Sunteți pe pagina 1din 57

A 0 n Higl)0

· O'' 'I' A
,,,, "'0;
·,;:? ~
Republic of the Philippines
OFFICE OF THE PRESIDENT
f OFFICIAL i.
(5 RELEASE g
COMMISSION ON HIGHER EDUCATION ~ CHED ce,rtral Olfice ~:
·,;, RECORDS SECTIOl< ,,,~·
"'" C/i:9 ·'X><':-"'
4,e .. IJ,1'. 0'
--'"

CHED MEMORANDUM ORDER (CMO)


NO. !5 ;
Series of 2015

SUBJECT REVISED POLICIES, STANDARDS, AND GUIDELINES FOR


BACHELOR OF SCIENCE IN COMPUTER SCIENCE (BSCS),
BACHELOR OF SCIENCE IN INFORMATION SYSTEMS (BSIS),
AND BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
(BSIT) PROGRAMS
- - - - - - - - - - - - - - - --- -- ~ -- - -- - - - - - -- - - - - - - - - - - - ---- - - -- - - -- - - - - - -
In accordance with the pertinent provisions of Republic Act (RA) No. 7722, otherwise known
as the "Higher Education Act of 1994," in pursuance of an outcomes-based quality
assurance system as advocated under CMO 46 s. 2012, and by virtue of the Commission en
bane Resolution No. 268-2015 dated May 25, 2015 the following policies, standards and
guidelines (PSGs) are hereby adopted and promulgated by the Commission.

ARTICLE I
INTRODUCTION
Section 1 Rationale
Based on the Guidelines for the Implementation of CMO 46 s 2012, this PSG
implements the "shift to learning competency-based standards/outcomes-
based education." It specifies the 'core competencies' expected of graduates
of Bachelor of Science in Computer Science (BSCS), Bachelor of Science in
Information Systems (BSIS), and Bachelor of Science in Information
Technology (BSIT), "regardless of the type of HEI they graduate from "
However, in "recognition of the spirit of outcomes-based education and .. of
the typology of HEls," this PSG also provides "ample space for HEls to
innovate in the curriculum in line with the assessment of how best to achieve
learning outcomes in their particular contexts and their respective
missions ... "

The field of computing is ever dynamic; its advancement and development


had been rapid and its evolvement is a continuous process (O'Brien, 2008).
To face the challenges of advancement. the Commission recognizes the need
to be responsive to the current needs of the country. It is essential and
important that the country's computing capability be continually developed
and strengthened to be at par globally.

It is the objective of the Commission lo develop and promote the Policies,


Standards and Guidelines (PSG) for BSCS, BSIS and BSIT, to provide a
minimum standard for Higher Education Institutions (HEls) offering or
intending to offer these programs. The PSG is developed with consultations
from all stakeholders, from the academe to industry (Sarmiento, 2009).

The PSG contains provisions that cultivate the culture of excellence in


offering these programs. This is in line with the vision of the Commission to
have HEls produce competent graduates that shall cater to the needs of the
industry. The PSG is also designed for all HEls to exercise their
innovativeness and creativity in the development of their curricula in the
offering of BSCS. BSIS, and BSIT programs (RA 7722, 1994).

Higher Education Development Center Bull~ing, C.P. Garcia Ave .. UP Campus, Dil;man, Quezon City, Jhilipplnes
Web Site www.ched.gov.ph Tel. Nos. 441-1177, 385-4391, 441-1169, 441-1149, 441-1170, 441-1216, 392-5296
ARTICLE II
AUTHORITY TO OPERATE

Section 2 Government Recognition

All Higher Education Institutions :HEls) including private HEls, State


Universities and Colleges (SUCs), and Local Universities and Colleges (LUCs)
intending to offer BSCS, BSIS, and BSIT must first secure proper authority
from the Commission in accordance with this PSG. All HEls with existing
BSCS, BSIS, and/or BSIT programs are required to shift to outcomes-based
approach pursuant to this PSG and must inform the Commission of such shift,
sues and LUCs should likewise strictly adhere to the provisions in these
policies, standards and guidelines.

ARTICLE Ill
GENERAL PROVISIONS

Section 3 The succeeding articles provide minimum standards and other requirements
and prescriptions. The minim um standards for each program are expressed
as minimum sets of desired program outcomes which are given in Article IV
Section 6, The Commission designed sample curricula to attain such
outcomes and these are shown in Article V Section 9, The total number of
units for each program is here prescribed as the "minimum unit requirement"
under Section 13 of RA 7722. In designing the curricula, the Commission
employed curriculum maps which are shown in Article V Section 10 as
sample curriculum map.

Using a learner-centered/outcomes-based approach, the Commission


provided sample curricula delivery methods shown in Article V Section 11.
The sample course syllabi given in Article V Section 12 show some of these
methods

Based on the curricula and the means of their delivery, the Commission
determined the physical resource requirements for the library, laboratories
and other facilities and the human resource requirements in terms of
administration and faculty, as indicated in Article VI.

Section 4 The HE ls are allowed to design curricula suited to their own contexts and
missions provided that they can demonstrate that the same leads to the
attainment of the required minimum set of outcomes, albeit by a different
route In the same vein, they have latitude in terms of curriculum delivery and
in terms of specification and deployment of human and physical resources as
long as they can show that the attainment of the program outcomes and
satisfaction of program educational objectives can be assured by the
alternative means they propose.

The HEls can use the CHED Implementation Handbook for Outcomes-
Based Education (QBE) and the Institutional Sustainability Assessment
(ISA) as a guide in complying with Sections 16, 17 and 22 of Article VII,
hereof.
This PSG is based on the 10-year basic education system and on the existing
General Education (GE) program. It reflects the reform towards outcomes-
based education as well as international trends in computer science,
infonmation systems and information technology curricula. However, this does
not yet include necessary changes as a consequence of the K-12 reform. The
latter shall be addressed subsequently.

ARTICLE IV
PROGRAM SPECIFICATIONS

Section 5 Program Description

5.1 Degree Name

A. Bachelor of Science in Computer Science (BSCS)

Graduates of this program shall be conferred the degree of Bachelor of


Science in Computer Science (BSCS).

B. Bachelor of Science in lnfonnation Systems (BSIS)

Graduates of this program shall be conferred the degree of Bachelor of


Science in lnfonnation Systems (BSIS).

C. Bachelor of Science in lnfonnation Technology (BSIT)

Graduates of this program shall be conferred the degree of Bachelor of


Science in Information Technology (BSIT).

5.2 Nature of the Field of Study

5.2.1 Bachelor of Science in Computer Science (BSCS)

The BS Computer Science program includes the study of computing


concepts and theories, algorithmic foundations and new
developments in computing. The program prepares students to design
and create algorithmically complex software and develop new and
effective algorithms for solving computing problems.

The program also includes the study of the standards and practices in
Software Engineering. It prepares students to acquire skills and
disciplines required for designing, writing and modifying software
components, modules and applications that comprise software
solutions.

5.2.2 Bachelor of Science in lnfonnation Systems (BSIS)

The BS Information Systems Program includes the study of application


and effect of information technology to organizations. Graduates of the
program should be able to implement an information system, which
considers complex technological and organizational factors affecting it.
These include components. tools, techniques, strategies,
methodologies, etc.

3jPdf',:
Graduates are able to help an organization determine how information
and technology-enabled business processes can be used as strategic
tool to achieve a competiti11e advantage. As a result, IS professionals
require a sound understanding of organizational principles and
practices so that they can serve as an effective bridge between the
technical and management/users communities within an organization.
This enables them to ensure that the organization has the information
and the systems it needs to support its operations.

5.2.3 Bachelor of Science in Information Technology {BSIT)

The BS Information Technology program includes the study of the


utilization of both hardware and software technologies involving
planning installing, customiZing, operating, managing and
administering, and maintaining information technology infrastructure
that provides computing solutions to address the needs of an
organization

The program prepares graduates to address various user needs


involving the selection. development, application, integration and
management of computing technologies within an organization.

5.3 Program Goals

The BSCS, BSIS. and BSIT graduates are expected to become


globally competent, innovative, and socially and ethically responsible
computing professionals engaged in life-long learning endeavours.
They are capable of contributing to the country's national development
goals.

5.4 Specific Professions/careers/occupations for Graduates

A. Bachelor of Science in Computer Science (BSCS)

Primary Job Roles


• Software Engineer
• Systems Software Developer
• Research and Development computing professional
• Applications Software Developer
• Computer Programmer

Secondary Job Roles


• Systems Analyst
• Data Analyst
• Quality Assurance Specialist
• Software Support Specialist

B, Bachelor of Science in Information Systems {BSIS)

Primary Job Roles


• Organizational Process Analyst
• Data Analyst

41P:1~c
• Solutions Specialist
• Systems Analyst
• IS Project Management Personnel

Secondary Job Roles


• Applications Developer
• End User Trainer
• Documentation Specialist
• Quality Assurance Specialist

C. Bachelor of Science in lnfonnation Technology (BSIT)

Primary Job Roles


• Web and Applications Developer
• Junior Database Administrator
• Systems Administrator
• Network Engineer
• Junior Information Security Administrator
• Systems Integration Personnel
• IT Audit Assistant
• Technical Suppcrt Specialist

Secondary Job Roles

• QA Specialist
• Systems Analyst
• Computer Programmer

5.5 Allied Fields

In general, subject to the specific provision below, the following may be


considered as allied fields:

1. Basic Sciences, Math and Engineering


2. Programs that have at least 50% of core and professional courses of a
specific !TE program
3. Any program deemed to be an allied program by the TPITE such as
the following:

A Bachelor of Science in Computer Science (BSCS)

• Applied Mathematics
• Computer Engineering
• Electrical Engineering
• Electronics Engineering
• Entertainment and Multimedia Computing
• Mathematics
• Physics
• Statistics

5 I " " ·.·


' ,! :"';.
B. Bachelor of Science in Information Systems (BSIS)

• Applied Mathematics
• Industrial Engineering
• Information Management
• Library and Information Science
• Statistics
• Informatics

C. Bachelor of Science in Information Technology (BSIT)

• Computer Engineering
• Electrical Engineering
• Electronics Engineering
• Informatics
• Information Management

Section 6 Program Outcomes

The minimum standards for the BSCS, BSIS, and BSIT programs are
expressed in the following minimum set of graduate outcomes. The graduate
outcomes common to all programs, and those common to the discipline are
further mapped into the expanded graduate outcomes specific to the sub-
disciplines of CS, IS, and IT, as outlined in Section 6 3

6.1 Common to all programs in all types of schools

The graduates have the ability to


a) articulate and discuss the latest developments in the specific
field of practice. (Philippine Qualifications Framework (PQF)
level 6 descriptor) (Graduate Outcomes: CS10, 1S10, IT13)
b) effectively communicate orally and in writing using both
English and Filipino {Graduate Outcomes: CS08, 1S08, IT10)
c) work effectively and independently in multi-disciplinary and
multi-cultural teams {PQF level 6 descriptor) (Graduate
Outcomes: CS07, IS07, IT08)
d) act in recognition of professional, social. and ethical
responsibility (Graduate Outcomes:CS09, 1S09, IT12)
e) preserve and promote "Filipino historical and cultural heritage"
(based on RA 7722)

6.2 Common to the discipline

The graduates of BSCS, BSIS, and BSIT must have the ability to
a) analyze complex problems, and identify and define the
computing requirements needed to design an appropriate
solution (Graduate Outcomes:CS02, 1S02-03. IT03)
b) apply computing and other knowledge domains to address
real-world problems (Graduate Outcomes: CS01, IS01, IT01)
c) design and develop computing solutions using a system-level
perspective (Graduate Outcomes: CS03-05, 1S04-05, IT0S)
d) utilize modern computing tools (Graduate Outcomes: CS06,
IS06, IT07)

61P:i",:

',----
6.3 Specific to a sub-discipline and a major

A. Bachelor of Science in Computer Science (BSCS)

Graduate
Graduate Attribute Outcomes Graduate Outcomes
Code I
Apply knowledge of computing fundamentals, knowledge of a
Knowledge for ' computing specialization, and mathematics, science, and domain
Solving Computing CS01 knowledge appropriate for the computing specialization to the
Problems abstraction and conceptualization of computing models from defined
problems and requirements.
Identify, analyze, formulate, research literature, and solve complex
computing problems and requirements reaching substantiated
Problem Analysis CS02
conclusions using fundamental principles of mathematics, computing
sciences, and relevant domain disciolines
An ability to apply mathematical foundations, algorithmic principles
and computer science theory in the modeling and design of computer•
CS03
based systems in a way that demonstrates comprehension of the
tradeoffs involved in desiqn choices
Design/Development Knowledge and understanding of information security issues in :
CS04
of Solutions relation to the design, develo=nt and use of information sv1'fems
I · Design and evaluate solutions for complex computing problems, and
design and evaluate systems, components, or processes that meet
CS05
specified needs with appropriate consideration for public health and
safetv, cultural, societal, and environmental considerations.
Create. select, adapt and apply appropriate techniques, resources
Modem Tool Usage CS06 and modem computing tools to complex computing activiUes, with an
understandina of the limitations to accomolish a common aoal
Individual & Team Function effectively as an individual and as a member or leader in I
CS07
Work diverse teams and in multidisciolinarv settinas
Communicate effectively with the computing communrty and with
society at large about complex computing activities by being able to
Communication CS08
comprehend and write effective reports, design documentation, make
effective presentations, and aive and understand clear instructions
An ability to recognize the legal. social, ethical arid professional
Computing
issues involved in the utilization of computer technology and be
Professionalism and CS09
• guided by the adoption of appropriate professional, ethical arid legal
Ethics
• practices
Lile-Long Leaming • Recognize lhe need, and have the ability, to engage in independent
CS10
I leamina for continual development as a comoutina orofessional

B. Bachelor of Science in Information Systems (BSIS)

Graduate
Graduate Attribute Outcomes Graduate Outcomes I
Code
I I
Knowledge for
Solving Computing Apply knowledge of business processes, computing, mathematics and •
IS01
social sciences appropriate to Information Systems
Problems

71P"~',
Analyze a problem, identify and define the computing requirements
1

IS02
· with respect to organizational factors appropriate to its solution and
Problem Analysis e-----+= Dlla::.:n~stra=t=ea,ie::.:s:..:ic:or:..;t::.:he"'i'--rsc.:o:.::luti:.::·.:con"----------------1
Evaluate information systems in terms of general quality attributes
1$03
. and possible trade-offs presented within the given requirement
, Design implement and evaluate information systems processes
i ' ' ' '
IS04 : components. or programs and to source cost-benefit efficient
• Design/Development ! alternatives to meet desired needs, ooals and constraints
of Solutions
Use knowledge and understanding of enterprises in modelling and
IS05
design of information systems
Deploy and use effectively skills, tools and techniques necessary for
Modem Tool Usage , 1$06
!
information svstems practice
Function effectively on teams(recognizing the different roles within a
I Individual and Tearn I ISO? , team and different ways of organizing teams) to accomplish a
Work·
i , common ooa
I · Communicate effecbvely with a range of audiences. Communication
Communication 1S08 skills includes techincal writing, presentation and neogitation, and
numeracv.
Recognize the legal, social, ethical and professional issues involved in i
Computing I
; the exploitation of computer technology and be guided by the
Professionalism and 1$09
i adoption of appropnate professional, ethical and legal practices both
Ethics in the Society
i in the local and global communitv
I
j Recognize the need for and engage in an independent and life-long
i Life-Long Learning Ii IS10 . leamingp 1
, lanning self-leaming and im proving performance as the
I foundation for on-going professional development
C. Bachelor of Science in lnfonnation Technology (BSIT)

Graduate
Graduate Attribute Outcomes Graduate Outcomes
Code
Knowledge for I Apply knowledge of computing, science, and mathematics appropriate
IT01
Solving Computing : to the disci line
Problems IT02
Analyze complex problems, and identify and define the computing
i IT03
I reo uirements aonropriate to its solution
i Problem Analysis Identify and analyze user needs and take them into account in the
IT04 selection, creation, evaluation and administration of computer-based
i
svstems

I :
Design/Development
of Solutions
IT05
Design, implement, and evaluate computer-based systems,
processes. components, or programs to meet desired needs and
reouirements under various constraints
IT06 , lnteorate IT-based solutions into the user environment effectively i
' Apply knowledge through the use of current techniques, skills, tools
Modern Tool Usage IT07
and practices necessarv for the IT profession
: Function effectively as a member or leader of a development team
Individual and Team : IT08 i recognizing the different roles within a team to accomplish a common
Work i i goal
i IT09 Assist in the creation of an effective IT oroiect plan
i
i Communicate effectively with the computing community and with I
Communicat10n I IT10 , society at large about complex computing activities through logical
I wliting, presentations, and clear instructions

8jP.,cc
Analyze the local and global impact of computing information
Computing I. IT11
Professionalism and•_----+_te_c_h_no_lo~g~y_o_n_in_d_iv_id_u_al_s._o_rg~a_n_iz_ati_·o_n_s,_a_n_d_soc_ie_ty_ _ _ _ _~
s · 1R ·br1 , Understand professional, ethical, legal, security and social issues and I
ocia espons, ity !1Tl 2 responsibilities in the utilization of information technoloov. :
I Recognize the need for and engage in planning self-learning and
Life-Long Leaming IT13
II , improving performance as a foundation for continuing professional
. development
!

6.4 Common to a horizontal type as defined in CMO 46 s


2012

• Graduates of professional institutions demonstrate a service


orientation in one· s profession
• Graduates of colleges participate in various types of employment,
development activities. and public discourses particularly in
response to the needs of the communities one serves
• Graduates of universities participate in the generation of new
knowledge or in research and development projects

Graduates of State Universities and Colleges must, in addition, have


the competencies to support "national, regional and local development
plans." (RA 7722)

A PHEI, at its option, may adopt mission-related program outcomes


that are not included in the minimum set.

Section 7 Minimum Perfonnance Indicators

Graduate attributes can be assessed through set of performance indicators


provided in the following table.

Graduate Attribute Performance Indicators

Knowledge for Solving • Completed and successfully defended Capstone Project frhesis in line with
Computing Problems the discipline.
Documented software/hardware requirements specifications following
Problem Analysis
computinQ industrv standards.
: '
:
DesigniDevelopment of Designed and developed a computing solution using object-oriented
Solutions • approach.
Modem Tool Usage i Used an integrated development environment.
: Individual & Team Work i Worked in a group to develop a machine project.
Communication Presented a proposed solution in class or in a public forum.
Computing i
I
Professionalism and Immersed/exposed in an actual working environment in industry.
Ethics •
Lile-Long Leaming I Created a report on a conducted independent learning activity.

An institution may enhance the minimum performance indicators using an industry or


globally accepted reference competency inventory,

9 I I'" ,· ·
ARTICLE V
CURRICULUM

Section 8 Curriculum Description

Section 8.1 General Description

The curricula for BSCS, BSIS, and BSIT shall include the required GE
courses, six (6) core courses common to all programs, professional courses
required for each program, and electives as well as domain specific courses
when needed. The students are also required to undertake practicum work
and complete a thesis or capstone project

i BSCS BSIS BSIT


General Education 54.0 i 54.0 54.0
' '
Common Courses 18.0 18.0 18.0
Professional Courses 48.0 48.0 48.0
Professional Electives ! 9.0 12.0 12.0
Additional Math Requirement i 3.0 0.0 0.0 •
PE 8.0 • 8.0 • 80
NSTP. 6.0 6.0 ' 6.0
Minimum Total Units • 146.0. 146.o 1 146.0 .

The minimum total number of units is 146. For the Centers of Excellence
(COEs), the Professional Courses and Electives, and Additional Math
Requirement may have a minimum of 48 units (instead of 60) as long as the
learning outcomes of the knowledge areas are met, resulting to a minimum
total number of 134 units

The General Education courses for the BSCS, BSIS, and BSIT programs
shall be as follows

GENERAL EOUCATION Units Total Units


Language and Humanities 24
English 9
Filipino 6 :

Humanities (Literature, Arts, Philosophy, etc.) 9


Mathematics, Natural Sciences and Technology 15
Mathematics (Algebra, Statistics) 6
Natural Sciences 6
Electives (Trigonometry, Physics,
3
Science and Soc1etv. etc.I
Social Sciences & Communications 15
life & Works of Rizal 3
Philippine History &Culture 3
Psychology, Sociology, Anthropology,
Economics (wl Taxation &Agrarian Reform
Integrated), Asian/Western Civilization, Mass
Comm., Society and Culture (wl Family
9
Planning), Politics & Governance (w/ Philippine
Constitution)
The common courses for the BSCS, BSIS, and BSIT programs shall be as
follows:

• Introduction to Computing
• Computer Programming 1 (Fundamentals of Programming)
• Computer Programming 2 (Intermediate Programming)
• Data Structures and Algorithms
• Information Management
• Applications Development and Emerging Technologies

HEls shall comply with the minimum requirements prescribed in this PSG, In
addition, they may enrich the prescribed curricula with additional courses
based on their institutional and program goals and objectives.

COURSE SPECIFICATIONS: CORE COMPUTING COURSES

CC100 -- INTRODUCTION TO COMPUTING

This course provides an overview of the Computing Industry and Computing


profession, including Research and Applications in different fields; an
Appreciation of Computing in different fields such as Biology, Sociology,
Environment and Gaming: an Understanding of ACM Requirements; an
Appreciation of the history of computing; and Knowledge of the Key Components
of Computer Systems (Organization and Architecture), Malware, Computer
Security, Internet and Internet protocols. HTML4/5 and CSS.

Course Credits 3 units


Course Pre-Requisite None

CC101 - PROGRAMMING 1

The course covers the use of general purpose programming language to solve
problems. The emphasis is to train students to design, implement, test, and
debug programs intended to solve computing problems using fundamental
programming constructs.

Course Credits 3 units


Pre-Requisite None

CC102 -- PROGRAMMING 2

This course is a continuation of CC101 - Programming 1. The emphasis is to


train students to design, implement, test, and debug programs intended to solve
computing problems using basic data structures and standard libraries.

Course Credits 3 units


Pre-Requisite : CC101 -- Programming 1

CC103 -- DATA STRUCTURES AND ALGORITHMS

The course covers the standard data representation and algorithms to solve
computing problems efficiently (with respect to space requirements and time
complexity of algorithm). This covers the following Stacks, Queues, Trees,

11 ! I' ., , .·
Graphs, Maps, and Sets. Thorough discussion of sorting and searching
algorithms and hashing is covered.

Course Credits 3 units


Pre-Requisite CC102 - Programming 2

CC104- INFORMATION MANAGEMENT

This course covers information management, database design, data modeling,


SQL, and implementation using relational database system.

Course Credits 3 units


Course Pre-Requisite CC103 - Data Structures and Algorithms

CC105-APPLICATIONS DEVELOPMENT AND EMERGING TECHNOLOGIES

Development of applications using web, mobile, and emerging technologies with


emphasis on requirements management, interface design, usability. testing,
deployment, including ethical and legal considerations.

Course Credits 3 units


Pre-Requisite CC102 - Programming 2

Section 8.2 Specific Description of Program Curricula

A. Bachelor of Science in Computer Science (BSCS)

The Computer Science curriculum includes foundation and


professional courses that cover theory, algorithms, software
design and development, and new developments in
computing.

The curriculum should include courses in the following


Knowledge Areas as recommended in ACM Computer
Science Curricula 2013':

1. Algorithms and Complexities


a. Design and Analysis of Algorithms
b. Automata Theory and Formal Languages
c. Computational Science
2. Architecture and Organization
3. Discrete Structures
a. Logic, Sets, Relations, Functions, and Proof
Techniques
b. Graphs, Trees, Matrices, Combinatorics and
Recurrences
4. Human Computer Interaction
a. Fundamentals of HCI
b. Graphics and Visual Computing
5. Information Assurance and Security
6. Networks and Communications
7. Operating Systems
1
acm.org
a. Fundamentals of Operating Systems
b. Parallel and Distributing Computing
8. Programming Languages (Design and Implementation)
9, Software Development Fundamentals
a. Fundamentals of Programming
b. Intermediate Programming
c. Data Structures and Algorithms
d. Object Oriented Programming
10. Software Engineering
a. Analysis and Design
b. Implementation and Management
c. Intelligent Systems
11. Social Issues and Professional Practice

B. Bachelor of Science in Information Systems (BSIS)

The Information Systems curriculum encompasses


introductory and professional courses to cover the various
information systems functional areas as follows:

1. Fundamentals of IS
2. Professional Issues in Information Systems
3. IT Infrastructure and Network Technologies
4. Systems Analysis, Design and Development
5. Enterprise Architectures
6, IS Project Management
7. IS Strategy, Management and Acquisition

In addition, the curriculum shall include business enterprise


domain courses such as the following:

1. Organization and Management Concepts


2. Financial Management
3. Business Process Design and Management
4. Evaluation of Business Performance
5. Quantitative Methods

C. Bachelor of Science in Information Technology (BSIT)

The Information Technology curriculum includes basic and


advanced courses on planning, development, integration,
and management of information technology infrastructure
that provide computing solutions to address the needs of
organizations.

The curriculum should include courses in the following


Knowledge Areas as recommended in ACM Information
Technology Curricula 20082 :

1. Information Technology Fundamentals


2. Human Computer Interaction
3. Information Assurance and Security

~ acm,org

I .)' I ,I• d f (
• Fundamentals of IAS
• Advanced Topics of IAS
4. Information Management
• Fundamentals of IM
• Fundamentals of Database Systems
• Advanced Database Systems
5. Integrative Programming and Technologies
• Fundamentals of Programming
• Intermediate Programming
• Data Structures and Algorithms
• Object Oriented Programming
• Event Driven Programming
6. Networking
• Fundamentals of Networking
• Advanced Networking
7 _ Platform Technologies
• Intangible Technologies
• Tangible Technologies
8. Systems Administration and Maintenance
9. Systems Integration and Architecture
• Fundamentals of SIA
• Advanced SIA
10. Social and Professional Issues
11. Web Systems and Technologies

Section 8.3 Internship/On-the-job-training/Practicum.

lnternship/OJT/Practicum is an immersion program wherein


the students will have the chance and opportunity to be with
the IT industry. This program is important because the
students will have the chance to apply the skills, knowledge
and attitude learned in the school and at the same time the
opportunity to experience the corporate environment. Learning
expectations in the IT related field should be established
between the HEI and the industry in the form of a
Memorandum of Agreement (MOA) or Memorandum of
Understanding (MOU).

Internship is a requirement for the BSCS, BSIS and BSIT


programs. Students are eligible to enroll the internship
program after completing 70% of the total number of units in
the curriculum. The minimum number of internship hours
(preferably in a full time capacity) for the BSIS and BSIT
programs is 486 hours and 162 hours for the BSCS program.

Section 8.4 Thesis/Capstone Project

Thesis is required for BSCS while Capstone Project is required


for BSIS and BSIT. Both function as terminal project
requirements that would not only demonstrate a student's
comprehensive knowledge of the area of study and research
methods used but also allow them to apply the concepts and
methods to a specific problem in their area of specialization,

BS Computer Science students are required to complete a


thesis that is focused on the theories and concepts of
computing in the form of a scientific work,

BS Information Systems students must complete a project


such as business application development, or an Information
Systems plan.

BS Information Technology students must complete a


capstone project such as a software/system development with
emphasis on the IT infrastructure, or an IT Management
project

It is expressly understood that Computing Thesis and


Capstone Projects need not require surveys, statistics, and
descriptive methods, unless appropriate,

a A Thesis is a technical report on a systematic


investigation of a problem that can be solved using
Computing. It may include a solution, an
approximate or partial solution, a scientific
investigation, or the development of results leading
to the solution of the problem.

A Computer Science thesis must be anchored on


Computer Science principles,

b. A Capstone Project is an undertaking appropriate


to a professional field, It should significantly address
an existing problem or need.

An Information Systems Capstone Project focuses


on business processes and the implications of
introducing a Computing solution to a problem.

An Information Technology Capstone Project


focuses on the infrastructure, application, or
processes involved in implementing a Computing
solution to a problem,

Scope of the Theses I Capstone Projects

The Thesis or Capstone Project should integrate the different


courses, knowledge, and competencies learned in the
curriculum. Students are encouraged to produce innovative
results, generate new knowledge or theories, or explore new
frontiers of knowledge or application areas.

The HE! should have specific guidelines on Thesis and


Capstone Projects, Attached as Annex A is a sample guideline,

15 I i' ,
Section 9 Sample Curriculum

9.1. Components
General Education. Core Courses, Electives, etc.

A. Bachelor of Science in Computer Science (BSCS)

The following is a list of professional and elective courses in the


sample curriculum for BSCS:

Course Code Knowledge


Area Code
I Course Tltle Units

i Required Courses
CC101 I cc Introduction to Computing 3.0
CC102 SDF Fundamentals of Programming 3.0
CC103 SDF Intermediate Programming 3.0
CC104 SDF I Data Structures and Algorithms 3.0
CC105 IM i Information Management 3.0
CC106 IM , Applications Development and Emerging Technologies 3.0
DS101 DS i Discrete Structures 1 3.0
08102 OS I Discrete Structures 2 3.0
SDF 104 SDF I Object-oriented Programming 3.0
AL 101 AL I Algorithms and Complexity I 3.0
AL102 AL Automata Theory and Formal Languages 3.0
AR101 AR Architecture and Organization 3.0
IAS101 IAS . Information Assurance and Security 2.0
HCl101 HCI 1
Human 8omputer Interaction 1.0
NC101 NC 1 Networl<s and Communications 3.0
0S101 OS i Operating Systems 3.0 I
PL101 I PL i Programming Languages 3.0
PRC101 PRC i Practicum 3.0
SE101 :
SE i Software Eng,~eering 1 3.0 :
SE102 SE Software Engineering 2 3.0
SP101 SP Social Issues and Professional Practice 3.0 i
THS102 THS I CS Thesis Writing 1 3.0 :
THS103 I THS i CS Thesis Writing 2 3.0
Recommended Electives
CN101 CN Computatlona1 Science 3.0
• GV101 GV Graphics and Visual Computing 30
PD101 PD I Parallel and Distributed Computing 30 I
IS101 IS I Intelligent Systems 3.0
SF101 '
SF I System Fundamentals 3.0

16l1'"i,
Bachelor of Science in Information Systems (BSIS)

The following is a list of professional and elective courses in the


sample curriculum for BSIS:
I
Knowledge
Course Code Course Title Units
Area Code
CC101 ITF Introduction to Computinq 3
i CC102 PF Computer ProqramminQ 1 3
: CC103 PF i Com outer Proqramminq 2 3
. CC104 PIF Data Structures and Alaorithms 3
i CC105 DIM Information Management 3
i--=-C"-C-'10'-'6------+----'-U=E__ 4 _..,/\eplication Development and Emergin~g_Tech
__ nol_og~ies
_ _+-_ _3~_ __,.
IS101 FIS Fundamentals of Information Systems 3 •
i IS102 PIS Professional Issues in Information Svstems 3
IS103 NIT IT Infrastructure and Network Technolooies 3
, IS104 SAD Systems Analysis and Desian 3
IS105 EA Enterprise Architecture 3
IS106 : 1PM IS Proiect Manaqement 1 : 3
IS107 ISMA IS Strat..nv, Manaoement and ACQuisition 3
DM101 DBC , manlzation and Manaaemen! Conceots 3
DM102 DBC i Financial Management 3
DM103 DBC Business Process Manaaement 3
I DM104 DBC Evaluation of Business Performance : 3
: QUAMET MATH Quantitative Methods 3
i CAP101 CAP Caostone Proiect 1 3
! CAP102 CAP Caostone Proi ect 2 3
PRAC101 PRC Practicum for Information Svstems i 6
' Recommended Electives '

i ADV01 ITD Enterprise Systems 3


, ADV02 ITD Human Computer lnteracbon 3
i ADV03 BD IT Audit and Controls 3
ADV04 BD IS Innovations and New Technolooies 3
ADV05 ITD IT Securltv and Man.,,ement 3 .
ADV06 ITD • IT Service Management 3
ADV07 ITD IS Pro eel Management 2 3
ADV08 !TD i Data Mininq 3
ADV09 BD Business lntelliqence 3
ADV10 BD Enterorise Resource Planninq 3
ADV11 BO Suoolv Chain Manaoement :
3
ADV12 8D Customer Relationship Manaaement 3

Bachelor of Science in Information Technology (BSIT)

The following is a list of professional and elective courses in the


I curncu Ium f or BSIT
samoIe
Knowledge '
Course Code
Area Code
i Course Title Units

CC101 CP Introduction to Computing 3


CC102 PF Computer Programming 1 3
CC103 PF Computer Programming 2 3
: CC104 I PF Data Structures and Algorithms 3
: CC105 IM Information Management 3
• CC106 ws Application Development and Emerging Technologies 3

17 P ~\
! ~ ~
HCl101 HCi Introduction to Human Computer Interaction 3
IAS101 IAS Information Assurance and Seculity 1 3
IAS102 IAS . lnformaticn Assurance and Security 2 3
! IM101 IM • Fundamentals of Database Systems 3 :

IPT101 IPT Integrative Programming and Technologies 1 3


MS101 MS Discrete Matt:~matics 3
MS102 MS Quantitative Methods (incL Modeling & Simulation) 3
NET101 NET Networking 1 3
NET102 NET Networking 2 3
PRAC101 PRC Practicum 6
SA101 SA Systems Administration and Maintenance 3
SIA101 SIA Systems Integration and Architecture 1 3
SP101 SP Social and Professional Issues 3
CAP101 THS Capstone Project and Research 1 3
CAP102 THS Capstone Project and Research 2 3
Recommended Electives
· IPT102 IPT Integrative Programming Technotog,es 2 3
PT101 PT Platform Technologies 3
WS101 ws Web Systems and Technolog1es 3
PF101 PF Object-Oriented Programming 3
SIA102 SIA • Systems Integration and Architecture 2 3
HCl102 HCI • Human Computer Interaction 2

9.2. Sample Program of Study

A. Bachelor of Science in Computer Science (BSCS)

Year Freeh men Year s h.omoreYear Juntor YNr fourth:Yeu TOTAL


Som 1st 111 2nd 151 2nd Summer 1st loo
TOTAL 18.5 13.5 18.~ 18.5 l<t0 • 18,0 3.0 19.0 12.0 144.0
GE 9.0 9.0 6.0 6.0 i 6,0 ,.o 6,0 6.0 5U:

Common 6.0 3.0 a.o 3.0 3.0 UtO

io 6.0 3.0 8.0 9.0 3.0 . 10.0 6,0 "8.0


3.0 3.0 3.0 12.0
2.0 2.0 2.0 ,.,

AL102'
Automata
Thoory an,
;orrnal
Coo, !el(I ~a/l~>-'$-i-----+----,---+--l---__j
AR10~•
Arc~•tecture
ard
AS
CS102" '"""""
os,01· Ol:,.:rere
i OS Dlscrnte StrJcil.lres 1 Stur::wres 2

HCI

IAS

18 I ;j'
'
(l
p
;:- '~
'
Assurance
and Secuntv
CC105
(IM101) ..
lnloonabon
IM Mana-n1
NC10
1"

"'""
"'
"'
C=
unica\1
NC oes
0S101 ..
Operalm
g
OS ' Svstems
Pl101 ..
Programming
PL Lanouaaes
SDF104 ..
Otliect·
oriented
Programmm
Q
SDF CC102 CC104
(SOF101t• (SDF103j++
Fundament CC(103) SDF102""' Das
a1s oi 1nmned1ale Programmng slfUctures
programm1n
Q "'
ala0f1thms
SE102'"'
I

SE101 .. Sottwa,,
Software Engmeen
SE Eno1neenno 1 eo 2 i
I
SF
SP101'
Social Issues

SP
'"'
Professional
Pracbce 1
'
!

'
THS1
THS1Q1• or-
cs
- cs
Thesis
THS Thesis 1 2 I

PRC
-
PRAC101'

PracOCum
'

CS Elec
Elective Math E~ctive' CS E!ec1 .. CS Elec 2.. 3"
cc 100-
Application
Development
and Emerging
cc Technoloo1es f !

Pure Lecture
•• 2 hours lecture, 3 hours lab per week
Supervised Independent Study

B. Bachelor of Science in Information Systems (BSIS)

Year Freshmen Year So homore Year Junior Year Fourth Year

s,m 1,1 2nd 111 2• 111 2nd 1st ,.. Total

TOTAL 21.5 2U 21.5 21.5 21 21 12 6 146


GE 12 12 6 g 9 54
Electives 3 3 12
PE 2 2 2 2
NSTP 1.5 1.5 1.5 1.5

ITF lntroducbon
to CompL1lmg
CC104..
PIF Data
Structures

~.
1911';; h'. l'
I.~-...
,~\
l, I•
":·.:::::;;:::'
"''
.,,""""'",ms
I :
CC105"'
DIM infOl'!Mlr,)n !
!
M~~~-n\
1$102"
15101'
ProfeSS1Cnal
PIS
Fuodamoo:ats Issues in i
ol lnlct'rtatKm I
I s,-,, lnfolmati<:111
S.vsfems
1

18103" I
I .
NlT 1imawnicture
J,~d NilbM:irk
i ~ech/10;,..,._,,,. i
:s104"
!

j
Systems
SAG
Anaiys1:; and
I De•-
1s;c:-
I

"
i I Enterpnse
Arehltectuae
CC10?" CC103..
Conw.rter i
PF
""""'
Frngr,:il'l¥nmg Prngraml'l'llng

_,
1
i 2 I tSi(!(':'
I

I
i lS Pro.iec!
,pM
ManugeMent
1
1$107'
·SS!!atei'I}
ISMA I

ane A,.,,...,fSioor
CC106"'
Ii
Applicaboo
UE Dcvetoprrl€!l'r..
and Emergmg
~ectmoloo,es i
' OM101'
I I D"110J' DM1J4'
DEC
(>gan.zalin OM10?'
F nanc1a1
BJS/fleSS EvalJabon o1 I
'"
Managerre'l1 Ma1ag~nt
P,oois,
Ma1~1
Business
Performance
I
Conceot<.
QUAMET" I i
~A"H Ouantita!r.-'l?
i
Melhc-ds
CAP101- CAP10Z-
CAP
-,
Ca,- Caps10ne
Pro1ect2
PRAC101-
I ?racilcum io.
PRC
i I
I lnformatoo
s,"""'
i

i
AfJV {EiocM) !
PROFEL 1
I PROFEL 2 PROFEL 3 PROfEL 4
I I
Pnr<.: Le<:tut.:

... - 2 hou;s. lecture, J lwurs lab per week


Supervised h\rl~n1.kn1 Stud)'

A. Bachelor of Science in Information Technology (BSITJ

So homore Year Fourth Year


Year
S.m 1•
Frwhmen Year

"'
,. ....... 1&1
Total

GE
21.>
12 9
21.5
6
21
" 9
6
• i 9

ITF

-1c: 101 ..
WlttOOUCboo
HGi tn liurnari
""-'
lnterac:ion

20 It' a_
IAS
i IAS1W"
lnformabon
IAS 102""
lnformabon I

''i
Assurance Assurance and
and Secuntv 1 Secut#v 2

CC105"
IM101 ..
lnlOrmanon Aclvanced
I
IM '
ManagerMnt 1 Database
Systems

MS1W MS102'
MS Discrete Quantitative
Mathematics Methods '
i
NET 101 .. NET102..
NET
Networl\mQ 1 Ne\v.Qrking 2
CC104" !
CC102""
Dara
Computer
Sln.lctures
Programming
PF
1 '"'
Aloonthms
'
i
cc 10r PF 101-
Computer Object I
Programming Oriented '
2 Prooramm1no
'
SA 101 ..
Syslems
SA Adm1n15trabon

'"'
Maintenance
SIA 101 ..
Systems
SIA. integrabon
aed
Architecture 1
SP101'
Social and
SP
ProlessioncM
l:.SUes
CC106"
Applicallon
' ws Deveklpment
and Emerging
Techru'W"V'>ies
CAP 101- CAP102""
THS Capslone Capstone
Proiect 1 Pro1ect 2
PRAC
'
PR 101-
Pracllcum
SIA102""
IPT 101 ..
PT 101 .. PF 101 .. Systems
lntegratrve
ADV lntegrat10n
Platform Programming Event Driven
(Elective)
Technologies
'"'
Technoio;lies
Programming '"'
Architecture
2 I

..... Pure Lec1ure


2 hours lecture, 3 honrs lab per week
Supervised Independent Study

Section 10 Sample Curriculum Map

Curriculum Map for the Bachelor of Science in Computer Science

Courae
Code .
Know

,,,
ledge Coul'lile Title
Pn,-
Requisite
Units
Sample Leaming Outcomes ~
N
:. :.
~

" " " " " " "


~ :s
~
:!:
~
:;;
~ -" "
:. g
~
0
;;;
"
Explain fllndamental principles, concepts and evolution
LOT
of comoutina svstems as thev relate to different fields
Introduction to Expound on the recent developments in the dJfterent
CC101 cc C.Omputing
None 3 L02 comnutina knowtedae areas
I I I
Analyze solulioos employed by organizations to address
L03 d1flerent comoutmQ issues I
Design. implement, test. and debug a program, based on
a gI11en specification, that uses e~h of the fol!owing
LO7 fundamental programming components: (1) primitive data
types, (2) basic computation, (3) simple 1/0, (4)
oonditIonal and ilera1i11e structures, (5) definition of
functions and parameter passing, and(6) recursion
Fundamentals
SDF of N"ne 3 I I I
CC102 '
Programming
Assess and recommend revisions to another
programmer's code (1) regarding documentation and
program style standards that contribute to readablity and
LO2 mamtamability of software, (2) regarding appropriateness
of chosen conditional and iterative constructs given a
programming task, and {3)regarding thoroughness in
applying procedural abstr~hon

Design. implement. test. and debug a program, based on


a given specification, that uses (1) data structures
LO7 arrays, strings, structures. linked list.and files, (2) '

conditional, iterative and recursive constructs. and (3) I


standard libraries In the assigned programming language
I
:

Intermediate
CC103 SDF SDF101 3 Assess and recommend revIsIons to another I I
Programming
programmer's code (1) regarding appropriateness of
chosen data structure, (2) reg~ding appropriateness of
L01
chosen conditional and IteratIve constructs given a
programming task, and (3)regardmg thoroughness m
applymg procedural abstr~hon

Argue the costs and benefits of dynamic and s1atIc data


L03
structure 1mplementat1ons

Design. implement. test. and deoug a program, based on


LOI a given specrticahon. that uses and implements abstract
data types (stacks queues, priority queues. sets, maps)
Data
CC104 SDF Structures and SDF102 3 E E E I
Algonlhms
Argue strengths and weaknesses among multiple
LOL 1mplemen\abons for a problem (1.e .. on the aspects of
iterative vs. recursive solutions and on the aspects of
abstraction.encapsulat1on. and 1nformat1on hiding)

Analyze an existing database system with respect to


LOI quality issues: Reliability. scalability, efficiency,
effectiveness and security
CC105 Information
'" Management
SDF102 3 E E E E E E E E I
Design a database based on user requirements usmg a
LO2 widely used modeling notation, and be able to use
declarative query language to elicit information

Develop specifications for a software development effort


that precisely articulates the functional requirements
LO1 expected execution paths, and the explicit use of cutting
edge or emerging technologies. which includes hardware
devices and software library APls

Applications Select and use a defined coding. documentation writing, '


CC106
'"'
cc
Development
and Emerging
Technologies
IM101/
CC105 3
LO2
and licensing standards in a sufficiently complex software
project where coding idioms and mechanisms for
implementing designs to achieve desired properbes such
E E E E

as rehability, efficiency. and robustness a-e pr~tIced with


respect to legal and ethical considerahons
I

Undertake, as part of a team activity. an inspection of the


L03 source code and unrt resting of the functional units of a I.
sufficien~y complex software proJect
I

221 p :If
I I !
I ,o, Compare ar,d contrast prooedurai!funclicnal approach to
i
I
'

I
objec!,orl$fl!ed programming approa;n I I
SDF
ot,ec1- i
SDF oriented
104
Pr~raml'l'llrg
SOf102 3
I
Design. irrr,ilerrient, lest and detug programs !.Sing OOP
E E E E I
I
! I :.OZ concepts li.~e anstr.ncr- e1capsulati0fl, ir.hSrif31'1ce anc

i I i
i polymorphism
I '
I
!

I
' I

Pertor'Tl the oper21ions assodared with Sets. Ft1'ictl0rs ! !


I i

I
i
LO'• and Reiaticns, and relate '."Iese operations to ::ompu!l?r
program-r:ing i I
I Discrete
log;c bf applymg appn:,:mate Mes o1 infe,-ence I
Co:1slruc! sound arg,Jnents in proposlftO~a! and
!
DS101 C<S Structures 1
ALF~IG 3 L02 I predicate I i
I
!
given samole iniell.genl scltwm i i

I i i ! I
Cooslwcl 1,a,I0 rr.a!hematicai proofs usmg nat>terna\JcBI
~c:i I
I
I !
I
: 1ndccboo. d,rect prOOf .and proof by contrad!Ction to
sir1phfy progra'ts and prove program correct~ess I I
Solve real~ co11pu\mg probklris !hat requ,re
LOi 1r,appifiS lo oerrm.1talt0ns, combmahons of a sel, and
mQdular aritt1met1c

Discrete
DS102 OS Stmc:!ures 2 05101 Compute !he e11ent vobabllfhes usmg COJfllJlQ ood
L02
Bayes 1heo!'em of a sample corni::i,;lmg p;obiern

;_m Solve equatiO'ls Involv,ng recurrence am! relate i'lem !o


~ecurs1ve al;:iorUh:T\S

dereferences. and the berefiu and l:mita;,ons of garoa;;ie


! ,01
toilecl!On lhrougl' an unden.!arldmg of program•r11r19 ! '
I i I language 1mplew1et:!ation and '!cw memory is o-ganizoo
I
i i
'
!
! i
PL1Q1 P, Prog•amm,ng
Lang~Si}es
i SDF103 3 E11aluate !'le apr,ircpnater:ess offue use of a
i
E E E E I E
I
! LQ:C prng:ranrnr,g language tir 1mp1ementm9 a particular
appkat,on tiased on language feat.ires
I !
IIT'piemeot a sI1Tl?!e 1Merpreter or a port-011 ot !tie i i
L03 Jb'lguage transla!i:.)n process svc1 as a 1£xical analyzer, i
'
i
parser. code generator or OC!l!Tulet
i !
I
!
L01
Uoo big O notatlO'l !oM;a!:y 10 give asymp>ceUC upoor
xu;i;ds oo t,me and spa:e ccnplexif-1 ol alg;inlhms I
\
i
i
\
i
!
Algcrilhms arul 0$,01 Cnoose and ilf!Ply ff'ie mos! appro:.mate al;;ionl.hm design
Al10', Al SomnleJ:ity SDF103 3 l02 technique (:!iv/de ard CO'lquer, backtr::'l'.:kir:g, gree(ly,
dy:narnc progr,immirg} for solv,ng p-oblems
E E E IE \ i
!
!

L03
()e(J(;ribe the bet.av,or 300 nmnin{; time of ~arkus I
I searching, son,ng, and graoh algorithms.
i i
!
i
i ! ! I i
I
I
! LO".
Design finne-stale mac.~mes. regularexpressioos,
i context-free gram Tia', push-d;:,wn ai1tomata and :ur<rg
maeriines for mooeling a 9'V&11 languaGa: .ato define tt.e
I i

AJIOtTlata I
classes P and NP a:id exp:a,n their s grilicance !o
:"hoofy W'C
A:..102 Al I ;::orrra· AL10' 3 ! CCl"'IPUl\l'lg appilcat10:,s E E E E '
_angu;:ges ! !
i
i
I Apply tile cor.cept of state rr.;.ch1nes in the design atm
r I l02 rrnplement;!Wn c: software
!

i i ' i i i I i
I
l l

i I ,.D1
irnplement a s1mote chent-server soe;t;et-based
a:;iplication thal mee'.s il1e needs ot an organ1:talio1
! '
.gamst sec,mty lhraats-
i I I
t-.etwi'Y';,s aoo
NC101 NC Comrrun1ca!i;1
"'
SDF1C2 3 L02
I
Design and 1mploowml a Slmple telia::ile network orctocol
through lhe diagnosis and fixing Of common network
oroolems.
i
E E
' E I E E
El
!
Compare and contras: the fixed ano ctyr,amic allocation
cC3 I
i let"INques I
! I
l 01 Analyze lhe tiaoeo& nrerent in OS design
I I
!

-
'

!
i Cotnpare and CGJ;trast the algonims used ror processor
:)oera11ng I l.02 sehedullflS aM the differer.: ways of a~ocating memory lo
OS101 OS &rstems
SDF103 3 E E E E E E E i

! i
I L03
8esig n ard cre.i\e COOCJl'ertl p;ograrns cc:r.s,denr,g
syneh.romzati01 issues I

I '
I Ces19n lhe 03$IC ouildmg blocks O' a ,:;omwier·
arilhmettc-•ogk: l)()il (ga!e.Je.,el). registm \gate-~vel).
I
LO"
Architecture cerrral processing ur11t !~er trapsfer.1evei) mermry
DSHli
ARtC· AR Md 3 \reg1Ster transfer -le~el; E E E
SDF103
Orgarnza110n
I
LO? w,1te simple i;:rograms m asse'T'biy ian~Jage
l i .

1 A<goe (he pros ar-d tons of the des·gr, arid j(,'jplementmn I I


I
! ! ,o· 01 compuhtg so.u1,ons 1n ed..icc(,o;, mdusfl'Y anc
Social •ssc.es
govemmen: to name a iew
!
SP101 i SP
'"' SE102 3
Protess1ona•
I E E E E

I
I
Froc:t1ce 1

! 1
LOZ
baluate profess,cra eih!Cal allC sccial issues of
cOl"'lputing rjecistO'lt
I 1

! I
Drscuss !he difference between the w.a!erlal!"bssea !
l01 roo:iels and agile-based mOQe,s ar<d iden!ify !he
i
strengths al1d weaknesses of l:lese J'l'IIXk:ls

Discuss !he difference between :he waterfall•based I


L01 rnxle!s ood <J;1i1e,::iase<J mooets and identity the
s!rerigths ard wea1<:nesses 01 these models
Scft1'-are IM101
SE10'. SE 3 E E E E E E Ei E E E
; ttgilleef,OS 1 $DF1G4
i Extract user reoJi;etrents translate ltlese to form a i I
I I I LO:i ~e!S, ar!d present !hese vsu,g UMU;a;ec
v1s,~alizal/lY!s
!

i
l '
Design ar over-all ar:;h1tet1me ct rie system, anc 1uslify
I i
L03
:tt aopropriate~ess

i Translate pr0>3ram desigm. ar'ld spectf1cab:::.ns i11C actual


LO<
program codes
I
I Improve ;m e,:mll"lg software tly adopllng 8'1 app,opnate ! !
l L0 1
design patle•n
'
'
! I Tra'lstate pr:>gram desig,1s and specmcallons into .ctual l
L82 !,
pn:;97am codes

So!twme
i
-3£102 SE SE10I 3 Llestgn tes! case docvmenls- apply mg goo:i :estmg D D D D D D D
~ngineru1t19 2 D D D
L03 praclices. run the exiS!:ri~ program <J,Jair>s1 these tesl
cases, aoo mpori 1Y09ram defects properly

I '
I uix,a1e a scftwara Iha! -e,:;u:<es cteiect fix,ng or ~as
i
i
' L04
urdergone some charges m specifications
I I I i I
241 I'll!'
Describe the sat of contm!s and procS$$Q& bolh ieehrncal I
~01
an:1 policy nlern;led to protect and dere<'lc mformetkm and :
information systems by ensurmg their availabihly.
irtegrity, ~lhen'.lC811or. arid confidermaMy and
: I
lr.format1ro providing !or non-copudim(ln
IAS101 IAS Assurance and IM101 2 E E E E E E
Secunry
Articulate the strengltis and weakne,sser, associated will'
LC2 different app•oaches to secun\y to the validity ot current
and pao;\ processes and data

I I
::.eve oa aop"():trale JSer 1rterlaces !or domain specific
I to1
~plica:ions

HCl1G1 HCI c,,m,.,,.,


Human
SOF102 1 E E E E E E
lnte:aetion
lOL
Eva!uate the effeclivenesi, cl a dez;gn of an application
'
I
! 0t pro:iUCl in S-Olving domain-specific proOiems '
I

c.O'
::ormtfale the researcb cbjec!wes, scope and limilalJOn!,,
a'ld eva:uatiO'l rnetnc for a chOsen tooic
I
'
L02 Coilect and compare related 11ta.ralure re.:aled lo tile topic

-:-Hs101 4"' Year I


T<S :'.:S lhesl5 1
S!Mdmg
' Propose an ~,cal anrl teooibte software sol1.11i0n to the
1:lentifie:j research probll!'Tl tha'. employs ne'A' designs,
D D D D D D D D D
,I
tools, ard methodolcg1es, as weh a; uiique and useful
L03 enhancemerts wilh creating a prototype software syste;r.
m rr1od 0< with deroonstratmg that a certair thoory ,'
~nthm ! design m1gl1l vrott tnrougti eKPOfai:ocy SM
expenmenlal researeh

Col!ecl pet~;,enl i;:ata to supPQ11 <esearch objoctwes of


LO:
~ :hes!$

Jesign lhe artt:ite::ture and co-r:pcner~ cf lne i::roposed


THS102 THS CS Thesis 2 THS101 3
c02 soflware soiubor D D D ) D D D D o: [

Justify the prooosed solutiol'\'s feasibility and


~03
effectiveness to solve tho computing problem
i i
I I !
Ar.alyie, design, 1rm»ement, ~est, maintain. an:llor I

PRCiC
ooc:.imant a software system as ap:,had t: a rea,-w::rld
PRC Practicum
3" ) L01 prob.em, as par! of a lean v1 an octua: compa,1y D D D ) D ) D D D [
1 Slandmg
enworunenl lbeieby also deve!Oping personal and
inrorperoonal wol)Jng s~ills ir. tne process

Curriculum Map for the Bachelor of Science in Information


Systems

c...m,
Cod, COllmiTltle
1'n,.
Requle.tte
c••,..
Units
Sample Wmin9 Outcome, . .
0 a ,.a Ii !!
Ill ,.i!l
I
.:; l!l
!.!!
, l!l
!:!:!
I~ !::;

I
!
Explain fundamental pMC!;lles arid
cooceptS
L01 e>'OlJlion of computing sys!ems as :ney relate to
different fields
:ntmdvel,or IO 2
CC'01
GonpLi,flg
"'"" L02
Expmmo on me reeen! 1Jevelopment5 m the
differeni computi~ Knowledge areas
I I I

Analyze so!ut01s emp10yed by crgaoizafio'ls to


I
LO:J I
a-idress different co,noul!rig ssues
'

.· 25 I f' :i ~
Design, 1mpleme11l tes1, and dobug a program, ! I
based on a given specifical;on, that uses ea-;ti ol
the followmg f',indamentai programming
l01 components: (1j primltve dala types \2; b.m:
Ccmpi,ier 3 computaton, (3) silll)le !/0, (4) coOO!botlal 800
CC102 Programmhg 1
''"'
'.eralive struchFes (5} definition cf tJnciKlf'S and
Oal'ameter oassmg anct(6: •ecurs!Of'
I I I I I I
I
'
An,ljyze- and simulate results. of algorithms lhal
L02 may be 1mpleme111ed as a solut10n to a giveti
I problem
i I i I
I
!
Desig11 1npleroer::. test and .Jetlug a prog:rarr,
based on a given spee,ticat,or !ha! \JSes (1\ !

Compmer data sructures arrays. SXI\S. que~es !fees


CC103 ~ramrmng2 CC102 l01 strings, structures. linked hstana fiies, (2) I I I
coodit<ma( iteralive, and recursive corst11.icts,
m
and (3) slandam iibraries lhe ass19ned
programming language

I
i
Design, impiemer,t tasl aid debug a program
riased on a giver soecif1ca:.ons Iha! 1.s.es aid
L01 E E E i
D'llplernen: abstract data types (stocks, que~es,
pnOrity qlleues. sets, 'fl8P&]

''
Data Structures 3
CC1Q.< and Algcr~~ms CC103 '
Anarys:£ Argue strengths and weaknesses among multiple I
L02
ITTJplementations for a pm~em (e g, on the
aspe::ts cf llera'Jve or ~urs1ve soh.1!ions an.1 on E E E
'
I
I
the as~ts of .tistrocboo. exws1.la110n ar:d i
mformatioP h1d,ng; i !

! iltomlal100 j .
CC1:JF Manage•n1:mt CC1o.t lQ\ 1n1egrale busmess intellf980Ct! funcl!Ors ,n !he
E I
deveiooment of oalabaie systems III enterpnse;, E E I
' E
' '

Je,,,eiop spec""icatmns '(.11 a sottwa-e


development efbrt that. prech,ely a~cu ale& lhe
tc1ncbonal req1.uement&. expected axec:ution
L01
paths, and the ex~icit vw o! c~Uing ooge or
1 3 emerging technologies, wh,ch inclt1ctes 'ran:lware
devices and software library APls.
'
Appkafl()I': Sele:;:! oo:l ..;sea defined coding <hx:~mentalion
Oeveiopmenl 4M Yaar wr-.:ng, a:le licersirg stancar<ls ir: s thJfficientiy
CC106 compiex software p"Ojeel wr.ere
codmg v.11::.ns E ~ E C C C
and Emergmg Slaodinq
Technologies CO2 and mechanisms for 1~ntl"l9 designs to i
a::hieve desired ~ies Sl1Ch as mbabi:ity I
effic;eocy, and robusloess are pra::ttceo vrilh
respect !O legal 300 eth!Cal consldel'atrors

L,ndera.e, as par!. of a !eri ~Ni~ ar:


ms~lioo of the SO'Jrce code and uni! tes!ing ol !
L03
ll"e flJllcbor.a! untts ot a st.ffic1ently coflltllex
software project

Fundamentals o~ 3 Compa-e and tdant1fy the maior technolog~s and


Is1c1 ·S cc10• L01 apphcalions of i11formation systems in driving I I I I I I
clevelopmcnt a11t1 changes ,n enterprises
I

Examine professional, elh ca' and m(;(al !


LC1 cnalleoges in GOMPl,.'.«')9 al'1!'.I use of lnformat1t111
Protessitm.il systems ard re::ommero courses of oction
!$102 CC101 E
D
Issues in IS 3

L02
Apply/exhibit ethical ttnnkmg s.klllS in analyzing
am;! finding resoi!lOOns to ccmputmg 1sst1es
'
i
i
I I
I
IT lntrastructure E\ra!Uate- now f'; infras:ruciure components are I
IS103 and Network CC101 L01 orgamzed :nto infrastructure solutions 1~ dilferen: D E E E D
Techno!ogies orga111zat1onal enwonmenl:. i
3
I i I I I

26 P ;;i ,·,
!
I I
! ! '
Examine, tes~ and evaluation web solu!mns as
LOZ I
app!md to busmess e,,lerpise
I !

Lse systems thinking to analyze 01.Sll'leSS


J}fOceSseS and i:jeritify problems $!'IC opportunites
L01
!hat c<il1 be solved and supp:med by tec!'IOO!Ogy D C E
I S<>uhons
!
I Systems 3
~ Year A;::p;y o1ppropnate !oois_ melhods
IS104 Analysis anc E E E E 0 D E
Staiding L02 "l'Odelsttech:-uques il'1 systems analysis ano
I Design
I
design
I
I
!
'I
De~elop and .kfeno a project design prupesai to !
LO3 0 0 E D E
:1il'ferent aud,enc8lo.
i
3 I
Erilerpnse ! Exar1ne and evaluate core concepts cf
,S\05 1$103 LO1 data1info(mation arct'.ileciure used m e11st1ng E a ) D
Axhitecture
data,informatior, ar:::t'!lecture OOsigrs
i I ___ ,!
LO'
L(am1r,e t,e use ot prOject ,;,anageme'TI best I
!
' ' I
pr.:ik::lices in reai.-1iie pro_iec!S
!SPro,ect
1$106 !S1~4 E e ( E E E ) l
Maragemen1 1
Aopry ;::~t maragerrent coricepts_ pnnciple&
L02
' I
and lools :n oerlorming an ac!Ja! iS pro,ect
I I

E.xamme existing ,rid emergm;; •nformation


LO1 1ecf\"'fclog1es, the !Jnciklm, of IS ,me how ,t
IS Straregy J I
~pa::!s orgaflizalional operal1oris D D D '
,4r1-1year
!S107 Mana;ie-nerl
Standing ' I I
and Acqwsit;on
I LO2
Anaiyze riow s1rateg1c oec1s10ns are ma<;e
corcen•ng acqumng ·S resources and
:apat;ilme,; 1rctudm9 ttie ability to eva!uafe tt;s
0 0 E E
'
!
jifferern sourang oot1ons
'
i i !
!
!
LO1
b:anne and Evaluale organ1Ul10r,al slrncture
polic1ts and proceoures aruJ the m!ormalton
! I
0Mi01
:)rgamzat10~
aM
Management
CC'01
I j
syskll'¾ !hat suppo1 lherr I E E E I E
i)

I
Concepts E(am,oe ano Evaluate ma1agement lrtecycie and I E
i
.' i
:_c2
the 1nformab:m $)'$let$ tl'at SUP!Xlrf lheFl ' ' E
I' J

' Finanoal
I E1:am1ne ar,d Evaluate finari~1al processes and
'

!
!
0Mt02 DM1J1 i LO~ rept;l'ls dOO the ,nforrnation syslems that sup;i:irl E E E L E
j
Management
I !hem '
.
i

I L01
:Jse systems thmk.ng ,n moaehng and analy2l!19
bJsiness processes
Business
i
E E ' 0 E
DM·o3 Pror..ess JM~02
Maragement Relhink processes tc s1mpMy business ope;alioos
LOI E E 0 D E
I I ' i
. '
t: ..atuate tius,ne-ss perlorm..,..-,..e applying !he
i L'.J1 different evaluation !OO!s co,1s:s!ert w,th Quii1'11)'
mari~er<ienl an.d con!n'uOOS 1mpr0Ye>rent
!I '
I'
I

i D D D
Evalua\KW of 3 I
DM104 Business DM1C3 Develop qul;llily ~ for assessment of
I Perforr'.1ance L02
customer salisfa::1100 ;n all !Ylt!Ses of i'il'1 cycle D D
i D

LO3
Design a business µe-formance "T1a1agemenl I
! program for SMEs D D E E E
QUA~
'
I
I
J
Ovanhtative J• Year Use appropriate matherna:·cal !Ools fer decis-,ori ! I
ET Metttoiis Stardmg L01 D D 0
i
!
3 making,
I
'' i

i
I ' !mpiemen1 ma!hernaliC8< methocs , :T solultons
L02 D D I I
!
i i
:o problems
' l i \
D
I i i

27 I "
CAPiO I Gal)$tone ,f"Yeat 3 ! I I !
I
' Pro,eci 1 StrlitliliQ 0 D D D i D D ID 0 0 0
i
i
I CAP10 caos~ne
I 411'Year
I
3
I
2 Prc,eci 2 Standing D D 0 D D D D D 0 D
! I i i
Analyze, design, rr.plement test maintain. -I
I
PRACO
PracltCW"'•
4Ih Year i
3 ,3,1d,'or docomt,m: a sottware :;ystwn as app!iec 10
areal-world orootem. a& pa'! of ateam in an I 0 I I
I
I Slaodmg
L01
actual company enwo~ment, the<etty ;)!so D
i
D ! D D D
D ID D D'

I i
deve!opmg pasooal and 11:1erpersonai wDfkmg
s•Ais ir me Drocess I I I i !
i
i

Curriculum Map for the Bachelor of Science in Information Technology

Course .._ i CoufleTitie _, Pre-


i Uniti :;; i ~
! ~
• ~
1!l
!
:;, - i «
~ 1!l ~ ~
Sample Leaming Otitcornes .; l i; .;
~
Code e Area
= = I~ ~ t: t: t:
=
'"' I i
Exalam
pr,nciples
fundamental
concepts an::! i
!
I
LD1 evokilliID ol OODP\.t:ng
!
systems as ll'ey rei.ne lo !
i d.fferen1 fields I
i I'
!
Expoond on 1he rece11 !
CC1(H :TF lnltoduciior 10
None 3 deve!oprnents n lhe '!
Q.imouting L02
diff€<en1 comput,ng ' !
I

K/lOWledoe areas !
Analyze solutions
!
employed by or~a11:ta110f's
L03
I com"'""'"
to OOdress diffeuml
: i
i
ISS~ !
Jesigr:. implemel'\t. ;est !
I
and debug a progra~, I i
I I'
!
i
based ori a given
!
specifiwt1on. tha1 uses
each of the foJOWJf\3
i
i

l I
lum:1amenta: ptograrrrrmg
iXJmP(lnenls: l1} pnrrJhve ! i I
i '
L01
CompJ!er dala ;ypes. (2) basrc i i
CC102 PF Programmirig
comotilaOOr,, {3j s1rrpie
3
1 "°"' l/0.14) condit1011al and
i1erahtte Slrvctures. (5)
I
! I I
'
!
:lefi,i1bon o1 ftmciicns and \ !
i i i
pararne!er pass1r>9. a,id{6) I
I
!

I
"'"'""'"
AnaiyZe and sImura1e i i

.02 I resu;ts of algorithms tiat


'fay be 1mplemen!ed as a i
'
soh;fion to a wen ,,,c,, n I i
Desig.,. 1mplemer: tes1
ard deoug a orograrn,
cased on a giVf!~
specii'k:at100, that uses ('l)
data s!l'uctures arrays.
Gtrmas. struC'.Jres. linkec
L01
hst.c1fld files. itJ
conc111~aL rterahve, a~o
recursive constructs, aml
13; standard b::irnnes in :'le
as,,igned programming
Compu!er I u
PF c::::10
Programming2 2 Assess and recommend E E
rev1sr;:i~s to Mother
prog1.nmer'scooe (1)
rflgardmg appropriateness
of Chosen data GtrUChltC
\2) regarding
l02 appropnateness ot chosen
coodr1.ona! and 11eta1!W'l
CO!'i$\rUC:S gi11e1 a
pr:,g:arnrning lask, and
(3)reyarding tnoroughness
mapplying procedura<
alJstraclion
! Argue the costs and ~l
C03 I benefits of riyi;.riic and
static data slr.JcilJ(e
i,;plemenrabors
:lesign 1mplemeni, test
I
and debug a progorrt
03$00onagi¥€'(1
~rn \ spe,:;1ficatioo tha: uses ard
implements aostroct data
typt!S (sta:ks, queues.
priority queu,s sets
!lala mans' i

CC10
CCH/4 S:-Uctl.lffl$ an □
Aigoritrr.s
3 Argue stre~glhs and
weaknesses arrong
I,
mult1;;le irnolemen\a!ions
'o< a problem (te. or 1he
LOI , aspects of iterative vs
! I, recurs.ve soh,;ion& ana on
:'ie aspect:, of atislfll:l1<:m
i encapsulatotL ard
i 1nlormat1on hidmg)
I

Analyze an exIshng
I
i

I I
ctatabMe system 1111th
L01
respec1 lo oual11Y :ssues
Re~abil:ty, scaiab!tity,
etlktency, effecb~eness
and security
I
cc•05 IM 'I Information CC1G
~ ! t: E L E E
' ""'~"""°' 3
Design a database basel.! i
i E i
I
E !'

on user mqu1remen'.li us,ng


a lll'IC!el;' us&:! modelm9 I
I
i
LC2 no'.allcn, and be able !c
use declarative query
l<'llQJage lo elicit
mlor'lnation I i
i I i
I
i De,ielop: specificabcns 'or
a sofl.,.,are develoi:;mert
I
i
I i
I
effort ttiat proc1s.ely I
&ticuiales \tie fonctcnal
reqmremenls, exoocted
I
LO~ execulmn palhs, and the
explicit use of c:uttmg edge
or e,nerying leclloobgier,
i ..t~ch includes 1an:lware
: devices and software
i
I : iibl"""APls
~ Select and use a defined
' codv.ig. oocvmentallon
;i,Titmg and !ir.:ensiog
sta1dards in a sufficientrr
i Dev€klpment
Apphcabon complex software Pro,eci
where coding idioms ard I
CC106 ws ' and Emefging lMiO'. ! LOi mecllarusms for E D D D
1mplflrrenfmg designs to
I '""°""'"'' a::n,eve desired properties
svch as re!ia!>lily
efficier,cy. 31)(1 robuslness
are ;i:aclicetJ with respe,:;1
IC !e9al and elhicai
considera tiers

I Urn:lertake, ii.$ par; of a


learn a:tivlty an irtSpac!ioll
:.OJ oflnes:...ircecodea'\durttt
\:~~ :~=nai
i

i co~ So!tNare project.


i I i
i

291 pd~'
1 I

I L02
1 irpiemenl '!lathematica!
:rethods in 17 soiutions !C
I
I i

I
r:robiems

I
!
I
I I CompNe ano cootrast I

L01 pn.x:edurallfuncttooal
I i .ippmach !o objec1-0nen;ec
I prograrnm11g approocri
I PF 10'.
I Qbjac!-
cc I
PF i
I
,orienleC
Programming
103 ~1gn. 1mpiement. rest
a~d debug programs :JS''IQ
E E
IE E E IE
LC2
ooP conceDts llAf!'
aostroctior, encapsu:at1;;in I
, 1nheotance and I
I po1ymorpt11sn i

I
I I
I
I
!
I
I
I I
I I I

I Design, code, tes: and I I I i i


PF1C2 i pt: , Event-Onven
j Programnm;;;
CC1t l
4 i
I ,a, , debug wnple evenl-drive:i
progra11s tnat respord !O i E l j E E \ E j

I
'1

I I !
uoor events
i i I i I
I I
I I Analyz,e different use'
pormJations with regt«d to
I I
I hCI mtroduct1or IC
Humar
I CC1G [
LG'
I lheff abilities and
Cl'laractersta 'Or uswg
· bot:\ software and
I I
i
hC!lOl
CotnOt,/1.e' I ' IE E
1n1er.:rbori
' !
!
noroware Prrxlue!s,
I I •
i
i Evalua!e tne des,gr o'
L07 , exS~ng usermteilaces
i
! I
I
; oased on the cognitwe
I rn:.dels of tarQet user I I

i
I
!
Ii

I I °"'"°P protrlfypes I
I L01 : ;nterlaces ior users wi!h
! sl)€Cifi(: acces$itli!ity ·ss~s
I I i
I
I I, .
Peit::r.-r usability
I

1
evaluation of an e,:rsling I

I so!1ware based or, gelle<al i


H.imanard principles usoo 1~ me
NCl102
I
i HCI Ccmp,;\w
i
, '.'\e\l!'!s~,r; evaluator: , E E E I E E E
1nter;r,:hon 2 1
I
i
1
I
I
L02 , u~bility perlorrnance a,;c
preference me!ncs
ileammg, las!\ lime, task '
j comple110n, ano user j
! sat1stac:100j, ano ccm:000
I
11satdty guidebnes ano i
i i standards. !
I I I
I
E~amine the differer'.
'.ecrmiqves of warehoosirg
L01 aiv.l r71,n1ng a& tnat will
stjPIX)l'I orgar.1zat1onai
I
I oecisKmS I I
ADVANCEJ
I I
I

! !MHl1 :M Database C~10 c-, --+1------------,1. E E E


i
E ,· E
I

SysteMS
, Propose possibilities 0:1
! i Ii no.. :o improve a specific I
I :..02 algorilhm as may be
applioo to data
j

I
i
w:;irehousing ard mining
I
! I I fiecl)TU'l'l8nd ar.
appropriate operatng
II LC:
. systeit based on given
I sys!err: reqmrements
'
PT1~l x·.o i j Pia~ a-tc! write a s:mple
£ E E
' I L02 : asseP1oiy-!argoage
i
pmgtarr,,

I j i Petr....m a cost-benefit
:..03 , analysis for a prooosed
I server solution

....
30 I,,",·
I,
I ! ! I
Descnbe data
I
I, LO, 1
communicatoos and
network rxidels,
I i

i
! :oix,'ogies, protocols,
! i staridards anO
architectures
1

l I i

I
,!-----)------------------,i
Descnbe necessary
na«Jware aoo cornl'.(lnents
used lo establish
commvnicaton belweer
NET10 ! PTIC
~ET i
i L02 I mullIple oo!worlc:s and
ana,yze tne effec! oi
vanous tcl)Ol()',11•%,
1

! applications a;ij ctev1ces


I 1 oo neiwork pertormal'ice
i
I

i Analyze ro,Jt111g algorithms


orowccls process rnullrg
ta:::fes and xn"gure
j l03
I rwers for oroper
cnentation o' 1;lr1 eliicier:t
~etworX
I I i I I I
i
'Je.)IJn, configure and ' I
I I LOl
deploy switches ufiiiw19
VLANs. truni<mg anc !X)I'!
I !
aggmgaliort
·~-\------ -
Implement mulhole
'iETrn
! ~lworkrg 2
NET: relwOl'ks afid connect Il E E I
l 01 ,02 lf\em ~ogether, s;;;;ec;;;ig
roi;\mg and Sftl!c:lir;g
eqJ1;nnenl '.Or a QIV€f'1
I E I E I

I
[

ne!Wtllk applicalI0,t
I
I

! II
I t.03
!rnp,ernen! 10a:! halarcng
1:, rov:ers ari(l swilthes ,
I I
Oesigi, d~icp and tes! a
progran tr'a! uses e
:_01 rr.essa;11ng reivice that
I senas asyncr.mnous
i i T,essages ocross lhe
I networ~

I ,ritegrafue
! Je$19n. develcp a7<l test a
!
IP]
I 0 ror;rarnrtog
i and
1 Teomolog1es
3 I , program that uses $AX er
I DOM tc parse an XM"' E
!
E E ! E E
i
,.O? documeN XSL a11d XSL T ,·
• 1

~olh~l
I

to transform a Oa1a stream


:rem ol'le foonat to
Write, cteblYJ and :es: a
sc11pt usang an openrting
LOJ I scriplmg !arg.U.1!j':! to
f;rilriate the manage'llent
I of an ooeralir.g sys.rem
i
I
I I i Corn;>are aM cor.11ast '.1ie
· differen1 encryptlt1g and :
1 ';11egra1we
j

I
L01
I !'$:rypting lechnlques tl'a!
ersmes se:urity of da!a
I
l 1P7 102 I !PT
i Drcg,amm'ng
!PT10
.

I I
! "" I'
1 Recomriend wrerc an E E E E
~ecimoiog1es appilcat1on !anguage anc a
~ptmg language wou'd
I
I L02
be more appropriate arul i
I give a val le >eason I::
support lhe se!eehon

.
31 I
Ana:yze !he
ai;ipropriateness cf a
LO1 00::ISI00 ~ I0•SCllfCe or
oot,source !T seN!CeS 1n a
giver s,tualiori

Systems Create a !estng


SLA10: IPT~O
SIA lnt~rafion and 0'lvifoornf;nt and design a E E E E l E E
\
Archllecll.l'B :
I LO,
stress :est vsirig
appropriate tc0<s and
tectin,ques !ha! impact
system peri0fl'!1af1ce

lmolement an 0/lte'prise
LO3 mIB;Jfa?!or 11idcleware
plalfo•rri,

Summa:ize and analyze


LOI , !he data from a usatldty
tast and recommend
aporcpnaie ochor.s

I
Systems
I · Coos!rcJc! an archrtecti.:rai
StA102 SIA
SIAlO ! mode! of a comoiex systen,
lntegralioo aPd I L02 E E E E E E
Arch1tectore 2
' using an arcnilectura
fta'T'eWork
1

I I I
Develop a comoonent arQ I
del';l:mstrate ~ in:egra!iOP
i ;oto a~ exiSting
' ervrronmenl
i I I ,
I I I
I .,,, l
I

At i ArgJe lhe pres am: cons of


I I
i Social and
I, ProfeSSIOf'lal the design !¥Id
,I ,1
SP
1 issues
Juruor
Stand
,

1
Inniemenl1011 of oomou1ms
sOlu\10% i'l varioi)s I E
Ir£ orgam::af!Q('ls I I

I ' I i I i
I i issues
Anal11e eltiicai aoo iega:
Iha\ arise m
Social and
I i I
I I, binfonralior;
SP10 LOJ 1echnology ftelc
SP102 SP · Prolessioral E
! issues 2
determine ~w to (
aadress them techricaly

I i and ethn:a!ly I
I 1 : i
I•
I, E.xarw1e !he rnla!lonsh.p . I I
between threats
\ VUlnetabil!1ies,
COJr!errneasures,
I , I
, anties. CQmj)(om'ses a:1d

I I,
,I

! m-r.eri:ation !'lroughout 1he


entre system lite cycle

!AS101 :AS
/!'formation
A.ssurimce ar.d
Securi!y ~
SIA1C
L02
Ex:llam !he key '.actors
1~ ,n aulhenlica1iOt
aniJ how they ;re used to
E ,I E
venfy "1en!ily and g:.ant
~ lo the system
i
i, De sci be the lef;al lll);j
elhca: co!"lsioerabons I
rela',00 b the handling a'id
managernenl of eotaronse
I I I
mforrnabon assets
I I

J'2 I[; d -
Dlscu!.S pCMCies and
pnrlces to sys rems
inlegraton and aichrtecwre
L01
K: ensure secure system
operation and m!ormator,
assi,rance

lnlor-r;noo ?erfurm a wnerat>lily


!AS102 IAStO
!AS Assvanee and 3 analysis of a syswrr art; E E EI
1
Sect,11ly 2 ! explair 00W desigr
11n:>1erneniation, and !
L02
mslal:alion of hardwa-e
a.rd software contrf.icte to
vulnerabil1ties or tne
r organatio1
I

, 1OJ
1_ .
i , wyOSe Strategies Of'. /'tow
I, "" ia COl.lnler attack threats
I I

I De1elop Web apol!Cal1ons


i osm9 HTML XHIML
I
! XM:,,_ ciient-side I !

orogrammlflg anc other


Web GUI tecl!noloi;res ID
1_01 create and validale
documents generate
I Web Sys1ems
!
I' contems via prog,;unming
ano ,~!egrate digital
, and
WS101 WS
Tet::hnolog1es
libraries with cthei medi& L E E E. E E I
1
j contents

Set oo a woo server to


, I
sup(X>l'I se,ve:-side
process mg ma secu1e
fasti1or and ioentify
com'l'lCn ser,,sr -sn:te
configuraOOc, issues ~hat
a:fect sec urmg

Oepioy and serw; net:1a


I I
L01 contents wrthir wet,
i applKJhOOS

lmplerrient a webstte a.10


Wen S.,slerns ; L02 mtegra!e it .iu, other 1::-
WS1G
WS'02 ws ""'
Tecrmotog1es 3 Appllcaoons E E
' E E E E E
1
2
Propose possitlle 1
.f0provements m!he
c.O3 irrp1e,nented web 1

-'--+-t--~---t--t--t---l----t--+-,-H,.
1

securit, a'lold [
--t-------t~-+----+1·-------,----+--·,,_-_" 1o ..
_,."_·
i 1

i
!

f-
i . - -
I
i
1

Formulate !he :>rotec: : I


!
! · !

; i t.Ol j ot1ec'.l.,.es. scope and !

! . Jmitatons. an(j ll'Jatuahon I', ! :


1

1
: :As10 ' metnc ! I'

Gapsrone i Collect anc compare i


Projeciilid i cc1:: J L02 literalJrerelatedtothe O D D O D J O O i, C · J
Research 1 ! 6 !,)CO.)ee! '

!
Pr:;pose an elh,ca! and
: LOJ feasible IT sa!utmn to !r,e
rdenlifiee problems 1r !he

"""""
i
i

L01 lm;,iltmient the prooosec ff


Solul.on
CAP10 I Capstom;
CAf'1 ! Evallllte and mlerj:Vel 11'\C
Projeet an:! 3
01 perto;mance resi.;11s of the C D D 0 D 0 D E
2 ! Research 2
ff solulioo based o~
iden~fied evah..:atien
I I I merrn:s
I I

33 F d
l I
L03
Rec::irnmend possible
improvements in the IT
Solution <!ue to
I I
1rl'lpjementatmn issues
'
1
I I :
! ! !
J~slify how l'e$0urces *'II
L01 be allocated tit the >1anoos
' adrrirnstralive domains
i'
I Formulate policies
governing tile use cf IT
L02 Systems withm !he
Systems
Adfl'Ml1str alioo IAS1D organization '
SAiOi SA aod 2 ! 3 D D D D 0
Maimerance ReccMmend measures on
how ID ao1rmistef ar-0
L03
Main!a,, Sys';eMS
e+tech,;e!y

Modify configuration of an
LO< operating system to
implement policy
i I I
-
:
Analyze, desip,
irnvlement lest, f"!aintain
anclor ooc-ument a
IAS soflware systerr as awie:1
101 to a re.al-wood problem as
PRACi
l01 ?an of a team m an ac!Jal C D D D D D D D D D D C D
01 Practicum
cc
100
' company envucnment
!hereby also deveiapng
personal and interpersonal
worfJng skdls in ltJe
pmcess
i I i
' I
Section 11 Sample Means of Curriculum Delivery

The graduate outcomes of the BSCS, BSIS and BSIT curricula are achieved through.
but not limited to the following activities:

1. Lecture and Classroom Discussions


2. Programming Demonstrations
3. Guided Hands-on Programming Sessions
4. Guided Design and Development of Project Specifications
5. Independent Programming Assignments such as Machine Problems
6. Case Analysis and Case Studies
7. Capstone Projects for BSIS and BSIT, which involves Requirements
Gathering, Design, and Implementation
8. Thesis for BSCS
9. Mentorship and Monitored Internships

Section 12 Sample Syllabi for Selected Core Courses

INTRODUCTION TO COMPUTING

Prerequisite None
Type of Course Lecture
Units 3

3411';:~,
Course Description:

This course provides an overview of the Computing Industry and Computing


profession, including Research and Applications in different fields; an Appreciation of
Computing in different fields such as Biology, Sociology, Environment and Gaming:
an Understanding of ACM Requirements; an Appreciation of the history of computing:
and Knowledge of the Key Components of Computer Systems (Organization and
Architecture), Malware, Computer Security, Internet and Internet protocols, HTML4/5
and CSS

Learning Outcomes:

By the end of the course, students should be able to:

L01. Explain fundamental principles, concepts and evolution of computing systems


as they relate to different fields
L02. Expound on the recent developments in the different computing knowledge
areas
L03. Analyze solutions employed by organizations to address different computing
issues

Each of these LOs addresses the Degree Graduate Outcomes as


follows:

• articulate and discuss the latest developments in the specific field of practice.
(Philippine Qualifications Framework (PQF) level 6 descriptor) (Graduate
Outcomes: CS10, IS10, IT13)
• effectively communicate orally and in writing using both English and Filipino
(Graduate Outcomes: CS08, IS08, IT10)
• act in recognition of professional, social, and ethical responsibility (Graduate
Outcomes:CS09, IS09, IT12)
• apply computing and other knowledge domains to address real-world
problems (Graduate Outcomes CS01, IS01, IT01)
• utilize modern computing tools (Graduate Outcomes: CS06, IS06, IT07)

Major Course Outputs:

As evidence of attaining the above learning outcomes, students are required to do


and submit the following during the indicated dates of the term. The rubrics for these
outputs are provided.

Learning Due Date


Required Output
Outcome

LO1/ MCO1 A case report on Information Technology best practices


LO2 in various applications in IT industry.

MCO2: Evaluation report on IT solutions employed by an


LO3
orQanization coverinQ various IT issues.

35 I
Other Requirements and Assessments:

Aside from the major course outputs above, this course has one other summative
assessment: a cumulative final exam. In addition, there are formative assessments of
two types: departmental exams and graded class activities. Graded class activities
include (but not limited to) recitation, seatwork, assignments and reports.

Grading System:

To pass this course. one must accumulate at least 60 points through the course
requirements discussed above. The maximum points that a student can obtain
through each requirement are shown below.

Requirement/Assessment Task Maximum Points


2 Major Exams 20
. Final Exam 15
50
15
TOTAL 100

Learning Plan:

LO Topics ,: Class schedule Learning Activities


and Readinas rweeksl
:, Industry in the Profession Weeks 1 -3 • Discussion should include
' Appreciation of Computing in (but not limited to) the
. Different Fields following:
i ·, o professions and careers in
I:
the Computing field
L01 o Computing domains
o Computing disciplines
Different Specializations
o Computing Knowledge
Areas
j • Case Studies
1 • Reading Assignments

Evolution of Computing Week4


!I '

Key Components of a Computer Week 5-6


System, Ooeratina Systems
• Exam 1
Information Technology concepts covering IT
Professions and Careers, IT Domains and IT Case Studies
LO2 Disciplines, History of Computing, Computer System Demonstration
and Ooerating Svstems Reading Assignments
: Malware Week?
i Comouter Security Week8
Networks, Internet and Internet Weeks 9-10
' Protocols
• Exam2
Information Technology concepts covering Malware, i
Computer Security. Networks, Internet and Internet
Protocols i
36 i I
I LO Topics Class schedule Learning Activities
Ii and Readinas rweeksl
HTML and CSS Weeks 11-12
, Computer Systems (Organization and Weeks 13-14 '
!
Architecture i

Final Exam

Text I Materials :

References :

Cashman, S. & Vermaat, M.E. (2014). Discovering Computers. Cengage Learning

Note Include books published in the last 3 years.

APPLICATIONS DEVELOPMENT AND EMERGING TECHNOLOGIES


Course Name : [CC106] Applications Development and Emerging
Technologies
Course Credits 3 units (2 units lecture, 1 unit laboratory)
Contact Hours 5 hours / week (2 hours lecture, 3 hours laboratory)
Pre-Requisite Computer Programming 2

Description Development of applications using web, mobile, and emerging


technologies with emphasis on requirements management, interface
design, usability, testing, deployment including ethical and legal
considerations.

Learning Outcomes:

By the end of the course, students should be able to:

LO1. Develop specifications for a software development effort that precisely articulates the
functional requirements, expected execution paths, and the explicit use of cutting
edge or emerging technologies, which includes hardware devices and software library
APls.

LO2. Select and use a defined coding, documentation writing, and licensing standards in a
sufficiently complex software project where coding idioms and mechanisms for
implementing designs to achieve desired properties such as reliability, efficiency, and
robustness are practiced with respect to legal and ethical considerations.

LO3. Undertake, as part of a team activity, an inspection of the source code and unit testing
of the functional units of a sufficiently complex software project.

Course Outline:

1. Overview of software and hardware technologies


2. Requirements Analysis and Modeling
3. Design Principles and Patterns
4. Prototyping and Quality Assurance
5. Software Testing and Deployment
6. Ethical and Legal Considerations
Major Course Outputs:

As evidence of attaining the above learning outcomes, students are required to do and
submit the following during the indicated dates of the term. The rubrics for these outputs are
provided

Learning
Required Output Due Date
Outcome
L01 MC01: A detailed specifications of a sufficiently
complex software system that explicitly use cutting
edge or emerging technologies.
MC02: A rigorous set of test data and sequence of
' input operations, expected results or program
behavior, and the actual results or program behavior i

L02
designed to comprehensively test the functional and
operational aspects of the software project.
MC03: A documented evaluation and feedback on
I
'
the software source code.
L03 MC04: A documented evaluation of the software
project with respect to software documentation, ,,
,,

r=ression tests. and actual user feedback.

Other Requirements and Assessments:

Presentations of the outputs are also required.

Grading System:

To pass this course, one must accumulate at least _ points through the course
requirements discussed above. The maximum points that a student can obtain through each
requirement are shown below.

Requirement/Assessment Task Maximum


Points
· Software Requirements, Design, and
Execution Plan
Software Implementation, Test, and
Soft Deployment
Class Presentations
•TOTAL 100

Learning Plan:

Note: The HEI may choose the cutting edge or emerging technology to use.

38 I
Rubrics:

Criteria Exemplary Acceptable Developing Beginning No Output


4 3 2 1 0

Program The application The code The code The code Program that
Correctness meets all the works sometimes fails often fails, does not run
requirements for typical or typical input. even for and /or
specified in the input, but Many parts of ' typical input. implemented
project fails for the program Most incorrectly
specification. minor Implementation indicated (based on
The code is special violate indicated restrictions specifications
syntactically and cases: restrictions and were and
logically correct the major some parts of violated. restrictions)
for all cases. requirements the automatically
! Implementation of are met, solution are not gets Ofor this
the program though implemented : course output.
follows the some minor using
indicated ones are not. appropriate
guidelines and Some programming
does not violate lmplementati constructs.
indicated on of the
restrictions. The program
implementation violates
· also exhibits indicated
. appropriate use restrictions .
• of programming
; constructs.
Effective Answers to Answers to Answers to Correct Failure to
Communication questions are . questions questions are ' understandin explain and
/ Concept correct. are correct, but g justify
Understanding reasonable, and correct, but cannot justify of the workings of
reflective of the some solution (e.g., problem, the code
code. The justifications solution via trial but was submitted will
justifications , provided are and error, unable • automatically
provided are : weak. rather 'to explain ' merit O for
sound. than proper workings of this course
I
understanding code output.
i and application provided.
of
concepts).

Readability • The program Minor code Not all functions Minimal No internal
· conforms to a formatting I program internal documentation
coding standard does features have documentati and code
that promotes not exhibit proper internal on is not
code readability. consistency documentation and code readable
Internal in coding readability.
documentation is standard.
comprehensive.

39
References :

1. Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns:
Elements of Reusable Object-Oriented Software, Addison-Wesley, 1994.
2. Stephen G. Kochan, Programming in Objective-C 2.0, Addison-Wesley, 2009
3. George Reese, Cloud Application Architectures: Building Applications and Infrastructure in
the Cloud, O'Reilly Media, 2009
4. Wei-Meng Lee, Beginning Android Tablet Application Development, Wrox, 2011.
5. Stephen Fishman JD. Legal Guide to Web and Software Development, Nolo,
2007.

Note Include books published in the last 3 years.

Section 12 Sample Performance Indicators {rubrics-1 subject only)

Criteria Exemplary Acceptable Developing Beginning


4 3 2 1
Descriptions of Descriptions of Descriptions of Descriptions of
scientific scientific scientific scientific
terms, facts, terms, facts, terms, facts, terms, facts.
concepts, concepts, concepts, concepts,
principles. theories principles, principles, principles,
Knowledge
and theories and theories and theories and
methods are I methods are methods are methods are
complete and ! mostly somewhat minimally
!
correct complete complete and present
and correct correct. or correct
Applications are Applications Applications Applications
thorough, are mostly are somewhat. are minimally
appropriate, and I thorough, appropriate, appropriate and
Application !
accurate appropriate, and accurate. accurate.
and
accurate.
Some of the Some of the Some of the Little of the
written, oral written. oral written, oral written, oral
and/or visual ' and/or visual and/or visual and/or visual
Communication communication is communication communication communication
organized and is is is
effective organized and organized and organized and
effective effective. effective.
Source: http://www. isbe.nel/ils/science/pdflrubric.pdf

40 I I :, ,
ARTICLE VI
REQUIRED RESOURCES

Section 13 Administration

13.1 Composition A well-organized and competent staff and faculty shall


administer the implementation of these programs and should meet the
requirements set by the Commission.

13.2 A Higher Education Institution (HEI) offering any of these programs shall have
a full time academic administrator for each program. This administrator can be
a Dean, Department Head, Director, Coordinator or equivalent depending on
the organizational structure of the HEI.

13.3 General Qualifications of the Program Administrator - The Administrator of


these programs must possess any one of the following:

A. Bachelor of Science in Computer Science Program

a. Doctorate degree in Computer Science.

b. Master's degree in Computer Science, plus:


• at least three (3) years of CS work, CS consultancy, CS
research experience. or tertiary level CS teaching experience.
within the last five (5) years

c. At least a master's degree in a CS allied program plus:


• completion of Bachelor's degree in Computer Science or
• completion of all coursework requirements for a master's
degree in CS;
and
• at least three (3) years of CS work, CS consultancy, CS
research experience, or tertiary level CS teaching experience.
within the last five (5) years.

d. A doctorate degree in a CS allied program plus:


• at least ten (10) years of CS work, CS consultancy, CS
research experience. or tertiary level CS teaching experience.
within the last twelve ( 12) years.

B. Bachelor of Science in Information Systems and Bachelor of Science in


Information Technology Programs

a. Doctorate degree in CS, IS. or IT.

b. Master's degree in CS, IS, or IT plus:


• at least three (3) years of computing work, computing consultancy.
computing research experience, or tertiary level teaching experience
in computing within the last five (5) years.

c. At least a master's degree in IS/IT allied programs, Engineering, or


Mathematics plus:

• 4l , !
• completion of Bachelor's degree in CS, IS, or IT; or
• coursework requirements for a master's degree in CS, IS, or IT;
and
• at least three (3) years of computing work, computing consultancy.
computing research experience, or tertiary level teaching experience
in computing within the last five (5) years.

d. A doctorate degree in IS/IT allied programs, Engineering, or


Mathematics plus:
• at least ten ( 10) years of computing work, computing consultancy.
computing research experience or tertiary level teaching experience in
computing, within the last twelve (12) years;

13,4 General Functions and Responsibilities of the Program Administrator • The


general functions and/or responsibilities of the Program Administrator should
be as follow, thus:

13.4.1 To lead in strategic planning and management, including the


formulation and implementation of the faculty development program;

13.4.2 To assist in the formulation of institutional policies;

13.4.3 To exercise overall supervision of all academic and non-


academic personnel of the college or department;

13.4.4 To coordinate with the office concerned with student


services:

13.4.5 To lead research and extension activities among faculty


and students, including technology innovation and
commercialization activities;

13.4.6 To oversee the formation, implementation and evaluation of plans and


programs for development and the supervision/coordination of
activities and services for the advancement of goals and objectives of
the program;

13.4.7 To help enforce the concerned HEl's rules and the laws
affecting education, and the procedures, policies, rules
and regulations promulgated under authority of or as
adopted by the Commission and/or the HEI;

13.4.8 To exercise educational leadership and accountability


over the following:

13.4.8.1 assignment of academic load to faculty


members, including appointment of faculty
advisers:

13.4.8.2 appointment, promotion, retirement,


termination of and disciplinary actions
against faculty members and non-teaching
personnel, subject to the HEl's policies and
procedures:

42: !',
13.4.9 To undertake periodic curriculum review, revision, and development
with the assistance of the faculty members in the degree program
concerned; and

13.4.10 To prepare course offerings, institute methodologies of instruction,


adopt and recommend appropriate instructional and reference
materials, and recommend books to add to the collection of the
library

13.4.11 To initiate and monitor development of academic and industrial


linkages, extension and outreach programs, and career and
internship placement programs;

13.4. 12 To ensure the attainment of graduate outcomes through monitoring of


graduates, and regular consultation with alumni and industry partners.
This may be done through the creation of an industry advisory board

Section 14 Faculty

14.1 Faculty Composition

14.1.1 There should be at least three (3) full time faculty


members per program, one of whom could be the
dean/program head/coordinator.

14.1.2 At least forty percent (40%) of CS, IS, and IT core and
professional courses should be taught by full-time CS,
IS, and IT faculty members. There shall be a career
development and tenure track for full time faculty
members.

14.1.3 For the Computer Science Program, at least sixty


percent (60%) of CS professional courses should be taught by CS
degree holders. At least thirty percent (30%) of all full-time CS faculty
members should have a graduate degree in Computer Science.

14.1.4 For the Information Systems and Information Technology Programs.


at least sixty percent (60%) of IS and IT professional courses should
be taught by degree holders in either IS or IT program. At least thirty
percent (30%) of all full-time IS and IT faculty members should have a
graduate degree in either CS, IS or IT.

14.1.5 There shall be faculty members with industry experience


within the last two (2) years. These may be full-time or
part-time faculty members

14.1.6 HEls offering CS, IS or IT programs are strongly encouraged to have


faculty members with doctorate degrees in CS, IS, IT or allied fields.

14.1.7 HEls offering CS, IS or IT programs are strongly encouraged to have


faculty members who actively do research and development work in
CS, IS or IT, and who publish regularly in refereed journals and
proceedings. Likewise, the faculty members are also encouraged to

43 I I
join and actively participate in computing related professional
organization{s).

14.2 Qualifications of Faculty

A. Bachelor of Science in Computer Science

A CS faculty should possess at least one (1) of the following qualifications:

14.2.1 At least a baccalaureate degree in CS, IS, or IT.

14.2 2 At least a baccalaureate degree in any allied program or at least


a master's degree in a Science. Technology, Engineering, and
Mathematics (STEM) field plus any of the following:

14.2.2.1 Completion of coursework requirements


for a master's or doctorate degree in a
CS program: or

14.2.2.2 At least three (3) years experience in the


IT profession such as technical administration,
systems design, applications programming or
equivalent or computing research within the last 5
years.

14.2.3 At least a baccalaureate degree with an international IT


certification to teach professional courses specific to that
certification.

B. Bachelor of Science in Information Systems and Bachelor of Science in


Information Technology

An IS or IT faculty should possess at least one (1) of the following


qualifications:

14.2.1 At least a baccalaureate degree in CS, IS, or IT.

14.2.2 At least a baccalaureate degree in any allied


program or at least a master's degree in a STEM
field plus any of the following:

14.2 2. 1 Completion of coursework requirements


for a master's or doctorate degree in a
CS, IS, or IT program.

14.2.2.2 At least three (3) years computing work or consultancy


or computing research experience or tertiary level
teaching experience in computing, within the last five
(5) years

14.2.3 At least a master's degree in Accountancy, Business, and


Management (ABM) program with adequate exposure to

441 ,
computing through coursework or thesis/projects plus at least
one of the following:

a. completion of coursework requirements for a


master's degree in any computing program; or

b. at least tnree (3) years of computing work or


consultancy or computing research experience or
tertiary level teaching experience in computing, within
the last five (5) years;

14.2.4 At least a baccalaureate degree with an international IT


certification to teach professional courses specific to that
certification.

14.2.5 Faculty members deemed to be qualified in an appropriate


business program may teach business domain courses in the
IS program within their specialization.

14.3 Load

14.3.1 Assignment - The regular load of a CS, IS, and IT faculty member is at most
twenty-four (24) units or thirty (30) contact hours per week whichever is
lesser. inclusive of lecture and laboratory. Overload should not exceed six
(6) hours per week. There should not be more than four (4) preparations per
term.

14.3.2 Teaching Load - As a general rule, in case the Dean has to teach, his or her
teaching load should not exceed nine (9) contact hours per week. This load
takes into consideration the functions of the Dean. For the department chair.
his/her teaching load should not exceed twelve (12) contact hours.

14.3.3 Consultation Hours - Each full time faculty member shall render at least
four (4) hours per week for student consultation. This should be outside of
the regular contact hours.

14.4 Employment Status - A full-time faculty member should render al least twenty-four
(24) hours in residence per week as certified by the HEI, have a minimum contract
of one (1) year in the college/department and must not be employed full time
elsewhere.

14.5 Faculty Support

14.5.1 Faculty Development Program - The college/department should have a


written comprehensive faculty development program. There shall be a
specific budget allocation to implement such program. HEls are enjoined to
send full-time faculty members to participate in various activities of
computing professional organizations. There shall also be clear guidelines
on ranking and promotion of faculty members up to professor level.

14.5.2 Facilities - The HEI should provide office space, computers with Internet
connections and printers for faculty and administrators There should be
one (1) computer for every three (3) full-time equivalent faculty members

1~,
\~1
.. ~ .... 45,

~-:::i:f
J , :
and one ( 1) for every administrator. Consultation areas for student and
faculty are also required.

Section 15 Library

15.1 Librarian(s) • HEls offering the CS, IS, and IT programs should have at least
one (1) full-time licensed librarian with at least one (1) year appointment. The
librarian(s) shall participate in faculty meetings and activities and serve as (a)
member(s) of the educational program planning committee. The librarian(s)
should work closely with the Dean or Department Chair in collection
development for the CS. IS, and IT programs.

The librarian(s) should be encouraged to join recognized librarian societies


and associations for professional development.

There should be at least one ( 1) librarian/staff for every five hundred (500)
students or fraction thereof.

15.2 Book Collection. - The library collection of the HEI should meet the
following requirements, namely

15.2.1 To support HEl's curricular needs and to provide enough books


for students, its library should have at least five (5) titles per
professional course, at least one (1) of which has been
published within the last five (5) years. The total number of
volumes per course should be such that. there should be one
(1) volume for every ten (10) students enrolled (e.g. if there are
100 students enrolled in the course Introduction to Computing,
then there should be 10 volumes of books on Introduction to
Computing of which 5 titles should be distinct). Book holdings
should preferably include more reference books and textbooks
rather than vendor specific technology books. e-Books should
also be counted to satisfy this requirement.

15.2.2 For initial offering, the minimum volumes of books covering first
to third year courses are required to be found in the library. For
program recognition, an HEI should have the required number
of books in all four-year levels.

15.2.3 The library should include significant holdings of up-to-date


computer magazines, journals and periodicals that are
published locally and internationally. These include at least two
(2) publications per program. The HEI should have current
subscription to the journals and magazines. Paid online / digital
subscriptions to at least twenty (20) journal titles are allowed as
substitute for journals and magazines provided that they can be
readily accessed and printed by faculty, students and staff.

15.2.4 The library must provide Internet terminals for access to


electronic materials.

15.2.5 The library must provide access (with capability to read or print)
to electronic library materials such as CD-ROMs and electronic
subscriptions. These are considered as additional library
holdings beyond the minimum requirements.

46 • ., .
15.2.6 The library facilities may be augmented by providing Learning
Commons.

15.3 Space Requirements. - The library should have a seating capacity of at least
five percent (5%) of the total students enrolled and a minimum floor area of at
least two (2) sqm per seat. This may include spaces provided as Learning
Commons.

Section 16 Laboratory and Physical Facilities

16.1 Classroom Requirements. There should be at least one classroom per one
hundred fifty (150) students enrolled. Preferably, there should be no more than
50 students in a class. In case of large classes with more than 50 students,
preferably, there should be separate discussion classes with at most 50
students each.

16.2 Laboratory Requirements. The number of terminals dedicated for computing


students should be at least 1/5 of the total number of computing students. This
is to allow each student to have enough individual hands-on computer time
per week. The computer-to-student ratio in a laboratory class should be 1: 1.

In addrtion to teaching facilities. the HEI must provide internet access for the
students and faculty members. All computer laboratories must have Internet
Access. The minimum dedicated bandwidth must be at least 4Mbps. There
should be at least 4Mbps per 500 students. Students must also have access
to wifi and to a learning management system.

The required computer hardware and software should be able to respond to


the objectives of the courses in the curriculum. They should conform to
generally accepted industry standards and be capable of providing training in
multiple platforms. There should also be equipment for courses that require
specific hardware such as routers and switches. Only licensed software,
including free and open source software, may be installed.

16.3 Audio Visual Facilities. Every laboratory must be equipped with projection
equipment or large display to demonstrate digital content. In addition,
projectors must also be available for use in lecture rooms. Large lecture halls
must be equipped with sound systems.

ARTICLE VII
COMPLIANCE OF HEls

Using the CHED Implementation Handbook for OBE and ISA as reference, a HEI shall develop
the following items which will be submitted to CHED when they apply for a permit for a new program
or the approval of the transformation of existing programs to outcomes-based framework:

Section 17 The complete set of program outcomes, including its proposed additional
program outcomes.

Section 18 Its proposed curriculum and its justification including a curriculum map.

Section 19 Proposed performance indicators for each outcome. Proposed measurement


system for the level of attainment of each indicator.
47 ! ,,
Section 20 Proposed outcomes-based syllabus for each course.

Section 21 Proposed system of program assessment and evaluation

Section 22 Proposed system of program Continuous Quality Improvement (CQI).

ARTICLE VIII
PROVISIONS FOR K-12 IMPLEMENTATION

Section 23 Revised General Education (GE)

When the new GE curriculum will take effect in AY 2018-2019, as provided in CMO
20, s. 2013 entitled "General Education Curriculum: Holistic Understandings, Intellectual and Civic
Competencies", the 54 units GE requirements will be reduced to a minimum of 36 units.

The balance of 18 units may be replaced by professional/ domain courses in each of


the three (3) programs (CS, IS and IT) as long as the minimum total number of units is satisfied as
articulated in Section 8.1.

ARTICLE IX
TRANSITORY, REPEALING AND EFFECTIVITY CLAUSE

Section 24 Transitory Provision

HEls that have been granted permit or recognition are hereby given one (1) year from
the date of effectivity hereof to fully comply with all the requirements as stipulated in
this CMO, including both the changes to the new curriculum and transformation to
OBE. Compliance to these requirements shall also be required to State Universities
and Colleges (SUCs) and Local Colleges and Universities (LCUs)

Section 25 Repealing Clause

All pertinent rules and regulations or parts thereof that are inconsistent with the
provisions of these policies, standards, and guidelines are hereby repealed or
modified accordingly.

Section 26 Effectivity Clause

This CMO shall be effective beginning SY 2016-2017 after publication in the Official
Gazette or in a newspaper of general circulation.

Quezon City, Philippines, 11u11111t '!'i, 2015

FOR THE COMMISSION:

~A:~
PATRICIA B. LICUANAN, Ph.D.
Chairperson
ANNEX A

GUIDELINES

UNDERGRADUATETHESIS / CAPSTONE PROJECTS


FOR COMPUTING PROGRAMS

X------- -----------------------------------------X

ARTICLE I
INTRODUCTION

Section 1 Rationale and Background

The Commission on Higher Education has approved programs for


Computer Science, Information Technology and Information Systems.
These shall henceforth be referred to as Computing Programs. This
shall also include any programs that may be endorsed by the Technical
Panel for Information Technology Education (TPITE), and
subsequently approved by CHED.

The Thesis / Capstone Project are required for candidates for


graduation in all Computing Programs. Both the thesis and capstone
projects are terminal project requirements that would not only
demonstrate a student's comprehensive knowledge of the area of
study and research methods used but also allow them to apply the
concepts and methods to a specific problem in their area of
specialization.

BS Computer Science students are required to complete a thesis that


is focused on the theories and concepts of computing in the form of a
scientific work.

BS Information Systems students must complete a project in the form


of a business application development, or an Information Systems
plan.

BS Information Technology students must complete a capstone project


in the form of an IT application, a Multimedia Systems development, or
an IT Management project.

It is expressly understood that Computing Thesis and Capstone


projects need not require surveys, statistics, and descriptive methods,
_unless appropriate.

HEls are required to include thesis and capstone projects in their


curricula. The Policies and Standards for Undergraduate Thesis
intends to serve as a guide for administrators, faculty and students

49 ! I',·
alike in determining what are allowable standards or capstone projects
in the context of undergraduate studies in Computing.

ARTICLE II
THESIS/ CAPSTONE PROJECTS SPECIFICATIONS

Section 2 Definitions

2.1 A Thesis is a technical report on a systematic investigation of a


problem that can be solved using Computing. It may include a
solution, an approximate or partial solution, a scientific
investigation, or the development of results leading to the
solution of the problem.

2.1.1 A Computer Science thesis must be anchored on


Computer Science principles.

2.2 A Capstone Project is an undertaking appropriate to a


professional field. It should significantly address an existing
problem or need.

2.2.1 An Information Technology Capstone Project focuses on


the infrastructure, application, or processes involved in
introducing a Computing solution to a problem.

2.2.2 An Information Systems Capstone Project focuses on


business processes and the implications of introducing a
Computing solution to a problem.

Section 3 Scope of the Theses/ Capstone Projects

The Thesis or Capstone Project should integrate the different courses,


knowledge, and competencies learned in the curriculum. Students are
encouraged to produce innovative results, generate new knowledge or
theories, or explore new frontiers of knowledge or application areas.

For Computer Science, theses involving the development of the


software systems should involve algorithm-based research and
development founded on Computer Science principles. This should be
reflected in the final report.

For Information Technology Capstone Projects, recommended


infrastructure and its implications on other systems should be clearly
specified in the final report with the introduction of the project.

For Information Systems Capstone Projects, changes in process and


information flow and/or information policies with the introduction of the
system should be clearly specified in the final report.
The thesis/capstone project adviser should determine the appropriate
complexity level of the specific problem being addressed and the
proposed solution, considering the duration of the project, the
composition of the team, and the resources available.

Section 4 Suggested Areas for Theses / Capstone Projects

Following is a list of some suggested areas per program. The specific


areas identified for each degree program may also be considered for
the other computing degree programs, depending on the scope,
limitations, and approach and following the principles stated in
preceding sections.

4.1 Computer Science

4.1.1 Current Computer Science Topics

• Software Development and Theory


• Mobile Computing Systems
• Software Extensions or Plug-ins
• Expert Systems and Decision Support Systems
• Systems Software (software tools/utilities, interpreters,
simulators, compilers, security aspects)
• Intelligent Systems
• Game Development
• Computer Vision
• Image I Signal Processing
• Natural Language Processing
• Pattern Recognition and Data Mining
• Bioinformatics
• Graphics Applications
• Cloud Computing
• Parallel Computing
• Embedded Systems
• Emerging Technologies

4.1.2 Foundations of Computer Science

• Automata and Formal Languages


• Data Structures and Algorithm Design and Analysis
• Web Semantics
• Coding Theory
• Programming Languages
• Visualization Systems
• Computer and Architecture
• Modeling and Simulation

51 I 1' ,q: ·.
4.1.3 Human-Computer Interaction

• Usability
• Affective Computing
• Emphatic Computing

4.2 Information Systems

4.3.1. Software Development

• Software Customization
• Information Systems development for actual client
• Web Applications Development
• Mobile Computing Systems

4.3.2. IS Planning

• Enterprise Resource Plan


• Information Systems Strategic Plan

4.3.3. Analysis and Design of a sufficiently complex business


system

4.3 Information Technology

4.2.1 Software Development

• Software Customization
• Information Systems Development for an actual client
(with pilot testing)
• Web Applications Development (with at least alpha
testing on live servers)
• Mobile Computing Systems

4.2.2 Multimedia Systems

• Game Development
• e-Learning Systems
• Interactive Systems
• Information Kiosks

4.2.3. Network Design and Implementation and Server Farm


Configuration and Management

4.2.4. IT Management

• IT Strategic Plan for sufficiently complex enterprises


• IT Security Analysis. Planning and Implementation
{~, s2 I ,, , ,
\ ~~
~j
Section 5 Thesis / Project Duration

Students should be given ample time to finish their project. Two (2) to
three (3) terms or semesters should be prescribed in the curriculum for
BS Computer Science students to complete their theses and one (1) to
three (3) terms or semesters for BS Information Technology and BS in
Information Systems students to complete their Capstone Projects.

The maximum number of units that may be required for Thesis or


Capstone Projects is nine (9) units.

Grading systems and possible honoraria rates for thesis/capstone


project are left to the discretion of the HEI, provided that such policies
are not grossly disadvantageous to the students, and provided further
that such policies are documented and approved by the proper HEI
authorities.

Section 6 Composition of Thesis/ Project Groups

Students should preferably work in teams of two (2) to four (4)


members depending on the complexity of the project The adviser
should be able to determine whether the team can complete the project
on time.

Multidisciplinary teams are also encouraged, provided that team


members prepare separate documentations per program.

Section 7 Adviser/ Panel Composition

7.1 Panel Composition

The project is prepared under the guidance of an adviser and


presented and accepted by a Panel composed of at least 3
members that includes the adviser,

7.2 Adviser/ Panel Qualifications

The adviser must have completed a computing project


successfully beyond the bachelor's degree project As much as
possible, the adviser should be a full-time faculty member of the
HEL Otherwise a full-time faculty co-adviser is required.

Advisers and Panel Members should have a degree in a


Computing or allied programs, or must be domain experts in the
area of study, At least one of the panel members must have a
master's degree in Computing (preferably in the same field as

53 i !I c1 ~
the thesis or project) or allied program. For IT and IS, at least
one of the panel members should preferably have industry
experience.

The adviser must be able to guide the students throughout the


whole project life cycle, including the thesis/capstone project
defense and possible project deployment.

Faculty advisers should preferably handle at most five projects


at one time, and in no case should exceed ten (10) projects.
Panel members should preferably be limited to at most ten (10)
projects and in no case should this exceed twenty projects in
one semester. counting all projects in all HEls.

In case of the participation of an external client, then the


organization for which the project is intended should be
represented as much as possible.

Section 8 Presentation of the Thesis or capstone Projects

Thesis and Capstone project must be presented in a public forum. This


forum may be an international, national, regional, or school-based
conference, meeting, or seminar that is announced and open to
interested parties. This may be separate from the presentation before
the Panel mentioned in Section 6. A school-based colloquium
organized for this purpose would suffice to satisfy this requirement.
Presentation in a public forum, such as the National Conference on IT
Education (NCITE) of PSITE, is encouraged.

ARTICLE Ill
THE THESIS I PROJECT FORMAT

Section 9 Suggested Documentation Template/ Format

Upon completion of the Thesis or Capstone Project, the students shall


be required to submit copies of documentation of their work by team.
This may be in the form of a research report in journal article format
such as ACM or IEEE Format, a bound technical report, or
comprehensive electronic documentation. The format is left to the
discretion of the HEI.

9.1. Computer Science Thesis

9.1.1. Sample Outline for Thesis involving Foundations of


Computer Science

Title Page
Abstract

54 I''::,,
Table of Contents
list of Figures, list of Tables, list of Notations
Introduction
- Background of the problem
- Statement of the problem
- Objectives
Significance
Scope and Limitations
Related literature
Theoretical Background
include comprehensive discussion on theorems,
definitions, fundamental algorithms mathematical
models/formula
Proposed Solution to the Problem
Results and Discussion, includes theoretical proof,
verification. or evidence
Conclusions and Recommendations

Appendices may include the following


- Relevant Source Code, where applicable
- Source Data, where applicable
- One-page Curriculum Vitae per team member

9.1.2. Sample Outline for Thesis involving Software


Development

Title Page
Abstract or Executive Summary
Table of Contents
List of Figures, List of Tables, List of Notations
Introduction
- Project Context
- Purpose and Description
- Objectives
- Scope and limitations
Related Literature
Technical Background
- Include in-depth discussion on relevant technical
aspects of the project
Design and Methodology
- Include discussion on conceptual design I system
architecture/ block diagrams and algorithms
Results and Discussion
Conclusions and Recommendations

Appendices may include the following


- Relevant Source Code
- Evaluation Tool or Test Documents
- Sample input/output/Reports

ss I P ., ; ,·
- Users Guide
- One-Page Curriculum Vitae per team member

9.1.3. ACM Journal Article Format

9.2. Information Technology and Information Systems Capstone


Projects

9 .2.1 Sample Outline for IS Plans


The IS Plan may follow any of the established frameworks,
such as that of the National Computer Center.

9.2.2 Sample Outline for Capstone Projects

Title Page
Executive Summary
Table of Contents
list of Figures, List of Tables, List of Notations
Introduction
- Project Context
- Purpose and Description
Objectives
Scope and limitations
Review of Related literature/Systems
Technical Background
Methodology, Results and Discussion
Requirements Analysis
- Requirements Documentation
- Design of Software, Systems, Product, and/or
Processes
Development and Testing. where applicable
Description of the Prototype, where applicable
Implementation Plan (Infrastructure/Deployment)
where needed
Implementation Results, where applicable
Recommendations

Appendices may include the following


Relevant Source Code
Evaluation Tool or Test Documents
Sample input/output/Reports
Users Guide
Process/Data/Information Flow
Screen layouts
Test Results
Sample Generated Outputs
Pictures showcasing the data gathering,
investigation done (e.g. floor plan, layout, building,
etc.)
One-Page Curriculum Vitae per team member
ARTICLE IV
INTELLECTUAL PROPERTY RIGHTS

Section 10 Intellectual Property (IP) Rights

All Thesis and Projects must not infringe on existing IP. All prior works,
including open source, open content, and creative commons content,
shall be properly cited.

Copyright and other Intellectual Property Rights arising from the Thesis
or Capstone Project shall be bound by the IP Policies of the HEI,
provided that any such policies shall not be grossly disadvantageous to
the creators of IP.

571 f ,, , ,

S-ar putea să vă placă și