl8P&]
''
Data Structures 3
CC1Q.< and Algcr~~ms CC103 '
Anarys:£ Argue strengths and weaknesses among multiple I
L02
ITTJplementations for a pm~em (e g, on the
aspe::ts cf llera'Jve or ~urs1ve soh.1!ions an.1 on E E E
'
I
I
the as~ts of .tistrocboo. exws1.la110n ar:d i
mformatioP h1d,ng; i !
! iltomlal100 j .
CC1:JF Manage•n1:mt CC1o.t lQ\ 1n1egrale busmess intellf980Ct! funcl!Ors ,n !he
E I
deveiooment of oalabaie systems III enterpnse;, E E I
' E
' '
L02
Apply/exhibit ethical ttnnkmg s.klllS in analyzing
am;! finding resoi!lOOns to ccmputmg 1sst1es
'
i
i
I I
I
IT lntrastructure E\ra!Uate- now f'; infras:ruciure components are I
IS103 and Network CC101 L01 orgamzed :nto infrastructure solutions 1~ dilferen: D E E E D
Techno!ogies orga111zat1onal enwonmenl:. i
3
I i I I I
26 P ;;i ,·,
!
I I
! ! '
Examine, tes~ and evaluation web solu!mns as
LOZ I
app!md to busmess e,,lerpise
I !
I
Concepts E(am,oe ano Evaluate ma1agement lrtecycie and I E
i
.' i
:_c2
the 1nformab:m $)'$let$ tl'at SUP!Xlrf lheFl ' ' E
I' J
' Finanoal
I E1:am1ne ar,d Evaluate finari~1al processes and
'
!
!
0Mt02 DM1J1 i LO~ rept;l'ls dOO the ,nforrnation syslems that sup;i:irl E E E L E
j
Management
I !hem '
.
i
I L01
:Jse systems thmk.ng ,n moaehng and analy2l!19
bJsiness processes
Business
i
E E ' 0 E
DM·o3 Pror..ess JM~02
Maragement Relhink processes tc s1mpMy business ope;alioos
LOI E E 0 D E
I I ' i
. '
t: ..atuate tius,ne-ss perlorm..,..-,..e applying !he
i L'.J1 different evaluation !OO!s co,1s:s!ert w,th Quii1'11)'
mari~er<ienl an.d con!n'uOOS 1mpr0Ye>rent
!I '
I'
I
i D D D
Evalua\KW of 3 I
DM104 Business DM1C3 Develop qul;llily ~ for assessment of
I Perforr'.1ance L02
customer salisfa::1100 ;n all !Ylt!Ses of i'il'1 cycle D D
i D
LO3
Design a business µe-formance "T1a1agemenl I
! program for SMEs D D E E E
QUA~
'
I
I
J
Ovanhtative J• Year Use appropriate matherna:·cal !Ools fer decis-,ori ! I
ET Metttoiis Stardmg L01 D D 0
i
!
3 making,
I
'' i
i
I ' !mpiemen1 ma!hernaliC8< methocs , :T solultons
L02 D D I I
!
i i
:o problems
' l i \
D
I i i
27 I "
CAPiO I Gal)$tone ,f"Yeat 3 ! I I !
I
' Pro,eci 1 StrlitliliQ 0 D D D i D D ID 0 0 0
i
i
I CAP10 caos~ne
I 411'Year
I
3
I
2 Prc,eci 2 Standing D D 0 D D D D D 0 D
! I i i
Analyze, design, rr.plement test maintain. -I
I
PRACO
PracltCW"'•
4Ih Year i
3 ,3,1d,'or docomt,m: a sottware :;ystwn as app!iec 10
areal-world orootem. a& pa'! of ateam in an I 0 I I
I
I Slaodmg
L01
actual company enwo~ment, the<etty ;)!so D
i
D ! D D D
D ID D D'
I i
deve!opmg pasooal and 11:1erpersonai wDfkmg
s•Ais ir me Drocess I I I i !
i
i
K/lOWledoe areas !
Analyze solutions
!
employed by or~a11:ta110f's
L03
I com"'""'"
to OOdress diffeuml
: i
i
ISS~ !
Jesigr:. implemel'\t. ;est !
I
and debug a progra~, I i
I I'
!
i
based ori a given
!
specifiwt1on. tha1 uses
each of the foJOWJf\3
i
i
l I
lum:1amenta: ptograrrrrmg
iXJmP(lnenls: l1} pnrrJhve ! i I
i '
L01
CompJ!er dala ;ypes. (2) basrc i i
CC102 PF Programmirig
comotilaOOr,, {3j s1rrpie
3
1 "°"' l/0.14) condit1011al and
i1erahtte Slrvctures. (5)
I
! I I
'
!
:lefi,i1bon o1 ftmciicns and \ !
i i i
pararne!er pass1r>9. a,id{6) I
I
!
I
"'"'""'"
AnaiyZe and sImura1e i i
CC10
CCH/4 S:-Uctl.lffl$ an □
Aigoritrr.s
3 Argue stre~glhs and
weaknesses arrong
I,
mult1;;le irnolemen\a!ions
'o< a problem (te. or 1he
LOI , aspects of iterative vs
! I, recurs.ve soh,;ion& ana on
:'ie aspect:, of atislfll:l1<:m
i encapsulatotL ard
i 1nlormat1on hidmg)
I
Analyze an exIshng
I
i
I I
ctatabMe system 1111th
L01
respec1 lo oual11Y :ssues
Re~abil:ty, scaiab!tity,
etlktency, effecb~eness
and security
I
cc•05 IM 'I Information CC1G
~ ! t: E L E E
' ""'~"""°' 3
Design a database basel.! i
i E i
I
E !'
291 pd~'
1 I
I L02
1 irpiemenl '!lathematica!
:rethods in 17 soiutions !C
I
I i
I
r:robiems
I
!
I
I I CompNe ano cootrast I
L01 pn.x:edurallfuncttooal
I i .ippmach !o objec1-0nen;ec
I prograrnm11g approocri
I PF 10'.
I Qbjac!-
cc I
PF i
I
,orienleC
Programming
103 ~1gn. 1mpiement. rest
a~d debug programs :JS''IQ
E E
IE E E IE
LC2
ooP conceDts llAf!'
aostroctior, encapsu:at1;;in I
, 1nheotance and I
I po1ymorpt11sn i
I
I I
I
I
!
I
I
I I
I I I
I
'1
I I !
uoor events
i i I i I
I I
I I Analyz,e different use'
pormJations with regt«d to
I I
I hCI mtroduct1or IC
Humar
I CC1G [
LG'
I lheff abilities and
Cl'laractersta 'Or uswg
· bot:\ software and
I I
i
hC!lOl
CotnOt,/1.e' I ' IE E
1n1er.:rbori
' !
!
noroware Prrxlue!s,
I I •
i
i Evalua!e tne des,gr o'
L07 , exS~ng usermteilaces
i
! I
I
; oased on the cognitwe
I rn:.dels of tarQet user I I
i
I
!
Ii
I I °"'"°P protrlfypes I
I L01 : ;nterlaces ior users wi!h
! sl)€Cifi(: acces$itli!ity ·ss~s
I I i
I
I I, .
Peit::r.-r usability
I
1
evaluation of an e,:rsling I
SysteMS
, Propose possibilities 0:1
! i Ii no.. :o improve a specific I
I :..02 algorilhm as may be
applioo to data
j
I
i
w:;irehousing ard mining
I
! I I fiecl)TU'l'l8nd ar.
appropriate operatng
II LC:
. systeit based on given
I sys!err: reqmrements
'
PT1~l x·.o i j Pia~ a-tc! write a s:mple
£ E E
' I L02 : asseP1oiy-!argoage
i
pmgtarr,,
I j i Petr....m a cost-benefit
:..03 , analysis for a prooosed
I server solution
....
30 I,,",·
I,
I ! ! I
Descnbe data
I
I, LO, 1
communicatoos and
network rxidels,
I i
i
! :oix,'ogies, protocols,
! i staridards anO
architectures
1
l I i
I
,!-----)------------------,i
Descnbe necessary
na«Jware aoo cornl'.(lnents
used lo establish
commvnicaton belweer
NET10 ! PTIC
~ET i
i L02 I mullIple oo!worlc:s and
ana,yze tne effec! oi
vanous tcl)Ol()',11•%,
1
I
[
ne!Wtllk applicalI0,t
I
I
! II
I t.03
!rnp,ernen! 10a:! halarcng
1:, rov:ers ari(l swilthes ,
I I
Oesigi, d~icp and tes! a
progran tr'a! uses e
:_01 rr.essa;11ng reivice that
I senas asyncr.mnous
i i T,essages ocross lhe
I networ~
I ,ritegrafue
! Je$19n. develcp a7<l test a
!
IP]
I 0 ror;rarnrtog
i and
1 Teomolog1es
3 I , program that uses $AX er
I DOM tc parse an XM"' E
!
E E ! E E
i
,.O? documeN XSL a11d XSL T ,·
• 1
~olh~l
I
I
L01
I !'$:rypting lechnlques tl'a!
ersmes se:urity of da!a
I
l 1P7 102 I !PT
i Drcg,amm'ng
!PT10
.
I I
! "" I'
1 Recomriend wrerc an E E E E
~ecimoiog1es appilcat1on !anguage anc a
~ptmg language wou'd
I
I L02
be more appropriate arul i
I give a val le >eason I::
support lhe se!eehon
.
31 I
Ana:yze !he
ai;ipropriateness cf a
LO1 00::ISI00 ~ I0•SCllfCe or
oot,source !T seN!CeS 1n a
giver s,tualiori
lmolement an 0/lte'prise
LO3 mIB;Jfa?!or 11idcleware
plalfo•rri,
I
Systems
I · Coos!rcJc! an archrtecti.:rai
StA102 SIA
SIAlO ! mode! of a comoiex systen,
lntegralioo aPd I L02 E E E E E E
Arch1tectore 2
' using an arcnilectura
fta'T'eWork
1
I I I
Develop a comoonent arQ I
del';l:mstrate ~ in:egra!iOP
i ;oto a~ exiSting
' ervrronmenl
i I I ,
I I I
I .,,, l
I
1
Inniemenl1011 of oomou1ms
sOlu\10% i'l varioi)s I E
Ir£ orgam::af!Q('ls I I
I ' I i I i
I i issues
Anal11e eltiicai aoo iega:
Iha\ arise m
Social and
I i I
I I, binfonralior;
SP10 LOJ 1echnology ftelc
SP102 SP · Prolessioral E
! issues 2
determine ~w to (
aadress them techricaly
I i and ethn:a!ly I
I 1 : i
I•
I, E.xarw1e !he rnla!lonsh.p . I I
between threats
\ VUlnetabil!1ies,
COJr!errneasures,
I , I
, anties. CQmj)(om'ses a:1d
I I,
,I
!AS101 :AS
/!'formation
A.ssurimce ar.d
Securi!y ~
SIA1C
L02
Ex:llam !he key '.actors
1~ ,n aulhenlica1iOt
aniJ how they ;re used to
E ,I E
venfy "1en!ily and g:.ant
~ lo the system
i
i, De sci be the lef;al lll);j
elhca: co!"lsioerabons I
rela',00 b the handling a'id
managernenl of eotaronse
I I I
mforrnabon assets
I I
J'2 I[; d -
Dlscu!.S pCMCies and
pnrlces to sys rems
inlegraton and aichrtecwre
L01
K: ensure secure system
operation and m!ormator,
assi,rance
, 1OJ
1_ .
i , wyOSe Strategies Of'. /'tow
I, "" ia COl.lnler attack threats
I I
-'--+-t--~---t--t--t---l----t--+-,-H,.
1
securit, a'lold [
--t-------t~-+----+1·-------,----+--·,,_-_" 1o ..
_,."_·
i 1
i
!
f-
i . - -
I
i
1
1
: :As10 ' metnc ! I'
!
Pr:;pose an elh,ca! and
: LOJ feasible IT sa!utmn to !r,e
rdenlifiee problems 1r !he
"""""
i
i
33 F d
l I
L03
Rec::irnmend possible
improvements in the IT
Solution <!ue to
I I
1rl'lpjementatmn issues
'
1
I I :
! ! !
J~slify how l'e$0urces *'II
L01 be allocated tit the >1anoos
' adrrirnstralive domains
i'
I Formulate policies
governing tile use cf IT
L02 Systems withm !he
Systems
Adfl'Ml1str alioo IAS1D organization '
SAiOi SA aod 2 ! 3 D D D D 0
Maimerance ReccMmend measures on
how ID ao1rmistef ar-0
L03
Main!a,, Sys';eMS
e+tech,;e!y
Modify configuration of an
LO< operating system to
implement policy
i I I
-
:
Analyze, desip,
irnvlement lest, f"!aintain
anclor ooc-ument a
IAS soflware systerr as awie:1
101 to a re.al-wood problem as
PRACi
l01 ?an of a team m an ac!Jal C D D D D D D D D D D C D
01 Practicum
cc
100
' company envucnment
!hereby also deveiapng
personal and interpersonal
worfJng skdls in ltJe
pmcess
i I i
' I
Section 11 Sample Means of Curriculum Delivery
The graduate outcomes of the BSCS, BSIS and BSIT curricula are achieved through.
but not limited to the following activities:
INTRODUCTION TO COMPUTING
Prerequisite None
Type of Course Lecture
Units 3
3411';:~,
Course Description:
Learning Outcomes:
• articulate and discuss the latest developments in the specific field of practice.
(Philippine Qualifications Framework (PQF) level 6 descriptor) (Graduate
Outcomes: CS10, IS10, IT13)
• effectively communicate orally and in writing using both English and Filipino
(Graduate Outcomes: CS08, IS08, IT10)
• act in recognition of professional, social, and ethical responsibility (Graduate
Outcomes:CS09, IS09, IT12)
• apply computing and other knowledge domains to address real-world
problems (Graduate Outcomes CS01, IS01, IT01)
• utilize modern computing tools (Graduate Outcomes: CS06, IS06, IT07)
35 I
Other Requirements and Assessments:
Aside from the major course outputs above, this course has one other summative
assessment: a cumulative final exam. In addition, there are formative assessments of
two types: departmental exams and graded class activities. Graded class activities
include (but not limited to) recitation, seatwork, assignments and reports.
Grading System:
To pass this course. one must accumulate at least 60 points through the course
requirements discussed above. The maximum points that a student can obtain
through each requirement are shown below.
Learning Plan:
Final Exam
Text I Materials :
References :
Learning Outcomes:
LO1. Develop specifications for a software development effort that precisely articulates the
functional requirements, expected execution paths, and the explicit use of cutting
edge or emerging technologies, which includes hardware devices and software library
APls.
LO2. Select and use a defined coding, documentation writing, and licensing standards in a
sufficiently complex software project where coding idioms and mechanisms for
implementing designs to achieve desired properties such as reliability, efficiency, and
robustness are practiced with respect to legal and ethical considerations.
LO3. Undertake, as part of a team activity, an inspection of the source code and unit testing
of the functional units of a sufficiently complex software project.
Course Outline:
As evidence of attaining the above learning outcomes, students are required to do and
submit the following during the indicated dates of the term. The rubrics for these outputs are
provided
Learning
Required Output Due Date
Outcome
L01 MC01: A detailed specifications of a sufficiently
complex software system that explicitly use cutting
edge or emerging technologies.
MC02: A rigorous set of test data and sequence of
' input operations, expected results or program
behavior, and the actual results or program behavior i
L02
designed to comprehensively test the functional and
operational aspects of the software project.
MC03: A documented evaluation and feedback on
I
'
the software source code.
L03 MC04: A documented evaluation of the software
project with respect to software documentation, ,,
,,
Grading System:
To pass this course, one must accumulate at least _ points through the course
requirements discussed above. The maximum points that a student can obtain through each
requirement are shown below.
Learning Plan:
Note: The HEI may choose the cutting edge or emerging technology to use.
38 I
Rubrics:
Program The application The code The code The code Program that
Correctness meets all the works sometimes fails often fails, does not run
requirements for typical or typical input. even for and /or
specified in the input, but Many parts of ' typical input. implemented
project fails for the program Most incorrectly
specification. minor Implementation indicated (based on
The code is special violate indicated restrictions specifications
syntactically and cases: restrictions and were and
logically correct the major some parts of violated. restrictions)
for all cases. requirements the automatically
! Implementation of are met, solution are not gets Ofor this
the program though implemented : course output.
follows the some minor using
indicated ones are not. appropriate
guidelines and Some programming
does not violate lmplementati constructs.
indicated on of the
restrictions. The program
implementation violates
· also exhibits indicated
. appropriate use restrictions .
• of programming
; constructs.
Effective Answers to Answers to Answers to Correct Failure to
Communication questions are . questions questions are ' understandin explain and
/ Concept correct. are correct, but g justify
Understanding reasonable, and correct, but cannot justify of the workings of
reflective of the some solution (e.g., problem, the code
code. The justifications solution via trial but was submitted will
justifications , provided are and error, unable • automatically
provided are : weak. rather 'to explain ' merit O for
sound. than proper workings of this course
I
understanding code output.
i and application provided.
of
concepts).
Readability • The program Minor code Not all functions Minimal No internal
· conforms to a formatting I program internal documentation
coding standard does features have documentati and code
that promotes not exhibit proper internal on is not
code readability. consistency documentation and code readable
Internal in coding readability.
documentation is standard.
comprehensive.
39
References :
1. Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns:
Elements of Reusable Object-Oriented Software, Addison-Wesley, 1994.
2. Stephen G. Kochan, Programming in Objective-C 2.0, Addison-Wesley, 2009
3. George Reese, Cloud Application Architectures: Building Applications and Infrastructure in
the Cloud, O'Reilly Media, 2009
4. Wei-Meng Lee, Beginning Android Tablet Application Development, Wrox, 2011.
5. Stephen Fishman JD. Legal Guide to Web and Software Development, Nolo,
2007.
40 I I :, ,
ARTICLE VI
REQUIRED RESOURCES
Section 13 Administration
13.2 A Higher Education Institution (HEI) offering any of these programs shall have
a full time academic administrator for each program. This administrator can be
a Dean, Department Head, Director, Coordinator or equivalent depending on
the organizational structure of the HEI.
• 4l , !
• completion of Bachelor's degree in CS, IS, or IT; or
• coursework requirements for a master's degree in CS, IS, or IT;
and
• at least three (3) years of computing work, computing consultancy.
computing research experience, or tertiary level teaching experience
in computing within the last five (5) years.
13.4.7 To help enforce the concerned HEl's rules and the laws
affecting education, and the procedures, policies, rules
and regulations promulgated under authority of or as
adopted by the Commission and/or the HEI;
42: !',
13.4.9 To undertake periodic curriculum review, revision, and development
with the assistance of the faculty members in the degree program
concerned; and
Section 14 Faculty
14.1.2 At least forty percent (40%) of CS, IS, and IT core and
professional courses should be taught by full-time CS,
IS, and IT faculty members. There shall be a career
development and tenure track for full time faculty
members.
43 I I
join and actively participate in computing related professional
organization{s).
441 ,
computing through coursework or thesis/projects plus at least
one of the following:
14.3 Load
14.3.1 Assignment - The regular load of a CS, IS, and IT faculty member is at most
twenty-four (24) units or thirty (30) contact hours per week whichever is
lesser. inclusive of lecture and laboratory. Overload should not exceed six
(6) hours per week. There should not be more than four (4) preparations per
term.
14.3.2 Teaching Load - As a general rule, in case the Dean has to teach, his or her
teaching load should not exceed nine (9) contact hours per week. This load
takes into consideration the functions of the Dean. For the department chair.
his/her teaching load should not exceed twelve (12) contact hours.
14.3.3 Consultation Hours - Each full time faculty member shall render at least
four (4) hours per week for student consultation. This should be outside of
the regular contact hours.
14.4 Employment Status - A full-time faculty member should render al least twenty-four
(24) hours in residence per week as certified by the HEI, have a minimum contract
of one (1) year in the college/department and must not be employed full time
elsewhere.
14.5.2 Facilities - The HEI should provide office space, computers with Internet
connections and printers for faculty and administrators There should be
one (1) computer for every three (3) full-time equivalent faculty members
1~,
\~1
.. ~ .... 45,
~-:::i:f
J , :
and one ( 1) for every administrator. Consultation areas for student and
faculty are also required.
Section 15 Library
15.1 Librarian(s) • HEls offering the CS, IS, and IT programs should have at least
one (1) full-time licensed librarian with at least one (1) year appointment. The
librarian(s) shall participate in faculty meetings and activities and serve as (a)
member(s) of the educational program planning committee. The librarian(s)
should work closely with the Dean or Department Chair in collection
development for the CS. IS, and IT programs.
There should be at least one ( 1) librarian/staff for every five hundred (500)
students or fraction thereof.
15.2 Book Collection. - The library collection of the HEI should meet the
following requirements, namely
15.2.2 For initial offering, the minimum volumes of books covering first
to third year courses are required to be found in the library. For
program recognition, an HEI should have the required number
of books in all four-year levels.
15.2.5 The library must provide access (with capability to read or print)
to electronic library materials such as CD-ROMs and electronic
subscriptions. These are considered as additional library
holdings beyond the minimum requirements.
46 • ., .
15.2.6 The library facilities may be augmented by providing Learning
Commons.
15.3 Space Requirements. - The library should have a seating capacity of at least
five percent (5%) of the total students enrolled and a minimum floor area of at
least two (2) sqm per seat. This may include spaces provided as Learning
Commons.
16.1 Classroom Requirements. There should be at least one classroom per one
hundred fifty (150) students enrolled. Preferably, there should be no more than
50 students in a class. In case of large classes with more than 50 students,
preferably, there should be separate discussion classes with at most 50
students each.
In addrtion to teaching facilities. the HEI must provide internet access for the
students and faculty members. All computer laboratories must have Internet
Access. The minimum dedicated bandwidth must be at least 4Mbps. There
should be at least 4Mbps per 500 students. Students must also have access
to wifi and to a learning management system.
16.3 Audio Visual Facilities. Every laboratory must be equipped with projection
equipment or large display to demonstrate digital content. In addition,
projectors must also be available for use in lecture rooms. Large lecture halls
must be equipped with sound systems.
ARTICLE VII
COMPLIANCE OF HEls
Using the CHED Implementation Handbook for OBE and ISA as reference, a HEI shall develop
the following items which will be submitted to CHED when they apply for a permit for a new program
or the approval of the transformation of existing programs to outcomes-based framework:
Section 17 The complete set of program outcomes, including its proposed additional
program outcomes.
Section 18 Its proposed curriculum and its justification including a curriculum map.
ARTICLE VIII
PROVISIONS FOR K-12 IMPLEMENTATION
When the new GE curriculum will take effect in AY 2018-2019, as provided in CMO
20, s. 2013 entitled "General Education Curriculum: Holistic Understandings, Intellectual and Civic
Competencies", the 54 units GE requirements will be reduced to a minimum of 36 units.
ARTICLE IX
TRANSITORY, REPEALING AND EFFECTIVITY CLAUSE
HEls that have been granted permit or recognition are hereby given one (1) year from
the date of effectivity hereof to fully comply with all the requirements as stipulated in
this CMO, including both the changes to the new curriculum and transformation to
OBE. Compliance to these requirements shall also be required to State Universities
and Colleges (SUCs) and Local Colleges and Universities (LCUs)
All pertinent rules and regulations or parts thereof that are inconsistent with the
provisions of these policies, standards, and guidelines are hereby repealed or
modified accordingly.
This CMO shall be effective beginning SY 2016-2017 after publication in the Official
Gazette or in a newspaper of general circulation.
~A:~
PATRICIA B. LICUANAN, Ph.D.
Chairperson
ANNEX A
GUIDELINES
X------- -----------------------------------------X
ARTICLE I
INTRODUCTION
49 ! I',·
alike in determining what are allowable standards or capstone projects
in the context of undergraduate studies in Computing.
ARTICLE II
THESIS/ CAPSTONE PROJECTS SPECIFICATIONS
Section 2 Definitions
51 I 1' ,q: ·.
4.1.3 Human-Computer Interaction
• Usability
• Affective Computing
• Emphatic Computing
• Software Customization
• Information Systems development for actual client
• Web Applications Development
• Mobile Computing Systems
4.3.2. IS Planning
• Software Customization
• Information Systems Development for an actual client
(with pilot testing)
• Web Applications Development (with at least alpha
testing on live servers)
• Mobile Computing Systems
• Game Development
• e-Learning Systems
• Interactive Systems
• Information Kiosks
4.2.4. IT Management
Students should be given ample time to finish their project. Two (2) to
three (3) terms or semesters should be prescribed in the curriculum for
BS Computer Science students to complete their theses and one (1) to
three (3) terms or semesters for BS Information Technology and BS in
Information Systems students to complete their Capstone Projects.
53 i !I c1 ~
the thesis or project) or allied program. For IT and IS, at least
one of the panel members should preferably have industry
experience.
ARTICLE Ill
THE THESIS I PROJECT FORMAT
Title Page
Abstract
54 I''::,,
Table of Contents
list of Figures, list of Tables, list of Notations
Introduction
- Background of the problem
- Statement of the problem
- Objectives
Significance
Scope and Limitations
Related literature
Theoretical Background
include comprehensive discussion on theorems,
definitions, fundamental algorithms mathematical
models/formula
Proposed Solution to the Problem
Results and Discussion, includes theoretical proof,
verification. or evidence
Conclusions and Recommendations
Title Page
Abstract or Executive Summary
Table of Contents
List of Figures, List of Tables, List of Notations
Introduction
- Project Context
- Purpose and Description
- Objectives
- Scope and limitations
Related Literature
Technical Background
- Include in-depth discussion on relevant technical
aspects of the project
Design and Methodology
- Include discussion on conceptual design I system
architecture/ block diagrams and algorithms
Results and Discussion
Conclusions and Recommendations
ss I P ., ; ,·
- Users Guide
- One-Page Curriculum Vitae per team member
Title Page
Executive Summary
Table of Contents
list of Figures, List of Tables, List of Notations
Introduction
- Project Context
- Purpose and Description
Objectives
Scope and limitations
Review of Related literature/Systems
Technical Background
Methodology, Results and Discussion
Requirements Analysis
- Requirements Documentation
- Design of Software, Systems, Product, and/or
Processes
Development and Testing. where applicable
Description of the Prototype, where applicable
Implementation Plan (Infrastructure/Deployment)
where needed
Implementation Results, where applicable
Recommendations
All Thesis and Projects must not infringe on existing IP. All prior works,
including open source, open content, and creative commons content,
shall be properly cited.
Copyright and other Intellectual Property Rights arising from the Thesis
or Capstone Project shall be bound by the IP Policies of the HEI,
provided that any such policies shall not be grossly disadvantageous to
the creators of IP.
571 f ,, , ,